FireBrick Road Warrior Windows 7: Difference between revisions

Back up to the FireBrick Road Warrior Category Page
From AAISP Support Site
m (clean up, typos fixed: eg → e.g. (2))
 
Line 1: Line 1:
<indicator name="RoadW">[[File:Menu-Road-Warrior.svg|link=:Category:FireBrick_IPsec_Road_Warrior|30px|Back up to the FireBrick Road Warrior Category Page]]</indicator>
<indicator name="RoadW">[[File:Menu-Road-Warrior.svg|link=:Category:FireBrick IPsec Road Warrior|30px|Back up to the FireBrick Road Warrior Category Page]]</indicator>
== Windows setup ==
== Windows setup ==


Line 23: Line 23:
# Using a command window, or the '''Start|Run''' box, execute the command <tt>'''mmc'''</tt> (and answer Yes when asked if you want to allow changes).
# Using a command window, or the '''Start|Run''' box, execute the command <tt>'''mmc'''</tt> (and answer Yes when asked if you want to allow changes).
# Select '''Add/Remove Snap-in''' from the File menu, choose the '''Certificates''' snap-in and add it to selected snap-ins.
# Select '''Add/Remove Snap-in''' from the File menu, choose the '''Certificates''' snap-in and add it to selected snap-ins.
# A dialog will ask if you want to manage certificates for the user account, a service account or computer account. You must select <tt>'''Computer Account'''</tt> here in order to manage the system certificates. If you do not select this, or you start up the certificate manager in some other way (eg using <tt>certmgr.msc</tt>, you will not be able to install the certificate system-wide, and the Windows IPsec subsystem will not find it. Click '''Next'''.
# A dialog will ask if you want to manage certificates for the user account, a service account or computer account. You must select <tt>'''Computer Account'''</tt> here in order to manage the system certificates. If you do not select this, or you start up the certificate manager in some other way (e.g. using <tt>certmgr.msc</tt>, you will not be able to install the certificate system-wide, and the Windows IPsec subsystem will not find it. Click '''Next'''.
# Another dialog will ask which computer to manage. Choose <tt>'''Local computer'''</tt>. Click '''Finish'''
# Another dialog will ask which computer to manage. Choose <tt>'''Local computer'''</tt>. Click '''Finish'''
# Finally click on <tt>'''OK'''</tt> to start the certificate manger snap-in.
# Finally click on <tt>'''OK'''</tt> to start the certificate manger snap-in.
Line 48: Line 48:
# Click <tt>Next</tt>, select <tt>No, create a new connecton</tt>, <tt>Next</tt>
# Click <tt>Next</tt>, select <tt>No, create a new connecton</tt>, <tt>Next</tt>
# Choose <tt>Use my Internet connection (VPN)</tt>
# Choose <tt>Use my Internet connection (VPN)</tt>
# Insert the server name (eg <tt>server.example.com</tt>), and choose whatever you like to name the connection (Destination name). (the Server name needs to match the name in the generated certificate, this is usually a hostname rather than an IP address)
# Insert the server name (e.g. <tt>server.example.com</tt>), and choose whatever you like to name the connection (Destination name). (the Server name needs to match the name in the generated certificate, this is usually a hostname rather than an IP address)
# Select <tt>'''Don't connect now; ...'''</tt>
# Select <tt>'''Don't connect now; ...'''</tt>
# You don't need to enter User name and password as it will ask again later
# You don't need to enter User name and password as it will ask again later
Line 72: Line 72:
#Double check that you selected 'Computer Account' in the steps above for the installing the certificate in the Certificate Manager
#Double check that you selected 'Computer Account' in the steps above for the installing the certificate in the Certificate Manager


[[Category:FireBrick_IPsec_Road_Warrior|Windows]]
[[Category:FireBrick IPsec Road Warrior|Windows]]

Latest revision as of 00:00, 15 March 2017

Windows setup

The following instructions were tested on a Windows 7 system. Setup on other versions of Windows will be similar, but the dialogs and messages seen may not be exactly as shown here.

The CA certificate needs to be installed on the Windows machine using an account with administrator privileges.


Download the Certificate

The CA certificate needs to be installed on the Windows machine using an account with administrator privileges.

First, download the CA certificate in DER format to the Windows machine. The easiest way to do this is to@

  1. Use a browser (ed 'Edge') to visit your FireBrick
    1. Go to: Config - Certificates to reach the certificate management page
    2. Click on the Download DER link corresponding to the CA certificate.
    3. Save it in a suitable location on the Windows machine. Note that you must download the certificate in DER format - windows machines do not recognize PEM format. The file will be given the .crt extension.

Start the Windows Certificate Manager

The Windows certificate manager should now be started up as follows:

  1. Using a command window, or the Start|Run box, execute the command mmc (and answer Yes when asked if you want to allow changes).
  2. Select Add/Remove Snap-in from the File menu, choose the Certificates snap-in and add it to selected snap-ins.
  3. A dialog will ask if you want to manage certificates for the user account, a service account or computer account. You must select Computer Account here in order to manage the system certificates. If you do not select this, or you start up the certificate manager in some other way (e.g. using certmgr.msc, you will not be able to install the certificate system-wide, and the Windows IPsec subsystem will not find it. Click Next.
  4. Another dialog will ask which computer to manage. Choose Local computer. Click Finish
  5. Finally click on OK to start the certificate manger snap-in.

Install the CA certificate

To install the certificate:

  1. Double-click on Certificates (Local Computer) in the left pane, to open the certificate store names
  2. then right-click on Trusted Root Certification Authorities in the centre pane.
  3. Select All Tasks and then Import...
  4. Click Next and browse to where you saved the CA .crt file. (Usually in your Downloads folder)
  5. Select the .crt file and click Open
  6. Click Next and check that the certificate will be placed in the trusted root store.
  7. Click Next again, and then Finish.
  8. A window will pop up saying 'The Import was successful. Click OK
  9. You can now close the mmc console, File - Exit. No need to save.

There - wasn't that easy! Thank you Microsoft.

Set up the VPN Network Connection

Now you need to set up the IPsec network connection details.

  1. Go to Start - Control Panel then Network and Internet, then 'View network status and tasks then Set up a new connection or network.
  2. Select Connect to a Network and choose Connect to a Workplace.
  3. Click Next, select No, create a new connecton, Next
  4. Choose Use my Internet connection (VPN)
  5. Insert the server name (e.g. server.example.com), and choose whatever you like to name the connection (Destination name). (the Server name needs to match the name in the generated certificate, this is usually a hostname rather than an IP address)
  6. Select Don't connect now; ...
  7. You don't need to enter User name and password as it will ask again later
  8. Click on Create and then Close (Don't connect yet!)
  9. Back at the Network and Sharing Center dialog, select Connect to a network
  10. Right-click the connection you have just created in the pop-up box and select Properties
  11. Select the Security tab, and change the Type of VPN to IKEv2.
  12. EAP-MSCHAPv2 should already be selected.
  13. Click OK

You should now be ready to connect - select Connect to a network again, click on the connection and choose Connect. If not already saved, you'll use the username and password as set up in the EAP Identity on the FireBrick (in this example, we had set up a user of fred with a password)

You probably want to change the type of network to Work Network after the connection establishes.


Help

Error 13801: IKE authentication credentials are unacceptable

Error 13801
  1. Check that the hostname as set in the VPN settings matches the server certificate name, or:
  2. Double check that you selected 'Computer Account' in the steps above for the installing the certificate in the Certificate Manager