Administrator Guide

Table Of Contents
# rightsubnet=10.2.0.0/16
# rightid="C=CH, O=Linux strongSwan CN=peer name"
# auto=start
"leftcert=draoidoir.crt" tells strongSwan where it can find its local certificate (in /etc/
ipsec.d/certs). This is the local certificate that it will present to the array.
"leftsendcert=yes" tells strongSwan that it should always send its certificate chain to any
peers.
"authby=pubkey" in each connection tells strongSwan that these peers will use certificate-
based authentication.
"rightid=..." is the identifier that strongSwan expects to see presented in the local
certificate that it receives from the array.
We also need to change the ipsec.secrets file:
# This file holds shared secrets or RSA private keys for authentication.
# RSA private key for this host, authenticating it to any other host
# which knows the public part. Suitable public keys, for ipsec.conf, DNS,
# or configuration of other implementations, can be extracted conveniently
# with "ipsec showhostkey".
: RSA client.key
: PSK "my_shared_key"
# 10.127.238.154 10.124.65.39 : PSK "my_shared_key"
# 10.124.65.39 %any : PSK "my_shared_key"
": RSA client.key" tells strongSwan where to find the key file that is used
to decrypt the local certificate (in /etc/ipsec.d/private).
CLI Commands (IPv4)
Enter the following CLI commands on the PS Series group to implement the IPv4 conguration shown in Figure 12. Tunnel Mode
Between Linux Hosts Using Certicate-Based Authentication:
> ipsec security-params create RemPeer_CERT_Auth_Tunnel certificate id-type distinguished-
name id-value
"CN=RemPeerDN" tunnel type v4 tun-ip-addr 10.125.56.10 require-ike-v2
>ipsec policy create ToRemPeer_IPv4_CERT_Ikev2 type v4 ip-addr 10.125.56.10 protocol any
action protect
RemPeer_CERT_Auth_Tunnel
NOTE: All certicates must be uploaded to the /mgtdb/update folder on the PS Series group.
CLI Commands (IPv6)
Enter the following CLI commands on the PS Series group to implement the IPv6 TCP conguration shown in Figure 12. Tunnel
Mode Between Linux Hosts Using Certicate-Based Authentication:
> ipsec security-params create RemPeer_PSK_Auth_Tunnel pre-shared-key key <password> tunnel
type v6 tun-ip-addr
fc00::10:125:56:11 require-ike-v2 id-type domain-name id-value RemPeer.company.com
> ipsec policy create ToRemPeer_IPv6_PSK_Ikev2 type v6 ip-addr fc00::10:125:56:11 protocol
tcp action protect
RemPeer_PSK_Auth_Tunnel
About Group-Level Security
89