FireBrick Road Warrior Windows 7: Difference between revisions

Back up to the FireBrick Road Warrior Category Page
From AAISP Support Site
m (clean up, typos fixed: eg → e.g. (2))
 
(9 intermediate revisions by one other user not shown)
Line 1: Line 1:
<indicator name="RoadW">[[File:Menu-Road-Warrior.svg|link=:Category:FireBrick_IPsec_Road_Warrior|30px|Back up to the FireBrick Road Warrior Category Page]]</indicator>
<indicator name="RoadW">[[File:Menu-Road-Warrior.svg|link=:Category:FireBrick IPsec Road Warrior|30px|Back up to the FireBrick Road Warrior Category Page]]</indicator>
== Windows setup ==
== Windows setup ==


Line 21: Line 21:
The Windows certificate manager should now be started up as follows:
The Windows certificate manager should now be started up as follows:


# Using a command window, or the Start|Run box, execute the command <tt>'''mmc'''</tt> (and answer Yes when asked if you want to allow changes).
# Using a command window, or the '''Start|Run''' box, execute the command <tt>'''mmc'''</tt> (and answer Yes when asked if you want to allow changes).
# Select '''Add/Remove Snap-in''' from the File menu, choose the '''Certificates''' snap-in and add it to selected snap-ins.
# Select '''Add/Remove Snap-in''' from the File menu, choose the '''Certificates''' snap-in and add it to selected snap-ins.
# A dialog will ask if you want to manage certificates for the user account, a service account or computer account. You must select <tt>'''Computer Account'''</tt> here in order to manage the system certificates. If you do not select this, or you start up the certificate manager in some other way (eg using <tt>certmgr.msc</tt>, you will not be able to install the certificate system-wide, and the Windows IPsec subsystem will not find it. Click '''Next'''.
# A dialog will ask if you want to manage certificates for the user account, a service account or computer account. You must select <tt>'''Computer Account'''</tt> here in order to manage the system certificates. If you do not select this, or you start up the certificate manager in some other way (e.g. using <tt>certmgr.msc</tt>, you will not be able to install the certificate system-wide, and the Windows IPsec subsystem will not find it. Click '''Next'''.
# Another dialog will ask which computer to manage. Choose <tt>'''Local computer'''</tt>. Click '''Finish'''
# Another dialog will ask which computer to manage. Choose <tt>'''Local computer'''</tt>. Click '''Finish'''
# Finally click on <tt>'''OK'''</tt> to start the certificate manger snap-in.
# Finally click on <tt>'''OK'''</tt> to start the certificate manger snap-in.
Line 29: Line 29:
===Install the CA certificate===
===Install the CA certificate===
To install the certificate:
To install the certificate:
# Double-click on <tt>Certificates (Local Computer)</tt> in the left pane, to open the certificate store names, and then right-click on <tt>Trusted Root Certification Authorities</tt> in the centre pane.
# Double-click on <tt>'''Certificates (Local Computer)'''</tt> in the left pane, to open the certificate store names
#then right-click on <tt>'''Trusted Root Certification Authorities'''</tt> in the centre pane.
# Select <tt>All Tasks</tt> and then <tt>Import...</tt>
# Select <tt>'''All Tasks'''</tt> and then <tt>'''Import...'''</tt>
# Click <tt>Next</tt> and browse to where you saved the CA .crt file.
# Click <tt>Next</tt> and check that the certificate will be placed in the trusted root store.
# Click <tt>'''Next'''</tt> and '''browse''' to where you saved the CA .crt file. (Usually in your Downloads folder)
#Select the .crt file and click '''Open'''
# Click <tt>Next</tt> again, and then <tt>Finish</tt>.
# Click <tt>'''Next'''</tt> and check that the certificate will be placed in the trusted root store.
# Click <tt>'''Next'''</tt> again, and then <tt>'''Finish'''</tt>.
#A window will pop up saying 'The Import was successful. Click '''OK'''
#You can now close the mmc console, File - Exit. No need to save.


There - wasn't that easy! Thank you Microsoft.
There - wasn't that easy! Thank you Microsoft.
Line 40: Line 44:
Now you need to set up the IPsec network connection details.
Now you need to set up the IPsec network connection details.


