A certificate-based VPN uses digital certificates rather than pre-shared keys during IKE negotiation.
You can use certificate-based authentication with a route-based or policy-based VPN.
In certificate based authentication for IPsec VPNs, each endpoint presents a certificate during IKE negotiation. Both endpoints must share a common certificate authority (CA). Each endpoint is configured with attributes from its peer certificate (like DN, email id, IP address present in certificate), rather than an IP or CIDR, as the remote identity.
Prerequisites
If you do not have the necessary server certificates or CA certificates in NSX Manager, import the certificates. See Import a Self-signed or CA-signed Certificate and Import a CA Certificate.
If you are importing certificates, you must create a Management Gateway firewall rule that allows the import. Check with your Certificate Authority to find out the source address and port number to use in the rule.