How to use Digital Signature (X.509) to authenticate IPsec VPN between a Vigor3900/2960 and Vigor Router?

Vigor3900 can act as a CA server and we can use the feature to create a certificate that can be used to authenticate the IPsec tunnel between a Vigor3900 and another Vigor router to enhance the security. Below shows an example of building an IPsec VPN tunnel with X.509 certificate between a Vigor3900 and a Vigor2920.

1. Make sure the time setting on Vigor3900 and Vigor2920 are the same.

time setting

2. On Vigor3900, go to Certificate Management >> Trusted CA Certificate. Choose Build RootCA, enter the required information, click Apply.

build rootCA

3. Download the RootCA file.

download rootCA

4. On Vigor2920, open Certificate Management >> Trusted CA Certificate, click IMPORT to upload the RootCA.

import CA

5. Choose the certificate downloaded from Vigor3900 and click Import.

upload CA

6. After finishing importing, make sure the certificate has been imported successfully. If yes, it will be shown as follows:

CA OK

7. Open Certificate Management >> Local Certificate and click GENERATE to create a certificate request.

gene cert

8. Enter the required information and click Generate.

gene cert2

9. Copy the content in X509 Local Certificate Request and save it as a .crt file..

copy cert

10. Now, go back to Vigor3900. Open Certificate Management >> Remote Certificate, in the field of Selected File, choose the certificate request generated by Vigor2920 and click Upload.

import cert to 3900

11. Click Sign

sign cert

12. In the Issue Certificate dialog, type a key in the field of Password. Click Issue to approve the certificate request from Vigor2920.

issue cert

13. Download the approved certificate from Vigor3900 by clicking Download.

download cert

14. Go back to Vigor2920 and import the issued certificate. Open Certificate Management >> Local Certificate, click IMPORT.

import cert

15. Select the file downloaded from Vigor3900, Click Import.

upload cert

16. When it is finished, the message displayed in Status will changed from "Requesting" into "OK". You may also can click View to review the status of issued certificate.

cert OK

17. Now, Vigor3900 must have issued a certificate for itself and use the certificate to build a VPN tunnel with Vigor2920. Open Certificate Management >> Local Certificate and choose Generate. Type the required information and enable Self Sign. Type the same key as the Passphrase that set for issuing the Root CA certificate with Vigor2920 (step 12)

local cert

18. Now, local certificate of CA for Vigor3900 has been configured. You can find that the status will display “OK”.

local cert ok

19. Go back to Vigor2920, open VPN and Remote Access >> IPsec Peer Identity to add a new VPN profile for IPsec Peer Identity.

peer identity

20. Set a Dial-out IPsec VPN profile. Open VPN and Remote Access >> LAN to LAN. Select Digital Signature (X.509) for IKE Authentication Method. And select the peer ID profile created in the previous step.

vpn out

21. Return to Vigor3900 to configure VPN Policy. Open VPN and Remote Access >> IPSec to add a new Dial-in VPN profile. Set Auth Type to RSA, and choose the certificate created in step 17.

vpn in

22. Finally, we can check if the VPN has established successfully.

vpn up

Published On:2019-11-21 

Was this helpful?