# Go to Control Panel and select <tt>Set up a new connection or network</tt>.
# Go to Start - '''Control Panel''' then Network and Internet, then 'View network status and tasks then <tt>'''Set up a new connection or network'''</tt>.
# Select <tt>Connect to a Network</tt> and choose <tt>Connect to a Workplace</tt>.
# Select <tt>Connect to a Network</tt> and choose <tt>'''Connect to a Workplace'''</tt>.
# Click <tt>Next</tt>, select <tt>No, create a new connecton</tt>, <tt>Next</tt>
# Click <tt>Next</tt>, select <tt>No, create a new connecton</tt>, <tt>Next</tt>
# Choose <tt>Use my Internet connection</tt>
# Choose <tt>Use my Internet connection (VPN)</tt>
# Insert the server name (eg <tt>server.example.com</tt>), and choose whatever you like to name the connection (Destination name).
# Insert the server name (e.g. <tt>server.example.com</tt>), and choose whatever you like to name the connection (Destination name). (the Server name needs to match the name in the generated certificate, this is usually a hostname rather than an IP address)
# Select <tt>Don't connect now; ...</tt>
# Select <tt>'''Don't connect now; ...'''</tt>
# You don't need to enter User name and password as it will ask again later
# You don't need to enter User name and password as it will ask again later
# Click on <tt>Create</tt> and then <tt>Close</tt> (Don't connect yet!)
# Click on <tt>'''Create'''</tt> and then <tt>'''Close'''</tt> (Don't connect yet!)
# Back at the Network and Sharing Center dialog, select <tt>Connect to a network</tt>
# Back at the Network and Sharing Center dialog, select <tt>'''Connect to a network'''</tt>
# Right-click the connection you have just created in the pop-up box and select <tt>Properties</tt>
# Right-click the connection you have just created in the pop-up box and select <tt>Properties</tt>
# Select the <tt>Security</tt> tab, and change the Type of VPN to IKEv2.
# Select the <tt>Security</tt> tab, and change the Type of VPN to IKEv2.
Line 60: Line 64:
connection establishes.
connection establishes.


=Windows 10=
==Install the certificate==
#Download DER format
#Click on the file, you may get a Warning (see screenshot)
#The certificate will be opened, Click install certificate
#The 'Welcome to the Certificate Import Wizard' screen opens, select Local Machine, then Next (see screenshot)
#You will be prompted to enter in the Administrator password of the computer, do this.
#Select ' Place all certificates in the following store' (see screenshot)
#Click Browse
#Select 'Trusted Root Certification Authorities', click OK. (see screenshot)
#You'll now be back at the screen you were on previously, Click Next (see screenshot)
# The 'Completing the Certificate Import Wizard' screen shows, Click Finish (see screenshot)
#A little window pops up saying 'The import was successful' (see screenshot)


=Help=
<gallery>
IPsec-Win10-1-OpenCert.PNG|Click on the file, you may get a Warning
IPsec-Win10-2-ReviewCert.PNG|The certificate will be opened, Click install certificate
IPsec-Win10-3-InstallCert.PNG|The 'Welcome to the Certificate Import Wizard' screen opens, select Local Machine, then Next
IPsec-Win10-4-InstallCert-store.PNG|Select ' Place all certificates in the following store', Click Browse
IPsec-Win10-5-InstallCert-trusted.PNG|Select 'Trusted Root Certification Authorities', click OK.
IPsec-Win10-6-InstallCert-finished.PNG|The 'Completing the Certificate Import Wizard' screen shows
IPsec-Win10-7-InstallCert-success.PNG|A little window pops up saying 'The import was successful'
</gallery>


==Error 13801: IKE authentication credentials are unacceptable==
==Configure the VPN==
[[File:Win7-IPsec-error-ike2auth.PNG|framed|none|Error 13801]]
#Click the Start/Windows icon
#Check that the hostname as set in the VPN settings matches the server certificate name, or:
#Go to Settings (see screenshot)
#Double check that you selected 'Computer Account' in the steps above for the installing the certificate in the Certificate Manager
#Click 'Network & Internet'
#Click VPN (see screenshot)
#Click 'Add a VPN connection'
#Enter in the VPN settings eg: (see screenshot)
#*VPN Provider: Windows (built in)
#*Connection name: (What ever you like, eg Office)
#*Server name or address: The IP or host name of your FireBrick
#*VPN type: IKEv2
#*Type of sign-in info: Username and password
#*Username & Password (as set up on the FireBrick). This is optional, you can leave blank and Windows will prompt you for this information each tie you connect.
*Click OK
#Your VPN connection will now be added (see screenshot)


