Description:

This article describes how to use a LANCOM router to authenticate VPN clients at a Microsoft Active Directory domain using IKEv2-EAP.


Requirements:


Scenario:

VPN clients should be able to use Active Directory to authenticate on a Windows server using a user name and password (MSCHAPv2).


Procedure:

1) Activate the CA and create the certificates on the router using Smart Certificate:

1.1) In LANconfig, open the configuration for the router, navigate to the menu Certificates → Certificate authority (CA) and set a checkmark next to Certificate authority (CA) active.

Then write the configuration back to the router.

1.2) Open the web interface for the router and switch to the menu item Setup Wizards → Manage certificates.

1.3) Click on Create new certificate.

1.4) Adjust the following parameters, click on Enroll (PKCS # 12) and save the certificate:

1.5) In the web interface, change to the menu Extras → Upload Certificate or File.

1.6) Modify the following parameters and then click Start upload:



2) Set up the IKEv2-EAP connection on the LANCOM router:

2.1) Open the configuration of the router in LANconfig, switch to the menu VPN → General and set the drop-down menu for Virtual Private Network to Activated.

2.2) Switch to the menu VPN → IKEv2/IPsec → Authentication.

2.3) Add a new Authentication profile.

2.4) Enter the following parameters:

2.5) Switch to the menu VPN → IKEv2/IPsec → IPv4 addresses.

2.6) Adjust the following parameters to create a new IPv4 address pool:

2.7) Switch to the menu VPN → IKEv2/IPsec → Extended settings.

2.8) Go to the menu RADIUS server.

2.9) Create a new entry and adjust the following parameters:

2.10) Navigate to the menu VPN → IKEv2/IPsec → Connection list.

2.11) Edit the DEFAULT entry.

2.12) Enter the following parameters:

2.13) This concludes the configuration of the VPN connection. Write the configuration back to the router.



3) Setting up network policy services on the Windows server:

3.1) Install the role Network Policy and Access Services on the Windows server.

3.2) Change to the Network Policy Server created in step 3.1.

3.3) Under NPS → RADIUS clients and servers, create a new RADIUS client and adjust the following parameters:

3.4) Under Policies, create a new network policy and give it a descriptive name.

3.5) Change to the Conditions tab and click on Add.

3.6) Click on Add groups to create a new user group. 

 

3.7) Select the user group that should be able to establish a VPN connection.

3.8) Change to the Constraints tab and, under Authentication Methods, select the EAP type Microsoft: Secured password (EAP-MSCHAP v2).

3.9) Switch to the Settings tab. In the menu RADIUS Attributes → Standard, make sure that the attributes are set as Framed Protocol - PPP and Service Type - Framed.

3.10) Import the certificate created in step 1.4 into the Windows certificate store.

A reference to the certificate in the Windows server is not necessary. This is found automatically after the import.

3.11) Right-click on NPS and click on the context-menu entry Start NPS service.

 

3.12) Right click once again on NPS and click on the context-menu entry Register server in Active Directory.

3.13) In the Windows firewall, create a rule that allows incoming data traffic on the UDP port 1812.

      

3.14) Allow the connection and select where the firewall rule is used to allow access.

  

3.15) Give the rule a meaningful name.

3.16) For user group set in step 3.7, add those AD user accounts that are to be authenticated using EAP.

3.17) This concludes the configuration of the network policy services on the Windows server.



4) Exporting the CA certificate from the LANCOM router and importing it into the Advanced VPN Client:

4.1) Connect to the web interface of the LANCOM router, switch to the menu Extras → Download current CA certificate and save the certificate.

4.2) Copy the certificate to the computer that is to establish the VPN connection and save it to the directory C:\ProgramData\LANCOM\Advanced VPN Client\cacerts.

When using client version 6.21, the directory can also be C:\ProgramData\LANCOM\Trusted Access Client\cacerts. This depends on whether you have initially reinstalled version 6.21 or updated from an older version.

4.3) Start the Advanced VPN Client and navigate to the menu Connection → Certificates → Display CA certificates.

4.4) Check whether the Advanced VPN Client recognized the certificate.



5) Setting up an IKEv2-EAP connection with the  Advanced VPN Client:

5.1) In the Advanced VPN Client, navigate to the menu Configuration → Profiles.

5.2) Click on Add / import to create a new VPN connection.

5.3) Select Link to corporate network using IPsec and click on Next.

5.4) Enter a descriptive profile name.

5.5) From the drop-down menu, select the Communication media to be used for establishing the VPN connection.

If you wish to establish the VPN connection with different connection media (e.g. LAN and WLAN), select automatic media detection.

5.6) Under Gateway (tunnel endpoint) enter the public IP address or the DNS name of the router.

5.7) Enter the following parameters:

5.8) As authentication via EAP cannot be configured via the setup wizard, these steps have to be configured manually in the Advanced VPN Client profile (see steps 5.12 - 5.13). Therefore click Next without making changes. 

5.9) For the IP address assignment select the drop-down menu entry IKE Config Mode. This allows the Advanced VPN Client to obtain an IP address from the router when dialing in via VPN.

5.10) Enter the target network to which the VPN connection is to be established. This means that only the data traffic destined for the target network is routed via the VPN tunnel.

Then click on Finish.

For more information on split tunneling, see this knowledge base article .

5.11) Mark the VPN profile created in steps 5.1 – 5.10 and click on Edit.

5.12) Change to the tab IPsec General Settings and set the IKEv2 authentication to EAP.

5.13) Change to the Identities tab and enter the user’s Local Identity as well as the login data

The User ID must be specified in full, including the domain.

5.14) This concludes the configuration of the VPN connection in the Advanced VPN Client. Confirm the manually entered changes by clicking on OK.