Configuration |
In our example, the configuration is described on the head office side.
![]() |
Note |
---|---|
Since the certificate implementation process is extremely complex, we first recommend configuring a functioning IPSec tunnel, e.g. with dynamic IP addresses, and then extending and changing this with certificates. |
Copyright© Version 01/2020 bintec elmeg GmbH |