Configuration

In our example, the configuration is described on the head office side.

Note

Since the certificate implementation process is extremely complex, we first recommend configuring a functioning IPSec tunnel, e.g. with dynamic IP addresses, and then extending and changing this with certificates.

Contents:

Creating an IPSec peer

Changing the Phase-1 Profiles

Changing the Phase-2 Profiles

Configuring DynDNS

Requesting and importing certificates

Changing the IPSec tunnel