Im trying to setup a VPN connection using certificate based authentication. When Phase 1 tries to establish I'm getting the following error
Peer's ID payload ' IPv4_address:xxx.xxx.xxx.xxx' does not match certificate ID, Error: failed to get subjectAltName.
I have added the peer's IP address to the IP(SAN) of the certificate and also tried using 'Permit peer identification and certificate payload identification mismatch' with no luck.
Any further suggestions on how to bring up phase 1?
The error seems to suggest that either A. The other side is sending a local identification that does not match any SAN that is present on the certificate or B. Does not contain a SAN attribute on the certificate at all.
Are both sides under your control, where you're able to generate a new certificate if need be or inspect the current attributes of the certificate it's using?
Also make sure the Certificate Profile on the VPN contains the Intermediate, Root or Self Signed certificate and is marked as a Trusted certificate in the local device store.
I can generate a new certificate if required.
The issue is that it's looking for the peer id which is an IP address in the SAN. I have added this into the cert and verified its there in the SAN but it still doesn't not get picked up during the phase 1 verification - would it be work adding another san entry like hostname and adding the IP address?
If you can generate a new certificate it would defiantly be worth generating a new one containing additional SAN entries.
I'd suggest tagging on the SANs Hostname, FQDN and IP address and check if you can get the firewall to recognize these attributes as the Peer Identification.
Are you sure you've imported the peers certificate, or signer of the certificate, in the local firewall and added a certificate profile containing this certificate which applies on the VPN?
The Peer Identification, local and peer, needs to match on both sides (Reverse local/Remote) and the Cert Profile, if containing the cert marked as trusted, should set up the Phase 1 connection.
Ok to go through the motions..
I generated a CSR using my public IP as the CN
I sent my CSR to the peer who signed it and sent back their Root, Int CA's and my signed cert
I imported all 3
In the IKE setup I set the Cert to be the signed cert
I created a cert profile adding both CA's
I then set Local Identification to be my DN record of the Cert (as this populate this way)
I then set the Peer Identification to be their IP
If I change the IP to be something else it fails before the authentication saying the Peer ID they presented didnt match.
Gotcha, just to clarify did you also designate SAN attributes for your firewall cert and for the cert the other firewall is using?
The additional attributes are SAN items which seem related to the error where no additional attributes were found.
It would end up local something similar to the below screenshot if he other side has a certificate with Email Otherunit@local.local.
Lastly the intermediate and/or root need to be marked in the certificate store as trusted CA's
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!