Skip to content
The XG Series hardware appliances will reach end-of-life (EOL) on March 31, 2025. Click here to see the XG to XGS migration documentation.

Configure a policy-based IPsec VPN connection using digital certificates

This article shows an example of configuring a policy-based IPsec VPN connection using digital certificates as an authentication method for VPN peers. You may configure the values according to your organization details.

Network diagram

Network diagram IPsec VPN digital certificates.

Configure certificates and CAs

Upload the SF1 CA to SF2

  1. On Sophos Firewall 1 (SF1), go to Certificates > Certificate authorities.
  2. Click Default, verify the details, then click Download.
  3. Unzip the file and rename Default.pem to Head_Office_Default.pem to differentiate it from the branch office (BO) certificate authority (CA).
  4. On Sophos Firewall 2 (SF2), go to Certificates > Certificate authorities and click Add.
  5. Click Choose File and select Head_Office_Default.pem.
  6. Enter SF1_CA as the Name.
  7. Click Save.

Upload the SF2 CA to SF1

  1. On SF2, go to Certificates > Certificate authorities.
  2. Click Default, verify the details, then click Download.
  3. Unzip the file and rename Default.pem to Branch_Office_Default.pem.
  4. On SF1, go to Certificates > Certificate authorities and click Add.
  5. Click Choose File and select Branch_Office_Default.pem.
  6. Enter SF2_CA as the Name.
  7. Click Save.

Configure a locally-signed certificate in SF1

  1. On SF1, go to Certificates > Certificates and click Add.
  2. Select Generate locally-signed certificate.
  3. Configure as follows:

    Setting Value
    Name SF1_Certificate
    Valid from 2023-02-23
    Valid until 2024-02-23
    Key type RSA
    Key length 2048
    Secure hash SHA - 256

    Tip

    Increase the license expiry date from the default of one year to avoid regenerating and updating the certificate annually.

  4. Enter SophosFirewall1 as the Common name.

  5. Under Subject Alternative Names (SANs), click Advanced settings.
  6. Select a Certificate ID and enter a value. The Certificate ID is required to identify the firewall.

    • DNS: Enter any name.
    • IP address: Enter any IP address.
    • Email: Enter any email address.
    • DER ASN1 DN [X.509]: Automatically uses the Subject of the default CA.

    Example:

    Setting Value Value
    Certificate ID IP address 172.10.10.1

    Note

    If you use DER ASN1 DN [X.509], don't configure anything in the DNS names and IP address under the Subject Alternative Names (SANs) because this will result in a conflict in the authentication of the IPsec VPN connection.

  7. Click Save.

  8. Download the certificate.
  9. Rename the certificate extension to .cer.
  10. On SF2, go to Certificates > Certificates and click Add.
  11. Select Upload certificate.
  12. Configure as follows:

    Setting Value
    Name SF1_Certificate
    Certificate file format CER (.cer)
    Certificate

    Click Choose File and select the .cer file

    downloaded from SF1.

  13. Click Save.

  14. Check if a green checkmark Green checkmark. shows under the Trusted column.

    This indicates the presence of the validating CA in the firewall.

Configure a locally-signed certificate in SF2

  1. On SF2, go to Certificates > Certificates and click Add.
  2. Select Generate locally-signed certificate.
  3. Configure as follows:

    Setting Value
    Name SF2_Certificate
    Valid from 2023-02-23
    Valid until 2024-02-23
    Key type RSA
    Key length 2048
    Secure hash SHA - 256

    Tip

    Increase the license expiry date from the default of one year to avoid regenerating and updating the certificate annually.

  4. Enter SophosFirewall2 as the Common name.

  5. Under Subject Alternative Names (SANs), click Advanced settings.
  6. Select a Certificate ID and enter a value. The Certificate ID is required to identify the firewall.

    • DNS: Enter any name.
    • IP address: Enter any IP address.
    • Email: Enter any email address.
    • DER ASN1 DN [X.509]: Automatically uses the Subject of the default CA.

