Certificates for Mobile VPN with IPSec Tunnel Authentication (WSM)
When a Mobile VPN tunnel is created, the identity of each endpoint must be verified. This key can be a passphrase or pre-shared key (PSK) known by both endpoints, or a certificate from the Management Server. Your Firebox must be a managed device to use a certificate for Mobile VPN authentication.
If you use a certificate for authentication, it is important to track when the certificates expire. This helps to avoid disruptions in critical services such as VPN.
To configure a new Mobile VPN with IPSec tunnel to use certificates, from Policy Manager:
- Select VPN > Mobile VPN > IPSec.
The Mobile VPN with IPSec Configuration dialog box appears - Click Add.
The Mobile VPN with IPSec Wizard appears. - Click Next.
- Complete the Select a user authentication server page. Click Next.
- Select Use an RSA certificate issued by your WatchGuard Management Server.
- Type the IP address and administration passphrase of your Management Server.
- Finish the wizard.
To configure an existing Mobile VPN with IPSec tunnel to use certificates, from Policy Manager:
- Select VPN > Mobile VPN > IPSec.
- Select the Mobile VPN tunnel you want to change. Click Edit.
- Select the IPSec Tunnel tab.
- Select Use a certificate.
- Type the IP address of the Management Server or certificate authority (CA). If necessary, adjust the connection timeout.
- Click OK.
When you use certificates, you must give each Mobile VPN user three files:
- The end-user profile (.wgx)
- The client certificate (.p12)
- The CA root certificate (.pem)
For more information about how to add and configure the .p12 file, go to Select a Certificate and Enter the PIN.
For more information on Mobile VPN with IPSec, go to Mobile VPN with IPSec.
For instructions to generate the end-user profile which also exports the certificate files to distribute to Mobile VPN users, see Generate Mobile VPN with IPSec Configuration Files.
Verify VPN Certificates with an LDAP Server
You can use an LDAP server to automatically verify certificates used for VPN authentication if you have access to the server. You must have LDAP account information provided by a third-party CA service to use this feature.
- From Policy Manager, select VPN > VPN Settings.
The VPN Settings dialog box opens.
- Select the Enable LDAP server for certificate verification check box.
- In the Server text box, type the name or IP address of the LDAP server.
- (Optional) Type or select the Port number.
- Click OK.
Your Firebox checks the CRL stored on the LDAP server when tunnel authentication is requested.
Configure the Certificate Authority on the Management Server