Administrator Guide

Table Of Contents
Setting IPv6 Value
MainModeSecMethods DHGroup14-AES256-SHA384
QuickModeSecMethods ESP:SHA1-AES256+60min+10000000kb
CLI Commands (IPv4)
Enter the following CLI commands on the PS Series group to implement the IPv4 conguration shown in Figure 10. Transport Mode
(Host-to-Host) with Certicates or PSK:
> ipsec certificate load PSAcert IPsecPSA.pfx local password password
> ipsec certificate load RootCA rootca.cer root-ca
> ipsec security-params create RemPeer_CERT_Auth certificate id-type distinguished-name id-
value "CN=RemPeerDN"
> ipsec policy create ToRemPeer_IPv4_CERT_Ikev1 type v4 ip-addr 10.125.56.10 protocol any
action protect RemPeer_CERT_Aut
NOTE: The certicates must be loaded into the Local Computer CAPI store on the Windows host and uploaded to the /
mgtdb/update folder on the PS Series array.
CLI Commands (IPv6)
Enter the following CLI commands on the PS Series group to implement the IPv6 conguration shown in Figure 10. Transport Mode
(Host-to-Host) with Certicates or PSK:
> ipsec security-params create RemPeer_PSK_Auth pre-shared-key key password
> ipsec policy create ToRemPeer_IPv6_PSK_Ikev1 type v6 ip-addr fc00::10:125:56:11 protocol
tcp action protect RemPeer_PSK_Auth
NOTE: The certicates must be loaded into the Local Computer CAPI store on the Windows host and uploaded to the /
mgtdb/update folder on the PS Series array.
Example 2: Tunnel Mode (Between Linux Hosts) Using PSK
In Figure 11. Tunnel Mode Between Linux Hosts Using PSK, an IPsec connection is established between Linux hosts running
strongSwan and the PS Series group. The IPv4 and IPv6 trac is protected using pre-shared keys (PSK). Either IKEv1 or IKEv2 can
be used in this conguration. This particular example uses IKEv2.
78
About Group-Level Security