beautypg.com

Network requirements, Configuring device a – H3C Technologies H3C SecPath F1000-E User Manual

Page 310

background image

298

IKE negotiation with RSA digital signature configuration
example

NOTE:

In this configuration example, either Device A or Device B is the SecPath firewall.

Network requirements

As shown in

Figure 198

,

An IPsec tunnel is set up between Device A and Device B to secure the traffic between Host A on
subnet 10.1.1.0/24 and Host B on subnet 11.1.1.0/24.

Device A and Device B use IKE for IPsec tunnel negotiation and RSA digital signature of a PKI

certificate system for identity authentication.

Device A and Device B use different CAs. They may also use the same CA as required.

Figure 198 Network diagram

Configuring Device A

1.

Create a PKI entity:

a.

From the navigation tree, select VPN > Certificate Management > Entity.

b.

Click Add.