Public Key Infrastructure (PKI) certificate is a digital certificate that authenticates users that attempt to set up IPsec tunnels between each other. A certificate provides a centralized key management mechanism for IPsec.
The access control policy based on certificate attributes is an extra measure for certificate-based authentication. Only the certificates meeting specific requirements can be authenticated. This achieves refined control on user access permissions.
This section provides configuration example of PKI. You can understand the configuration procedures through the configuration flowchart. Each configuration example consists of such information as the networking requirements, configuration notes, and configuration file.