Generating mobile peer identities
This section explains how to create mobile user identities
with mobile user accounts that have already been configured in the IPsec VPN reference directory (the firewall's internal LDAP directory in this example).
External PKIs
In the certification authority (CA) that manages the identities of IPsec mobile peers:
- Generate the identities of all IPsec mobile peers.
- Export these identities (certificate + private key).
- Download the identities of individual mobile peers on their workstations.
Internal PKIs (PKIs on an SNS firewall)
If the CA that manages the identities of mobile peers must be created
- Go to Configuration > Objects > Certificates and PKI.
- Click on Add.
- Select Root authority or Sub-authority if this CA is under a root CA in your PKI.
A wizard will automatically appear. - Enter a Name (EAP- IKEv2 in this example).
The ID will automatically be filled in with the name of the CA. This name can be changed. - Enter the attributes of the authority:
- Organization (O),
- Organizational Unit (OU),
- Locality (L),
- State (ST),
- Country (C).
EXAMPLE
Organization (O): Stormshield
Organizational unit (OU): Documentation
Locality (L): Lille
State (ST): Nord
Country (C): France.
- Click on Next.
- Enter then confirm the Password that protects the CA.
- You can enter a contact E-mail address for this CA.
- The default Validity suggested is 3650 days (recommended value).
This value can be changed. - Key type: SECP or BRAINPOOL key types are recommended.
- Select the Key size (bits).
- Click twice on Next.
A summary of the information on the CA will be shown. - Confirm by clicking on Finish.
If you wish to set this CA as the firewall's default CA:
- Select this CA,
- Click on Actions and select Set as default.
Creating the identity of the firewall for the IPsec VPN
If the identity of the firewall used for the IPsec VPN does not yet exist:
- Go to Configuration > Objects > Certificates and PKI.
- Select the CA used for the IPsec VPN.
- Click on Add and select Server identity.
- In the Fully Qualified Domain Name (FQDN) field, enter the name of the peer (e.g., FW-EAP-IKEv2.stormshield.eu).
The ID will automatically be filled in with the name of the peer. This name can be changed. - Click on Next.
- Enter the password of the CA that signs this identity.
- Click on Next.
- Select a Validity duration in days (365 days suggested by default).
- Select the Key type: BRAINPOOL or SECP key types are recommended.
- Select a Key size.
- Click twice on Next.
A summary of the identity will appear. - Click on Finish to confirm the creation of the user identity.
Creating the identity of each peer
- Go to Configuration > Objects > Certificates and PKI.
- Select the CA used for the IPsec VPN.
- Click on Add and select User identity.
- In the Common name (CN) field, enter the name of the peer (e.g., User1 EAP).
The ID will automatically be filled in with the name of the peer. This name can be changed. - Enter the e-mail address of the peer (user1@stormshield.eu in this example).
- Click on Next.
- Enter the password of the CA that signs this identity.
- Click on Next.
- Select a validity duration in days (365 days suggested by default).
- Select the Key type: BRAINPOOL or SECP key types are recommended.
- Select a Key size.
- Click on Next.
A summary of the identity will appear. - Click on Finish to confirm the creation of the user identity.
This e-mail address must be the same as the one configured for the user account that is used for the EAP method (internal directory in this example).
Repeat this process for each mobile peer.
Exporting the identity of each peer
- Go to Configuration > Objects > Certificates and PKI.
- Select the user identity to export.
- Click on Download: select Identity then In P12 format.
- In the Enter password field: create a password that will be used to protect the P12 file.
- Confirm the password.
- Click on Download certificate (P12).
- Save this file in P12 format on your workstation.
This file will need to be imported on the user's workstation when the user's tunnel is being configured in SN VPN Client Exclusive.
Repeat this process to export the identity of each mobile peer.
Deleting the private keys of peer identities on the firewall (recommended)
Once the P12 file has been to imported on the peer's workstation, you are strongly advised to delete the private key of this peer's identity.
- Go to Configuration > Objects > Certificates and PKI.
- Select the identity of the peer whose private key you wish to delete.
- Click on Action: select Remove private key.
The private key will then be immediately deleted.
Repeat this process for each affected peer.