Newbie240216 Posted 03 Jan 2024 15:17

Establish IPSEC VPN with fortigate by using RSA-Signed Certificate

Hi all, anyone has establish the IPSEC VPN with third party by using RSA-signed certificate before?
Any guide or solutions can share to me ? Thanks

Farina Ahmed Posted 09 Jan 2024 13:58

establishing an IPsec VPN using an RSA-signed certificate with a FortiGate firewall involves a few steps. First, ensure you have a valid RSA-signed certificate for both the FortiGate and the third-party device. Next, configure the VPN settings on both ends, specifying the authentication method as certificate-based and selecting the RSA-signed certificate for authentication. Define the IPsec parameters such as encryption, authentication, and Phase 1/Phase 2 settings to match on both devices. Then, create the necessary firewall policies to allow VPN traffic between the sites. Finally, test the connection and troubleshoot any potential issues by checking logs and ensuring proper certificate installation.

mdamores Posted 09 Jan 2024 15:43

Please see below pre-requisites and configuration steps:

Pre-requisites
- Generate RSA Keys
- Obtain Certificates

Configuration steps:
1. install certificates
2. Configure IKE
3. Configure IPSec
4. Define IPSec policies
5. Set Pre-Shared Key (PSK) or Certificate Authentication
6. Define Tunnel Interfaces
7. Establish IKE Negotiations
8. Monitor and Troubleshoot

Enrico Vanzetto Posted 09 Jan 2024 15:52

Hi, according to this thread (https://community.sangfor.com/forum.php?mod=viewthread&tid=2812), you can establish an IPSEC VPN with a third-party device by using an RSA-signed certificate. However, you need to ensure that the VPN feature is available on your device and that you have the necessary licenses .

babeshuka Posted 09 Jan 2024 17:24

Generate an RSA key pair (public and private key) for the VPN server. This is typically done on the device that will function as the VPN server.

Rica Cortez Posted 09 Jan 2024 17:24

Create a CSR using the public key generated in the previous step. The CSR will be sent to a Certificate Authority (CA) for signing. The signed certificate will be used by the VPN server to prove its identity.

LucyHeart Posted 09 Jan 2024 17:25

Submit the CSR to a trusted Certificate Authority for signing. If you have an internal CA, you can use that, or you can obtain a certificate from a public CA.

Jigen87 Posted 09 Jan 2024 17:26

Once the CSR is signed, you will receive a certificate from the CA. This certificate will be associated with the private key generated in the first step.

Fuji12 Posted 09 Jan 2024 17:27

Install the signed certificate and configure the VPN server to use the private key and certificate for authentication. Also, configure the VPN settings, including the IPsec parameters such as Phase 1 and Phase 2 settings.

damulagski Posted 09 Jan 2024 17:28

Share the public key and certificate with the third party that will be connecting to your VPN. They may need to do a similar process on their end.

Tammee Ong Posted 02 Apr 2024 11:18

Please note that configuring an IPsec VPN with Fortigate is similar to Sangfor VPN Configuration (https://community.sangfor.com/pl ... ewdatabase&tid=1004). If you are using an RSA-Signed Certificate, you need to navigate to Network > IPsec > Certificate > CSR to generate a CSR request file. Then, generate a certificate based on the CSR and import it to IPsec > Certificate > Certificate. Additionally, import the peer certificate to the Certificate section as well.
page: [1] 2
查看完整版本: Establish IPSEC VPN with fortigate by using RSA-Signed Certificate