
Configuration Settings
Rev 4 May.17
87
Note: When UDP encapsulation is not used, protocol 50 must also be allowed for the ESP
protocol to pass.
•
Authentication
·
Authentication Method
: Set to Password to use pre shared keys or
Certificate to use digital certificates.
·
Auth ID
: A string to identify the host by. Can be set to the unit's ESN or IP
address, or to Custom which allows a custom string to be entered.
·
Pre-Shared Key
: password for PSK. Note that the value is obfuscated for
security reasons.
Note: The key cannot contain the following special characters: ‘$’, ‘|’.
·
Retype Pre Shared Key
: the value entered in this field must match the
value entered in the Pre Shared Key field for verification purposes.
·
Change WPA Key
: this option is available after the initial pre shared key
has been saved. Enabling this option provides the following fields for
changing the key:
·
Previous Pre-Shared Key
: specify the previously saved pre shared
key.
·
New Pre-Shared Key
: the new the pre-shared key to use.
·
Retype New Pre-Shared Key
: retype the new pre-shared key here
to ensure it was entered correctly.
·
Activation Date
: indicates when the current Auth ID and PSK become
the active credentials in a rotating credential system. The format of the
date is: yyyy/mm/dd hh:mm.
·
Secondary Auth ID
: this field is used in conjunction with the Auth ID field
to provide "rotating" auth ID's which can enhance security. For more infor-
mation contact Sierra Wireless Technical Support.
·
Secondary Pre Shared Key
: this field is used in conjunction with the Pre
Shared Key field to provide "rotating" keys which can enhance security.
Note that the value is obfuscated for security reasons.
Note: The key cannot contain the following special characters: ‘$’, ‘|’.
·
Retype Secondary Pre Shared Key
: the value entered in this field must
match the value entered in the Secondary Pre-Shared Key field for verifi-
cation purposes.
·
Secondary Activation Date
: indicates when the secondary Auth ID and
PSK become the active credentials in a rotating credential system.
·
Certificate File
: Click Browse and select the identify certificate (.pem)
file.
·
Private Key File
: Click Browse and select the generated key (.pem) file.
·
CA Certificate File
: Click Browse and select the CA server certificate
(.pem) file.
·
Server Certificate File
: Leave Blank. This field is used when a CA certif-
icate server is not available. For more information contact Sierra Wireless
Technical Support.