Enable IPsec Site-to-Site VPN
Learn how to configure an IPsec site-to-site VPN on a Verkada Gateway
Verkada gateways can act as site-to-site IPSec IKEv2 VPN clients. This allows the gateway to connect to an IPsec VPN server and route encrypted traffic. The gateway can only route traffic from devices connected to it through the VPN. Appropriate egress and NAT rules must be set up on the VPN server to allow connected device traffic to be routed through the internet and within the VPN tunnel.
You need to set up Dynamic DNS before you can enable IPsec Site-to-Site VPN.
Configure IPsec VPN on a gateway
On the Authentication drop-down, select Certificate.
a. On Remote ID, enter the remote certificate subjectAltName or subject DN. b. On Local ID, enter local certificate subjectAltName or subject DN.

c. Upload the Client Key, Client Certificate, and Certificate Authority certificate in the .pem format.**Note: **Instructions to generate a client key and certificate and to set up a certificate authority are found here. d. Skip to step 9.
Configure your VPN server
When configuring your VPN server, you must set specific details to establish the VPN tunnel and enable data transfer between the server and the client.
Supported VPN routing type
Policy Based routing
Supported Key Exchange Version
IKEv2
Perfect Forward Secrecy (PFS) is not supported on gateways as a VPN client.
Supported cipher suites for IKE Phase 1 and Phase 2
Encryption
AES 128
AES 256
Hash
SHA 256
SHA 384
SHA 512
DH Group
Group 14
Need more help? Contact Verkada Support.
Last updated
Was this helpful?




