You are on page 1of 7

SCALANCE M-800

{
Configuration of SCALANCE M-800: PMA17

--------------------------------------------------------------------------------
PMA17 in connection with CAD

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UDDF4AB45@GFF45.PMA17.p12
Configuration.Group1.CAD.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: 10.0.1.76
Remote Subnet: 193.168.0.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 193.168.17.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UDDF4AB45@GFF45.PMA17_Cert.pem
Local ID: UDDF4AB45@GFF45
Remote Certificate: Configuration.Group1.CAD.cer
Remote ID: UDC9CDFA0@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”

--------------------------------------------------------------------------------
PMA17 in connection with PMA1

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UDDF4AB45@GFF45.PMA17.p12
Configuration.Group1.PMA1.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 193.168.1.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 193.168.17.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UDDF4AB45@GFF45.PMA17_Cert.pem
Local ID: UDDF4AB45@GFF45
Remote Certificate: Configuration.Group1.PMA1.cer
Remote ID: U4493CEAC@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA17 in connection with PMA2

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UDDF4AB45@GFF45.PMA17.p12
Configuration.Group1.PMA2.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 193.168.2.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 193.168.17.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UDDF4AB45@GFF45.PMA17_Cert.pem
Local ID: UDDF4AB45@GFF45
Remote Certificate: Configuration.Group1.PMA2.cer
Remote ID: UED288381@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA17 in connection with PMA3

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UDDF4AB45@GFF45.PMA17.p12
Configuration.Group1.PMA3.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 193.168.3.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 193.168.17.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UDDF4AB45@GFF45.PMA17_Cert.pem
Local ID: UDDF4AB45@GFF45
Remote Certificate: Configuration.Group1.PMA3.cer
Remote ID: UCAA00147@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA17 in connection with PMA5

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UDDF4AB45@GFF45.PMA17.p12
Configuration.Group1.PMA5.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 193.168.5.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 193.168.17.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UDDF4AB45@GFF45.PMA17_Cert.pem
Local ID: UDDF4AB45@GFF45
Remote Certificate: Configuration.Group1.PMA5.cer
Remote ID: UD025B02B@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
--------------------------------------------------------------------------------
PMA17 in connection with PMA18

Go to “System -> Load&Save -> Passwords” and store the Certificate-Password in


X509Cert row.

Go to “System -> Load&Save -> HTTP” and use X509Cert row to upload the following
files:
Configuration.UDDF4AB45@GFF45.PMA17.p12
Configuration.Group1.PMA18.cer

Go to “Security -> IPSecVPN -> Remote End”


Create a new table item with the following information:
Remote Mode: Standard
Remote Type: manual
Remote Address: Enter IP address or FQDN of the responder
Remote Subnet: 193.168.18.0/24

Go to “Security -> IPSecVPN -> Connections”


Create a new table item with the following information:
Keying Protocol: IKEv1
Remote End: choose the Remote End you created
Local Subnet: 193.168.17.0/24

Go to “Security -> IPSecVPN -> Authentication”


Set for your connection the following values:
Authentication: Remote Cert
Local Certificate: Configuration.UDDF4AB45@GFF45.PMA17_Cert.pem
Local ID: UDDF4AB45@GFF45
Remote Certificate: Configuration.Group1.PMA18.cer
Remote ID: U5EC26703@GFF45

Go to “Security -> IPSecVPN -> Phase 1”


Default Cyphers: Uncheck Checkbox
Encryption: AES256
Authentication: SHA1
Key Derivation: DH Group 14
Lifetime [min]: 2879
Aggressive Mode: Disable the check box

Go to “Security -> IPSecVPN -> Phase 2”


Default Cyphers: Uncheck Checkbox
Encryption: AES128
Authentication: SHA1
Key Derivation (PFS): auto
Lifetime [min]: 2879
Lifebytes: 0

Go to “Security -> IPSecVPN -> Connections”


Operation: start

Go to “Security -> IPSecVPN -> General”


Check “Activate IPSec VPN”
}

You might also like