ACM Installation and Operations Guide
Rev 3 Nov 17
30
4119855
2.
Configure the CRL on the ACM:
set vpn ipsec x509 ca <ca_cert_name> crl-file /config/
auth/<crl_file>
Configuring for NCP Client for Windows
The following subsections describe the server-side settings and configuration
changes necessary to allow connections from NCP Client for Windows. For client-
side configuration details, refer to the AirLink Connection Manager Configuration
Guide for NCP Client.
Assigning a Virtual IP Address from the Pool
To allow NCP Client VPN connections, the ACM must assign a Virtual IP address
from its IP address pool using either of the following methods:
•
Certificates—Use the following commands:
set vpn ipsec x509 ca MyCA ca-cert-file /config/auth/
<cacert.pem>
set vpn ipsec x509 ca MyCA ca-cert-type RSA
set vpn ipsec x509 host <ACM_host-cert_name> cert-file
/config/auth/<ACM_host_cert.pem>
set vpn ipsec x509 host <ACM_host-cert_name> cert-type
RSA
set vpn ipsec x509 host <ACM_host-cert_name> key file
/config/auth/<ACM_host_cert.pem>
set vpn ipsec x509 host <ACM_host-cert_name> key type RSA
•
Pre-shared keys—Use the following commands:
Note: Pre-shared keys are not recommended for NCP Client because all clients must
share the same PSK.
set vpn ipsec site-to-site peer any authentication mode
pre-shared-secret
set vpn ipsec site-to-site peer any authentication
pre-shared-secret <your password>
set vpn ipsec site-to-site peer any auto-firewall yes
set vpn ipsec site-to-site peer any ike-group
<ike group name>
set vpn ipsec site-to-site peer any local-ip <ACM IP>
set vpn ipsec site-to-site peer any tunnel 1 esp-group
<esp group name>
set vpn ipsec site-to-site peer any tunnel 1 local subnet
<ACM inside subnet or 0.0.0.0/0>
set vpn ipsec site-to-site peer any tunnel 1 remote-
source-ip <the IP pool>