How to set-up WatchGuard VPN with IKEv2 under Debian and Fedora

As far as I know, I'm the only Linux user at the company where I work and for the longest time I used OpenVPN to connect to our WatchGuard VPN service. OpenVPN was quick and easy to configure and worked out-of-the-box on my Debian and Fedora systems. However, WatchGuard deprecated OpenVPN in favour of IKEv2.

WatchGuard provide helpful instructions for using their VPN service with Windows, macOS, iOS and Android, but do not provide any instructions for Linux users. I found searching the web for instructions to be a bit sketchy, so I figured I'd write some instructions that I found work for me.

Debian

At the time of writing, I am using Debian 12 (bookworm). The following instructions assume you are using the default GNOME desktop environment. Support for other desktops is beyond the scope of this post.

Install packages

Enter the following terminal command to install the additional required packages:

sudo apt install network-manager-strongswan libcharon-extra-plugins

Install WatchGuard root CA certificate

You will need to install the WatchGuard certificate file. WatchGuard provide details on how to obtain the certificate here. If you don't have admin access to your VPN service, ask your VPN administrator to provide it.

Under Debian, CA certificates are located in /usr/local/share/ca-certificates/. I create a new directory under that directory to store the WatchGuard certificate, before running the terminal command to update the system's store of CA certificates.

sudo mkdir /usr/local/share/ca-certificates/watchguard
sudo cp rootca.crt /usr/local/share/ca-certificates/watchguard/
sudo update-ca-certificates

If successful, the update-ca-certificates command should produce output similar to below:

Updating certificates in /etc/ssl/certs...
rehash: warning: skipping ca-certificates.crt,it does not contain exactly one certificate or CRL
1 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
done.

Set-up VPN connection

Next, using GNOME settings app, create a new VPN connection. Open the GNOME settings app, navigate to the 'Network' tab and click the plus icon next to the VPN heading.

Screenshot of GNOME settings app showing where to click to create a new VPN connection.

Select the 'IPsec/IKEv2 (strongswan)' option when presented.

Screenshot of GNOME settings app showing which VPN option to select.

On the VPN Identity settings screen, enter the following details:

  • Provide a name for VPN connection. You can name it whatever you like, I named my connection "WatchGuard".
  • Enter the IP address of your WatchGuard VPN service. If you don't know it, ask your VPN administrator.
  • Enter your username and password.
  • Check both "Request an inner IP address" and "Enforce UDP encapsulation"

Screenshot of GNOME settings app showing VPN identity settings.

Your VPN connection should now be working.

Fedora

At the time of writing, I am using Fedora 40 and 41. The following instructions assume you are using the default GNOME desktop environment. Support for other desktops is beyond the scope of this post.

Install packages

Enter the following terminal command to install the additional required packages:

sudo dnf install NetworkManager-strongswan NetworkManager-strongswan-gnome strongswan-charon-nm

Install WatchGuard root CA certificate

You will need to install the WatchGuard certificate file. WatchGuard provide details on how to obtain the certificate here. If you don't have admin access to your VPN service, ask your VPN administrator to provide it.

Under Fedora, the WatchGuard CA certificate needs to be placed in /etc/strongswan/ipsec.d/cacerts/. This can be achieved with the following terminal command:

sudo cp -p rootca.pem /etc/strongswan/ipsec.d/cacerts/

Fedora 41 note: Depending on how your WatchGuard certificate is configured, this may or may not be required, but I had to adjust the crypto policies under Fedora 41 to allow for SHA1. This can be done by editing the file /etc/crypto-policies/config to read.

DEFAULT:SHA1

Before running the terminal command:

sudo update-crypto-policies

Set-up VPN connection

Next, using GNOME settings app, create a new VPN connection. The instructions for this are exactly the same as for Debian, see above.

Debugging connection issues

If for any reason the connection fails to connect, it can be helpful to read your system's logs to try and debug any errors. Network Manager logs can be read using the following terminal command:

sudo journalctl -u NetworkManager.service

debian fedora ikev2 ipsec vpn watchguard

Comments

New Comment

If you have a comment you'd like to share, feel free to leave it below. I moderate all comments before they are published. Markdown is enabled. See syntax for help.


I'll never share your email with anyone else.
Philip Newborough and a donkey enjoying a beer.

About

My name is and I’m a full stack web developer living and working in Lincoln, England. This website (philipnewborough.co.uk) serves as my personal homepage. When I’m not working with tech, I love to ride bicycles with my wife and friends.

An IndieWeb Webring 🕸💍