Configuring IPsec IKEv2 Remote Access VPN Clients on Windows

Windows 8 and newer easily support IKEv2 VPNs, and Windows 7 can as well though the processes are slightly different. The procedure in this section was performed on Windows 10, but Windows 8 is nearly identical. The procedure to import certificates to Windows 7 can be found on the strongSwan Wiki

Import the CA to the Client PC

  • Export the CA Certificate from AZTCO-FWand download or copy it to the client PC:
    • Navigate to System > Cert Manager, Certificate Authorities tab on AZTCO-FW
    • Click   by the CA to download only the certificate
  • Locate the downloaded file on the client PC (e.g. VPNCA.crt) as seen in Figure Downloaded CA Certificate
  • Double click the CA file
  • Click Install Certificate. . . as shown in Certificate Properties
  • Select Local Machine as shown in Certificate Import Wizard – Store Location
  • Click Next
  • Click Yes at the UAC prompt if it appears
Fig. 11: Downloaded CA Certificate
  • Select Place all Certificates in the following store as shown in Figure Certificate Import Wizard – Browse for the Store
  • Click Browse
  • Click Trusted Root Certification Authorities as shown in Figure Select Certificate Store
  • Click Next
  • Review the details, they should match those in Figure Completing the Certificate Import Wizard
  • Click Finish
  • Click OK
  • Click OK

Setup the VPN Connection

Once the certificate has been properly imported it is time to create the client VPN connection. The exact steps will vary depending on the version of Windows being used by the client, but will be close to the following procedure.

  • Open Network and Sharing Center on the client PC
•    Click Set up a new connection or network
  • Select Connect to a workplace
  • Click Next
  • Select No, create a new connection
  • Click Next
  • Click Use my Internet Connection (VPN)

Enter the IP address or hostname of the server into the Internet address field as shown in Figure Windows IKEv2 VPN Connection Setup Screen

Fig. 12: Certificate Properties
Fig. 13: Certificate Import Wizard – Store Location
Fig. 14: Certificate Import Wizard – Browse for the Store
Fig. 15: Select Certificate Store

Note: This must match what is in the server certificate Common Name or a configured Subject Alternative Name!

  • Enter a Destination Name to identify the connection
  • Click Create

The connection has been added but with several undesirable defaults. For example the type defaults to automatic. A few settings need to be set by hand first to ensure a proper connection is made. Refer to Figure Windows IKEv2 VPN Connection Properties

  • In Network Connections / Adapter Settings in Windows, find the connection created above
  • Right click the connection
  • Click Properties
  • Click the Security tab
  • Set Type of VPN to IKEv2
  • Set Data Encryption to Require Encryption (disconnect if server declines)
  • Set Authentication / Use Extensible Authentication Protocol to Microsoft: Secured password (EAP-MSCHAP v2) (encryption enabled)
  • Compare the values on the screen to those in Figure Windows IKEv2 VPN Connection Properties
  • Click OK

The connection is now ready to use.

Fig. 16: Completing the Certificate Import Wizard
Fig. 17: Windows IKEv2 VPN Connection Setup Screen
Fig. 18: Windows IKEv2 VPN Connection Properties

Disable EKU Check

When the CA and server certificates are made properly on AZTCO-FW 2.2.4 and later, this is not necessary. If an improp- erly generated server certificate must be used for some reason, then the Extended Key Usage check may need to be disabled on Windows. Disabling this check also disables validation of the certificate’s common name and SAN fields, so it is potentially dangerous. Any certificate from the same CA could be used for the server when this is disabled, so proceed with caution.

To disable the extended key usage checks, open up Registry Editor on the Windows client and navigate to the follow- ing location in the client registry:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\Parameters\

In there, add a new DWORD entry named DisableIKENameEkuCheck and set it to 1. A reboot may be required to activate the setting.

Advanced Windows IPsec settings

With Windows 10 PowerShell cmdlet Set-NetIPsecMainModeCryptoSet it is possible to change various ad- vanced settings, like IPsec lifetime:

PS C:\>Set-NetIPsecMainModeCryptoSet -DisplayGroup “AZTCO-FW IPsec” -MaxMinutes 600

This example modifies the maximum IPsec SA lifetime for the “AZTCO-FW IPsec” connection. The default Windows IPsec lifetime is 4800 minutes (eight hours).