Configuring PKI certificate involves creating RSA key pairs, configuring entity information, obtaining certificates and verifying the certification validity.
Two devices use digital certificates to authenticate each other's identity when establishing a VPN, which prevents middleman attacks.
As shown in Figure 1, Device A and Device B apply for certificates from a same CA server, and download CA certificates and local certificates from the server. When an IPsec VPN needs to be established for data transmission between Device A and Device B, Device A and Device B must authenticate each other using certificates. When both have passed authentication, they can set up the IPsec VPN.