- /
- /
- /
IPsec Site-to-Site VPN Example with Certificate Authentication
Using certificate-based authentication for identification of VPN tunnel peers is much stronger than using a simple Pre-Shared Key.
To utilize certificate authentication, first create a PKI structure. This can be performed in the GUI using the Certificate Manager feature.
First, designate one firewalls to hold the CA/Certificate structure. For this document, it will be called Firewall A. The other firewall will be Firewall B.
On Firewall A:
- Create a Certificate Authority (CA).
- Create a Certificate for Firewall A. Set the Common Name to the hostname of Firewall A, add an Alternative Names entry with a Type of IP Address and the Value set to the IP address of the WAN interface on Firewall A.
- Create a Certificate for Firewall B. Set the Common Name to the hostname of Firewall B, add an Alternative Names entry with a Type of IP Address and the Value set to the IP address of the WAN interface on Firewall B.
- Export the CA Certificate, and the Firewall B certificate and key On Firewall B:
- Import the CA Certificate and the Firewall B certificate and key On both firewalls:
- Configure the IPsec tunnel as described in IPsec Site-to-Site VPN Example with Pre-Shared Keys, with the following exceptions
- Set Authentication method to Mutual Certificate
- Select the certificate for this firewall for My Certificate
- Select the certificate authority created above for My Certificate Authority
- Click Save
- Click Apply Changes