Configuring PKI Certificate

Configuring PKI certificate involves creating RSA key pairs, configuring entity information, obtaining certificates and verifying the certification validity.

Applicable Environment

Two devices use digital certificates to authenticate each other's identity when establishing a VPN, which prevents middleman attacks.

As shown in Figure 1, Device A and Device B apply for certificates from a same CA server, and download CA certificates and local certificates from the server. When an IPsec VPN needs to be established for data transmission between Device A and Device B, Device A and Device B must authenticate each other using certificates. When both have passed authentication, they can set up the IPsec VPN.

Figure 1 Diagram for configuring certificate-based authentication

Pre-configuration Tasks

Before configuring the entity information, complete the following tasks:

  • Assign an IP address to each interface.

  • Configure routes between the devices that use digital certificates to authenticate each other's identity when establishing a VPN.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >