Project

General

Profile

IKEv1 Legacy Configuration Examples » History » Version 3

Version 2 (Andreas Steffen, 16.11.2018 23:03) → Version 3/8 (Andreas Steffen, 16.11.2018 23:10)

h1. IKEv1 Legacy Configuration Examples

These example scenarios use the deprecated stroke management interface.

h2. Remote Access

|RSA authentication with X.509 certificates |{{tc(ikev1/rw-cert,IPv4)}} |{{tc(ipv6-stroke/rw-ikev1,IPv6)}} |{{tc(ikev1/nat-rw,NAT)}} |
|PSK authentication with pre-shared keys |{{tc(ikev1/rw-psk-ipv4,IPv4)}} |{{tc(ipv6-stroke/rw-psk-ikev1,IPv6)}} | |
|RSA with XAUTH authentication |{{tc(ikev1/xauth-rsa,IPv4)}} | | |
|PSK with XAUTH authentication |{{tc(ikev1/xauth-psk,IPv4)}} | | |
|Hybrid RSA (server) / XAUTH (client) authentication |{{tc(ikev1/xauth-id-rsa-hybrid,IPv4)}} | | |

h2. Remote Access with Virtual IP Adresses

|DB-based server-side virtual IP pool |{{tc(ikev1/ip-pool-db,IPv4)}} |
|Static server-side virtual IP addresses |{{tc(ikev1/config-payload,IPv4)}} |
|Static server-side virtual IP addresses in push mode |{{tc(ikev1/config-payload-push,IPv4)}} |
|Static client-side virtual IP addresses |{{tc(ikev1/virtual-ip,IPv4)}} |
|RSA with XAUTH authentication and virtual IP addresses |{{tc(ikev1/xauth-id-rsa-config,IPv4)}} |
|PSK with XAUTH authentication and virtual IP addresses |{{tc(ikev1/xauth-id-psk-config,IPv4)}} |

h2. Site-to-Site

|RSA authentication with X.509 certificates |{{tc(ikev1/net2net-cert,IPv4)}} |{{tc(ipv6-stroke/net2net-ikev1,IPv6)}} |
|PSK authentication with pre-shared keys |{{tc(ikev1/net2net-psk,IPv4)}} | |

h2. Host-to-Host

|IPsec tunnel mode with X.509 certificates |{{tc(ikev1/host2host-cert,IPv4)}} |{{tc(ipv6-stroke/host2host-ikev1,IPv6)}} |
|IPsec transport mode with X.509 certificates |{{tc(ikev1/host2host-transport,IPv4)}} |{{tc(ipv6-stroke/transport-ikev1,IPv6)}} |

h2. Complete List

{{tc(ikev1,All IKEv1 legacy test scenarios)}}