...
1.1) Connect to the router at the Headquarters and navigate to the menu VPN → IKEv2/IPSec → Extended settings.
1.2) Go to the PPKs menu.
1.3) Create a new entry and adjust the following parameters:
...
Hinweis |
---|
The PPK-ID and the PPK itself must match on both VPN routers in order for the VPN to connect. |
1.4) Switch to the menu VPN → IKEv2/IPsec → Authentication.
1.5) Select the VPN connection to be secured and click Edit.
1.6) From the drop-down menu for PPK-ID, select the PPK-ID created in step 1.3.
1.7) This concludes the configuration steps at the headquarters.
...
2.1) Connect to the router at the office and navigate to the menu VPN → IKEv2/IPSec → Extended settings.
2.2) Go to the PPKs menu.
2.3) Create a new entry and adjust the following parameters:
...
Hinweis |
---|
The PPK-ID and the PPK itself must match on both VPN routers in order for the VPN to connect. |
2.4) Switch to the menu VPN → IKEv2/IPsec → Authentication.
2.5) Select the VPN connection to be secured and click Edit.
2.6) From the drop-down menu for PPK-ID, select the PPK-ID created in step 2.3.
2.7) This concludes the configuration steps at the branch office.
...
Select the VPN connection, right-click, and select the context-menu option Disconnect.
3.2) Restart the VPN connection from the command line:
...
do Other/Manual-Dialing/Disconnect HEADQUARTER
4) Checking the quantum resistance of the VPN connection in the VPN status:
With the CLI command ls Status/VPN/Connections you can check whether the configured PPK is used on the VPN connection. If the field Quantum-Resistant displays Yes, the connection uses the PPK.
...
Inhalt nach Stichwort | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|