Chapter 11 IPsec VPN for FortiOS 5.0 : Auto Key phase 1 parameters : Authenticating remote peers and clients : Enabling VPN access for specific certificate holders : Before you begin
  
Before you begin
The following procedures assume that you already have an existing phase 1 configuration (see “Authenticating the FortiGate unit with digital certificates”). Follow the procedures below to add certificate-based authentication parameters to the existing configuration.
Before you begin, you must obtain the certificate DN of the remote peer or dialup client. If you are using the FortiClient application as a dialup client, refer to FortiClient online Help for information about how to view the certificate DN. To view the certificate DN of a FortiGate unit, see “To view server certificate information and obtain the local DN”.
Use the config user peer CLI command to load the DN value into the FortiGate configuration. For example, if a remote VPN peer uses server certificates issued by your own organization, you would enter information similar to the following:
config user peer
edit DN_FG1000
set cn 192.168.2.160
set cn-type ipv4
end
The value that you specify to identify the entry (for example, DN_FG1000) is displayed in the Accept this peer certificate only list in the IPsec phase 1 configuration when you return to the web-based manager.
If the remote VPN peer has a CA-issued certificate to support a higher level of credibility, you would enter information similar to the following:
config user peer
edit CA_FG1000
set ca CA_Cert_1
set subject FG1000_at_site1
end
The value that you specify to identify the entry (for example, CA_FG1000) is displayed in the Accept this peer certificate only list in the IPsec phase 1 configuration when you return to the web-based manager. For more information about these CLI commands, see the “user” chapter of the FortiGate CLI Reference.
A group of certificate holders can be created based on existing user accounts for dialup clients. To create the user accounts for dialup clients, see the “User” chapter of the FortiGate Administration Guide. To create the certificate group afterward, use the config user peergrp CLI command. See the “user” chapter of the FortiGate CLI Reference.
To view server certificate information and obtain the local DN
1. Go to System > Certificates > Local Certificates.
2. Note the CN value in the Subject field (for example, CN = 172.16.10.125, CN = info@fortinet.com, or CN = www.example.com).
To view CA root certificate information and obtain the CA certificate name
1. Go to System > Certificates > CA Certificates.
2. Note the value in the Name column (for example, CA_Cert_1).