What is the process of trusting other computers for IPSEC using Certificates?
1) You have to deploy the certificates to the two endpoint computers
2) Change the authentication method for the IP Security Rule to
certificates, rather than Kerberos or pre-shared keys. When you
designate the certificate on the AUthentication Methods tab, you then
designate the root CA certificate that must be used.
Correcting myself, you must use the same root CA on both ends. The CA
can be different CAs that chain to the same root CA.
Brian