Chapter 6 – RouteFinder Software
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D)
111
VPN > X.509 Certificates
VPN > IPSec Bridging
VPN > x.509 Certificates
X.509 is an International Telecommunication ITU-T and ISO certificate format standard. The last release of this standard was
X.509 Version 3 in the year 1996.
An X.509 certificate is a confirmation of identity by binding an entity's unique name to its public key through the use of a
digital signature. It also contains the unique name of the certificate user. The certificate, issued by a certificate authority,
contains information to protect data or to establish secure network connections.
When you click the
Add
buttons on this screen, secondary screens display.
Certificate of Authority Generation
A Certificate of Authority Generation screen opens when you click the
Add
button. On this screen, you can:
•
Add a self-signed Certificate of Authority (CA) by entering the information necessary to identify your Certificate.
•
Import a selected Certificate of Authority.
•
Add a predefined Certificate of Authority.
Certificate Generation
A Certificate screen opens when you click the
Add
button. On this screen, you can enter the file path and key file
path. Then enter your password and click
Import
. The certificate is then installed.
VPN > IPSec Bridging
IPSec Bridging is a concept by which two IPSec tunnels can be linked as if they form one single tunnel.
Example
(In this example, there are two tunnels):
1.
tun1
between gateways
A
and
B
and
2.
tun2
between gateways
B
and
C
If
A
and
C
have to communicate over a secure channel, then a third tunnel would have had to setup if IPSec Bridging was
not used. But with IPSec Bridging, we can have them communicate through the existing tunnels,
tun1
and
tun2
.
The above concept can be extended to link more than two tunnels, provided they all have one common endpoint.
The common endpoint between tunnels is called a
hub
.
The other endpoints are called bridge
endpoints
.
IPSec Bridging
Check the box to enable IPSec Bridging. If enable IPSec Bridging, then this machine is going to act as a hub.
Upon enabling IPSec Bridging, you will be given options to select the pairs of tunnels for which bridging is to be
setup. See example above.
Bridge Endpoint Setup
Configure a tunnel and two networks by selecting the
From
network, the
To
network, and the
Through
tunnel.
If any packet has a specified source and destination network, the packet will be sent encrypted via the tunnel.
Note:
Packets are sent via the tunnels only if the tunnels are up and running.