Cellular gateways can act as site-to-site IPSec IKEv2 VPN clients. This allows the gateway to connect to an IPsec VPN server and route encrypted traffic. The gateway can only route traffic from devices connected to it through the VPN. Appropriate egress and NAT rules must be set up on the VPN server to allow connected device traffic to be routed through the internet and within the VPN tunnel.
Configure IPsec VPN on a cellular gateway
In Verkada Command, go to All Products > Gateways .
Select the gateway you want to configure.
In the top right, click Settings .
Under Network > IPsec VPN toggle on Enable IPSec VPN.
In the Server field, enter the VPN server IP or domain name.
The gateway supports two authentication types:
(See step 7) Certificate: Requires Certificate Authority cert, client cert, and key.
(See step 8) Pre-Shared Key: Requires a shared key.
On the Authentication drop-down, select Certificate.
On Remote ID, enter the remote certificate subjectAltName or subject DN.
On Local ID, enter local certificate subjectAltName or subject DN.
Upload the Client Key, Client Certificate, and Certificate Authority certificate in the .pem format.
Note: Instructions to generate client key and certificate and to setup a certificate authority are found here.
Skip to step 9.
On the Authentication drop-down, select Pre-Shared Key.
Hit Apply, then Confirm to save. Your gateway should now have a VPN badge next to the name, indicating that the connection was successful.
Configure your VPN server
When configuring your VPN server, you must set specific details to establish the VPN tunnel and enable data transfer between the server and client.
Supported VPN routing type
Policy Based routing
Supported Key Exchange Version
IKEv2
Note: Perfect Forward Secrecy (PFS) is not supported on gateways as a VPN client.
Supported cipher suites for IKE Phase 1 and Phase 2
Encryption
AES 128
AES 256
Hash
SHA 256
SHA 384
SHA 512
DH Group
Group 14
Note: Set up DDNS using a supported free DDNS provider to ensure your VPN is always connected to the client using its Dynamic Public IP address. This way, the provided ‘hostname’ always resolves to the active public IP address on the VPN client.
Need more help? Contact Verkada Support.