    Example:

    Setting Value Value
    Certificate ID IP address 172.20.20.1

    Note

    If you use DER ASN1 DN [X.509], don't configure anything in the DNS names and IP address under the Subject Alternative Names (SANs) because this will result in a conflict in the authentication of the IPsec VPN connection.

  7. Click Save.

  8. Download the certificate.
  9. Rename the certificate extension to .cer.
  10. On SF1, go to Certificates > Certificates and click Add.
  11. Select Upload certificate.
  12. Configure as follows:

    Setting Value
    Name SF2_Certificate
    Certificate file format CER (.cer)
    Certificate

    Click Choose File and select the .cer file

    downloaded from SF2.

  13. Click Save.

  14. Check if a green checkmark Green checkmark. shows under the Trusted column.

    This indicates the presence of the validating CA in the firewall.

Configure the IPsec VPN connection

SF1 configuration

  1. Go to Host and services > IP host.
  2. Configure the IP hosts for the local and remote subnets as follows:

    Setting IP host 1 IP host 2
    Name SF1_LAN SF2_LAN
    IP version IPv4 IPv4
    Type Network Network
    IP address 192.10.10.0 192.20.20.0
  3. Click Save.

  4. Go to Site-to-site VPN > IPsec and click Add.
  5. Configure as follows:

    Setting Value
    Name SF1_to_SF2
    IP version IPv4
    Connection type Site-to-site
    Gateway type Respond only
    Activate on save Turned on
    Create firewall rule Turned on
    Profile Head office (IKEv2)
    Authentication type Digital certificate
    Local certificate SF1_Certificate
    Remote certificate SF2_Certificate
    Listening interface Port2 - 172.10.10.1
    Local subnet SF1_LAN
    Gateway address 172.20.20.1
    Remote subnet SF2_LAN
  6. Click Save.

    Note

    The connection will be activated, and a firewall rule named IPsec SF1_to_SF2 will be created automatically and positioned at the top of the firewall rules list. Make sure that the firewall rule is positioned at the top.

  7. Check that the Active column shows a green button Green button..

    This indicates that the HO IPsec VPN connection is active.

SF2 configuration

  1. Go to Host and services > IP host.
  2. Configure the IP hosts for the local and remote subnets as follows:

    Setting IP host 1 IP host 2
    Name SF2_LAN SF1_LAN
    IP version IPv4 IPv4
    Type Network Network
    IP address 192.20.20.0 192.10.10.0
  3. Click Save.

  4. Go to Site-to-site VPN > IPsec and click Add.
  5. Configure as follows:

    Setting Value
    Name SF2_to_SF1
    IP version IPv4
    Connection type Site-to-site
    Gateway type Initiate the connection
    Activate on save Turned on
    Create firewall rule Turned on
    Profile Branch office (IKEv2)
    Authentication type Digital certificate
    Local certificate SF2_Certificate
    Remote certificate SF1_Certificate
    Listening interface Port2 - 172.20.20.1
    Local subnet SF2_LAN
    Gateway address 172.10.10.1
    Remote subnet SF1_LAN
  6. Click Save.

    Note

    The connection will be activated, the BO will start the connection to the HO, and a firewall rule named IPsec SF1_to_SF2 will be created automatically and positioned at the top of the firewall rules list. Make sure that the firewall rule is positioned at the top.

  7. Check that the Active and Connection columns show a green button Green button..

    This indicates that the IPsec VPN connection is established.

Allow access to services

Make sure you allow access from WAN to IPsec in both firewalls. To check tunnel connectivity, you can ping a remote IP address through the VPN connection you created.

Do as follows on SF1 and SF2:

  1. Go to Administration > Device access.
  2. Under IPsec, select WAN.
  3. Under Ping/Ping6, select VPN.
  4. Click Apply.

Verify the IPsec VPN connection

You can verify the IPsec VPN connection as follows:

  1. Do a ping test between endpoints behind SF1 and SF2.

    Head office to branch office.

    Branch office to head Office.

  2. Go to Rules and policies > Firewall rules to verify that the firewall rules allow inbound and outbound traffic.

    Firewall rule traffic.

    Firewall rule traffic.

More resources