R3721-F3210-F3171-HP High-End Firewalls VPN Configuration Guide-6PW101
292
• After retrieving a local certificate, select VPN > Certificate Management > CRL from the navigation
tree.
Figure 197 Retrieve CRL
• Click Retrieve CRL of the PKI domain of torsa.
Verifying the configuration
After the configuration, select VPN > Certificate Management > Certificate from the navigation tree to
view detailed information about the retrieved CA certificate and local certificate, or select VPN >
Certificate Management > CRL from the navigation tree to view detailed information about the retrieved
CRL.
Applying RSA digital signature in IKE negotiation
NOTE:
In this configuration example, either Device A or Device B is the firewall.
Network requirements
As shown in Figure 198,
• An IPsec tunnel is set up between Device A and Device B to secure the traffic between Host A on
subnet 10.1.1.0/24 and Host B on subnet 11.1.1.0 / 24 .
• Device A and Device B use IKE for IPsec tunnel negotiation and RSA digital signature of a PKI
certificate system for identity authentication.
• Device A and Device B use different CAs. They may also use the same CA as required.