Hello Alta Labs Team,I am currently trying to configure an IPsec/IKEv2 VPN client on my Route10 router using AdGuard VPN. The VPN server requires authentication via username/password + CA certificate (in this case, comodo.crt).At the moment, the Route10 GUI does not provide any option to upload or manage trusted CA certificates for VPN connections. I attempted to manually place the certificate in /etc/ipsec.d/certs/ via SSH, but after a router reboot, the file is removed — which I understand is due to the read-only filesystem and firmware design.Feature request: Please add an option in the Route10 web GUI to upload and store custom CA certificates for VPN/IPsec connections. This would allow users to connect to VPN providers that require certificate-based authentication (e.g., IKEv2 with EAP-MSCHAPv2 + CA).Why this is important:
- Many commercial VPN providers (including AdGuard VPN, ProtonVPN, etc.) require a CA certificate for secure IKEv2/IPsec connections.
- Without the ability to upload a CA certificate, these VPN configurations cannot be completed on the Route10.
- Adding this feature would make the Route10 much more versatile for privacy-conscious users.
If needed, I can provide example configuration details and the certificate file for testing.Thank you for considering this request!