Netgate is offering COVID-19 aid for pfSense software users, learn more.
Configuring RSA Authentication for IPsec¶
Using certificate-based RSA authentication for identification of VPN tunnel peers is much stronger than using a simple Pre-Shared Key.
To utilize RSA authentication, first a PKI structure must be made. This can be performed in the pfSense® webGUI using the Certificate Management feature. Refer to the Certificate Management article for specifics on creating certificate authorities and certificates.
First, designate one firewalls to hold the CA/Certificate structure. For this document, it will be called Firewall A. The other firewall will be Firewall B.
On Firewall A:
Create a Certificate Authority (CA).
Create a Certificate for Firewall A. Set the Common Name to the hostname of Firewall A, add an Alternative Names entry with a Type of IP and the Value set to the IP address of the WAN interface on Firewall A.
Create a Certificate for Firewall B. Set the Common Name to the hostname of Firewall B, add an Alternative Names entry with a Type of IP and the Value set to the IP address of the WAN interface on Firewall B.
Export the CA Certificate, and the Firewall B certificate and key
On Firewall B:
Import the CA Certificate and the Firewall B certificate and key
On both firewalls:
Configure the IPsec tunnel as usual, with the following exceptions
Set Authentication method to Mutual RSA
Select the certificate for this firewall for My Certificate
Select the certificate authority created above for My Certificate Authority
Click Apply Changes