R3166-R3206-HP High-End Firewalls VPN Configuration Guide-6PW101
142
• Select torsa as the PKI domain.
• Select CA as the certificate type.
• Click Apply.
# Request a local certificate.
• Select VPN > PKI > Certificate from the navigation tree and then click Request Cert.
• Select torsa as the PKI domain.
• Select Password and then type challenge-word as the password.
• Click Apply.
# Retrieve the CRL.
• After retrieving a local certificate, select VPN > PKI > CRL from the navigation tree.
• Click Retrieve CRL of the PKI domain of torsa.
Applying RSA digital signature in IKE negotiation
1. Network requirements
• An IPsec tunnel is set up between Firewall A and Firewall B to secure the traffic between Host A on
subnet 10.1.1.0/24 and Host B on subnet 11.1.1.0 / 24 .
• Firewall A and Firewall B use IKE for IPsec tunnel negotiation and RSA digital signature of a PKI
certificate system for identity authentication.
• As shown in Figure 86, F
irewall A and Firewall B use different CAs. They may also use the same CA
as required.
Figure 86 Network diagram for applying RSA digital signature in IKE negotiation