EasyManuals Logo

virtual access GW2024P-2 User Manual

virtual access GW2024P-2
350 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #231 background imageLoading...
Page #231 background image
26: Configuring IPSec
_______________________________________________________________________________________________________
_____________________________________________________________________________________________________
© Virtual Access 2017
GW1000 Series User Manual
Issue: 1.9 Page 231 of 350
# Commands to add a secret for xauth auth
touch /etc/config/strongswan
uci add strongswan secret
uci set strongswan.@secret[1].enabled=yes
uci set strongswan.@secret[1].idtype=userfqdn
uci set strongswan.@secret[1].userfqdn=testxauth
uci set strongswan.@secret[1].remoteaddress=100.100.100.100
uci set strongswan.@secret[1].secret=xauth
uci set strongswan.@secret[1].secrettype=XAUTH
uci commit
This will create the following output:
config secret
option enabled 'yes'
option idtype 'userfqdn'
option userfqdn 'testxauth'
option remoteaddress '100.100.100.100'
option secret 'xauth'
option secrettype 'XAUTH'
26.4 Configuring an IPSec template for DMVPN via
the web interface
To configure IPSec using the web interface, in the top menu, select Services -> IPSec.
The strongSwan IPSec VPN page appears. There are three sections:
Common Settings
Control the overall behaviour of strongSwan. This behaviour is common across all
tunnels.
Connection Settings
Together, these sections define the required parameters for a two-way IKEv1 tunnel.
Secret Settings

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the virtual access GW2024P-2 and is the answer not in the manual?

virtual access GW2024P-2 Specifications

General IconGeneral
Brandvirtual access
ModelGW2024P-2
CategoryWireless Router
LanguageEnglish