![Comnet reliance RL1000GW Скачать руководство пользователя страница 143](http://html1.mh-extra.com/html/comnet/reliance-rl1000gw/reliance-rl1000gw_installation-and-operation-manual_2644386143.webp)
INS_RL1000GW_REV– 15 Jul 2016 PAGE 143
INSTALLATION AND OPERATION MANUAL
RL1000GW
TECH SUPPORT: 1.888.678.9427
RSA Signatures (X.509)
Uses a digital certificate authenticated by an RSA signature.
The user is required to generate certificates from a trusted source and to import these to the VPN
parties (Hubs, Spokes).
Two files are required, one is the certificate itself and the other is the key.
The files should have extensions of .crt and .key.
Below is a screenshot of such 2 files placed on a PC with tftp client and CLI example of importing
them.
Figure 9 The certificate files
1. Import the key file
RL1000GW# rsA-signature import tftp://172.17.203.31/ipsec.key
RSA signature file (ipsec.key) imported successfully
2. Import the certificate file
RL1000GW# rsA-signature import tftp://172.17.203.31/ipsec.crt
RSA signature file (ipsec.crt) imported successfully
3. Validate successful import
RL1000GW# show rsA-signature list
ipsec.crt
ipsec.key
4. Activate the certificate
ipsec rsa-signature activate crt-file ipsec.crt key-file ipsec.key rsa-sig-name test _ 1
5. Update the ipsec isakmp to use the certificate instead of the PSK
ipsec isakmp update authentication-method rsasig
NOTE: The ipsec isakmp property “my id” is not of importance when using certificates as the
authentication method