IPsec/IKEv2-based VPN software for Linux
- RootCA1: rootca1-cert.pem (X.509, PEM)
In this case, VPN gateway (gateway1.example.com) doesn't keep
SubCA1's certificate beforehand and
Remote host1 (remotehost1.sales.example.com) transmits it in the IKE_AUTH exchange. |
# cp remotehost1.sales.example.com-cert.pem chained-remotehost1-my-certs.pem
# cat subca1-cert.pem >> chained-remotehost1-my-certs.pem |
- VPN Configuration[Tab] > VPN Realms[Left-Tree]
- VPN Configuration[Tab]
> VPN Realms[Left-Tree]
> Realm ID: Realm Name[Left-Tree]
> My Key Store[Left-Tree]:
Click this tree node and show My Key Store pane.
- Enter the following.
Authentication Method: RSA Signature(RSA-Sig)
My ID Type: auto
Key Format: PEM(Base64-encoding) - File
My Certificate(X.509, *.pem): gateway1.example.com-cert.pem
RSA private key(*.pem): gateway1.example.com-pkey.pem
RSA Private Key's Password: password
- VPN Configuration[Tab]
> VPN Realms[Left-Tree]
> Realm ID: Realm Name[Left-Tree]
> CA Certificate/CRL[Left-Tree]:
Click this tree node and show CA Certificate/Certificate
Revocation List(CRL) pane.
- Enter the following.
Certificate/CRL Format: PEM(Base64-encoding) - File
CA Certificates(X.509, *.pem): rootca1-cert.pem
- VPN Configuration[Tab]
> Edit VPN Realm(Save, Add, etc.)[Left-Tree]:
Click this tree node and show Edit VPN Realm(Save, Add, Remove, or Load) pane.
- Click Save Configuration button.
- VPN Configuration[Tab] > VPN Realms[Left-Tree]
- VPN Configuration[Tab]
> VPN Realms[Left-Tree]
> Realm ID: Realm Name[Left-Tree]
> My Key Store[Left-Tree]:
Click this tree node and show My Key Store pane.
- Enter the following.
Authentication Method: RSA Signature(RSA-Sig)
My ID Type: auto
Key Format: PEM(Base64-encoding) - File
My Certificate(X.509, *.pem): chained-remotehost1-my-certs.pem
RSA private key(*.pem): remotehost1.sales.example.com-pkey.pem
RSA Private Key's Password: password
- VPN Configuration[Tab]
> VPN Realms[Left-Tree]
> Realm ID: Realm Name[Left-Tree]
> CA Certificate/CRL[Left-Tree]:
Click this tree node and show CA Certificate/Certificate
Revocation List(CRL) pane.
- Enter the following.
Certificate/CRL Format: PEM(Base64-encoding) - File
CA Certificates(X.509, *.pem): rootca1-cert.pem
- VPN Configuration[Tab]
> Edit VPN Realm(Save, Add, etc.)[Left-Tree]:
Click this tree node and show Edit VPN Realm(Save, Add, Remove, or Load) pane.
- Click Save Configuration button.
In this case, both VPN peers need to
keep SubCA1's certificate beforehand,
so you need to create a PEM-encoded file including certificates for both
SubCA1 and RootCA1
to upload them to Rockhopper by Web Console.
This file is for both
VPN gateway (gateway1.example.com) and
Remote host1 (remotehost1@sales.example.com).
|
# cp subca1-cert.pem chained-ca-certs.pem
# cat rootca1-cert.pem >> chained-ca-certs.pem |
- VPN Configuration[Tab] > VPN Realms[Left-Tree]
- VPN Configuration[Tab]
> VPN Realms[Left-Tree]
> Realm ID: Realm Name[Left-Tree]
> My Key Store[Left-Tree]:
Click this tree node and show My Key Store pane.
- Enter the following.
Authentication Method: RSA Signature(RSA-Sig)
My ID Type: auto
Key Format: PEM(Base64-encoding) - File
My Certificate(X.509, *.pem): gateway1.example.com-cert.pem
RSA private key(*.pem): gateway1.example.com-pkey.pem
RSA Private Key's Password: password
- VPN Configuration[Tab]
> VPN Realms[Left-Tree]
> Realm ID: Realm Name[Left-Tree]
> CA Certificate/CRL[Left-Tree]:
Click this tree node and show CA Certificate/Certificate
Revocation List(CRL) pane.
- Enter the following.
Certificate/CRL Format: PEM(Base64-encoding) - File
CA Certificates(X.509, *.pem): chained-ca-certs.pem
- VPN Configuration[Tab]
> Edit VPN Realm(Save, Add, etc.)[Left-Tree]:
Click this tree node and show Edit VPN Realm(Save, Add, Remove, or Load) pane.
- Click Save Configuration button.
- VPN Configuration[Tab] > VPN Realms[Left-Tree]
- VPN Configuration[Tab]
> VPN Realms[Left-Tree]
> Realm ID: Realm Name[Left-Tree]
> My Key Store[Left-Tree]:
Click this tree node and show My Key Store pane.
- Enter the following.
Authentication Method: RSA Signature(RSA-Sig)
My ID Type: auto
Key Format: PEM(Base64-encoding) - File
My Certificate(X.509, *.pem): remotehost1.sales.example.com-cert.pem
RSA private key(*.pem): remotehost1.sales.example.com-pkey.pem
RSA Private Key's Password: password
- VPN Configuration[Tab]
> VPN Realms[Left-Tree]
> Realm ID: Realm Name[Left-Tree]
> CA Certificate/CRL[Left-Tree]:
Click this tree node and show CA Certificate/Certificate
Revocation List(CRL) pane.
- Enter the following.
Certificate/CRL Format: PEM(Base64-encoding) - File
CA Certificates(X.509, *.pem): chained-ca-certs.pem
- VPN Configuration[Tab]
> Edit VPN Realm(Save, Add, etc.)[Left-Tree]:
Click this tree node and show Edit VPN Realm(Save, Add, Remove, or Load) pane.
- Click Save Configuration button.