You are on page 1of 20

SCALANCE M-800

{
Configuration of SCALANCE M-800: PMA16

--------------------------------------------------------------------------------
PMA16 in connection with CAD

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.CAD.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: 10.0.1.46
Remote Subnet: 192.168.0.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.CAD.cer
Remote ID: UDC9CDFA0@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA1

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA1.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.1.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA1.cer
Remote ID: U4493CEAC@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA16 in connection with PMA2

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA2.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.2.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA2.cer
Remote ID: UED288381@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA16 in connection with PMA3

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA3.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.3.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA3.cer
Remote ID: UCAA00147@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA16 in connection with PMA4

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA4.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.4.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA4.cer
Remote ID: UB8B347DA@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA16 in connection with PMA5

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA5.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.5.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA5.cer
Remote ID: UD025B02B@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA16 in connection with PMA6

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA6.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.6.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA6.cer
Remote ID: UDDF4AB45@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA16 in connection with PMA7

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA7.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.7.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA7.cer
Remote ID: U5EC26703@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA8

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA8.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.8.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA8.cer
Remote ID: U7FBDC76B@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA9
Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in
X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA9.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.9.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA9.cer
Remote ID: UB8DF4604@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA10
Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in
X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA10.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.10.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA10.cer
Remote ID: U020AEBAB@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA11

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA11.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.11.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA11.cer
Remote ID: U7D08FA59@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA12

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.
Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA12.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.12.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA12.cer
Remote ID: U9F77AAC1@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA13

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.
Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA13.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.13.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA13.cer
Remote ID: U40DB4EEF@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA14

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA14.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.14.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA14.cer
Remote ID: U2719DD63@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA15

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA15.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.15.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA15.cer
Remote ID: UA91BAC30@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA17

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA17.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.17.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA17.cer
Remote ID: UDE216BEB@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA18

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA18.cer
Go to “Security -> IPSecVPN -> Remote End”
Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.18.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA18.cer
Remote ID: UD090C130@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA19

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA19.cer
Go to “Security -> IPSecVPN -> Remote End”
Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.19.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA19.cer
Remote ID: U0A39F46B@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA16 in connection with PMA20

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UCC0F9FEA@GFF45.PMA16.p12
Configuration.Group1.PMA20.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 192.168.20.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 192.168.16.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UCC0F9FEA@GFF45.PMA16_Cert.pem
Local ID: UCC0F9FEA@GFF45
Remote Certificate: Configuration.Group1.PMA20.cer
Remote ID: UEC14EC94@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

You might also like