Page 131
;tls-auth ta.key 1
(Note: It is used to enable the feature of TLS encryption, and should be
consistent with that of the server.)
<ca>
-----BEGIN CERTIFICATE-----
Note: Fill in the key copied from the file of ca.crt.
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
Note: Fill in the key copied from the file of client.crt, that is, the content inbetween
“-----BEGIN CERTIFICATE-----” and “-----ENDCERTIFICATE-----”
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN RSA PRIVATE KEY-----
Note: Fill in the key copied from the file of client.key
-----END RSA PRIVATE KEY-----
</key>
Note: The following key is not necessary to add if it is never encrypted at the server.
<tls-auth>
Note: Fill in the key copied from the file of ta.key
</tls-auth>
Make sure the three key files ca.crt, client.crt and client.key are of the newest versions.
Step 3:
Save the file after your examination or supplement and upload it to the device. Note that
the suffix of the file must be .conf.
Part 3: Attentions
a)
After the VPN featured is opened at the server, use your PCs to connect as a test. If two PCs
can PING through each other, it means the server works normally.
S
MG
Series
Wireless
Gateway
User
Manual
(Version
1.9.0)