[[Category:FireBrick IPsec Road Warrior|Windows]]
<gallery>
IPsec-Win10-8-addVPN.PNG|Click the Start/Windows icon, Go to Settings, Click 'Network & Internet', Click Add
IPsec-Win10-9-settings.PNG|Enter in the VPN settings
IPsec-Win10-10-VPNsettings.PNG|The VPN will then be added
IPsec-Win10-11-VPNConnect.PNG
IPsec-Win10-12-VPNConnected.PNG
IPsec-Win10-11-VPNConnect.PNG
</gallery>


[[Category:FireBrick_IPsec_Road_Warrior|Windows]]

Latest revision as of 00:00, 15 March 2017

Windows setup

The following instructions were tested on a Windows 7 system. Setup on other versions of Windows will be similar, but the dialogs and messages seen may not be exactly as shown here.

The CA certificate needs to be installed on the Windows machine using an account with administrator privileges.


Download the Certificate

The CA certificate needs to be installed on the Windows machine using an account with administrator privileges.

First, download the CA certificate in DER format to the Windows machine. The easiest way to do this is to@

  1. Use a browser (ed 'Edge') to visit your FireBrick
    1. Go to: Config - Certificates to reach the certificate management page
    2. Click on the Download DER link corresponding to the CA certificate.
    3. Save it in a suitable location on the Windows machine. Note that you must download the certificate in DER format - windows machines do not recognize PEM format. The file will be given the .crt extension.

Start the Windows Certificate Manager

The Windows certificate manager should now be started up as follows:

  1. Using a command window, or the Start|Run box, execute the command mmc (and answer Yes when asked if you want to allow changes).
  2. Select Add/Remove Snap-in from the File menu, choose the Certificates snap-in and add it to selected snap-ins.
  3. A dialog will ask if you want to manage certificates for the user account, a service account or computer account. You must select Computer Account here in order to manage the system certificates. If you do not select this, or you start up the certificate manager in some other way (e.g. using certmgr.msc, you will not be able to install the certificate system-wide, and the Windows IPsec subsystem will not find it. Click Next.
  4. Another dialog will ask which computer to manage. Choose Local computer. Click Finish
  5. Finally click on OK to start the certificate manger snap-in.

Install the CA certificate

To install the certificate:

  1. Double-click on Certificates (Local Computer) in the left pane, to open the certificate store names
  2. then right-click on Trusted Root Certification Authorities in the centre pane.
  3. Select All Tasks and then Import...
  4. Click Next and browse to where you saved the CA .crt file. (Usually in your Downloads folder)
  5. Select the .crt file and click Open
  6. Click Next and check that the certificate will be placed in the trusted root store.
  7. Click Next again, and then Finish.
  8. A window will pop up saying 'The Import was successful. Click OK
  9. You can now close the mmc console, File - Exit. No need to save.

There - wasn't that easy! Thank you Microsoft.

Set up the VPN Network Connection

Now you need to set up the IPsec network connection details.

  1. Go to Start - Control Panel then Network and Internet, then 'View network status and tasks then Set up a new connection or network.
  2. Select Connect to a Network and choose Connect to a Workplace.
  3. Click Next, select No, create a new connecton, Next
  4. Choose Use my Internet connection (VPN)
  5. Insert the server name (e.g. server.example.com), and choose whatever you like to name the connection (Destination name). (the Server name needs to match the name in the generated certificate, this is usually a hostname rather than an IP address)
  6. Select Don't connect now; ...
  7. You don't need to enter User name and password as it will ask again later
  8. Click on Create and then Close (Don't connect yet!)
  9. Back at the Network and Sharing Center dialog, select Connect to a network
  10. Right-click the connection you have just created in the pop-up box and select Properties
  11. Select the Security tab, and change the Type of VPN to IKEv2.
  12. EAP-MSCHAPv2 should already be selected.
  13. Click OK

You should now be ready to connect - select Connect to a network again, click on the connection and choose Connect. If not already saved, you'll use the username and password as set up in the EAP Identity on the FireBrick (in this example, we had set up a user of fred with a password)

You probably want to change the type of network to Work Network after the connection establishes.


Help

Error 13801: IKE authentication credentials are unacceptable

Error 13801
  1. Check that the hostname as set in the VPN settings matches the server certificate name, or:
  2. Double check that you selected 'Computer Account' in the steps above for the installing the certificate in the Certificate Manager