Hello everyone,

A couple of friends out there showed interest in details
of the scenario in subject, and here are the detailed steps to 
do the job. I hope no one gets bored, :
To summarise the scenario, A VPN client connects to PIX using RSA
signatures
and the certificates are issued using MS CA. User authentication is via
MS IAS Radius server.
User names are defined in MS Domain.

1- Install MS CA. I have installed Enterprise root CA.

2- Install SCEP support for MS CA. This is found in Windows 2000 Toolit.
file to use is cepsetup.exe. It is used for PIX to enroll itself to MS
CA.

3- Configure IAS for radius authentication. You need to configure a
client with relevant password, which should 
match the password in PIX. (IAS is available in Windows2000 ) 
Make sure that Radius supports PAP authentication with PIX. Also
configure any remote user as "dial-in allowed"
in MS domain if necessary. 

Now, MS side is ready for certificating and authenticating VPN users...

4- Configure PIX for IPSec VPN configuration. Following are the relevant
lines from my working configuration, but you can check
cisco site for many more examples. I am assuming you know how to
configure PIX for NAT and other basic stuff.
---------------------------------------------------------------------
crypto ipsec transform-set test_transform esp-des esp-sha-hmac 
crypto dynamic-map test_dyn_set 4 set transform-set test_transform
crypto map test_map 20 ipsec-isakmp dynamic test_dyn_set
crypto map test_map client authentication test_radius
crypto map test_map interface outside
isakmp enable outside
isakmp policy 8 authentication rsa-sig
isakmp policy 8 encryption des
isakmp policy 8 hash md5
isakmp policy 8 group 2
isakmp policy 8 lifetime 86400
vpngroup test_vpn address-pool test_pool
vpngroup test_vpn dns-server 172.16.0.2
vpngroup test_vpn wins-server 172.16.0.2
vpngroup test_vpn default-domain example.com
vpngroup test_vpn idle-time 1800
ca identity test_ca 172.16.0.2://certsrv/mscep/mscep.dll 
ca configure test_ca ra 1 20 crloptional

ca authenticate test_ca
ca enroll test_ca CHALLENGE
------------------------------------------------------------------------
-----------

In the enrollment phase, there is one important point : before entering
the LAST line above to PIX,
you should connect to
http://your_local_ca_server://certsrv/mscep/mscep.dll with your browser.
At that page, you will see your CHALLENGE one time password which you
should use in command.

5- Install VPN client. This is straight forward.
6- You should copy certificates from CA to VPN client. There are two
ways : 
Either you prepare a file at VPN client and request a certificate, or
you directly prepare certificate 
at the http://your_local_ca_server/certsrv and copy that cert to VPN
client. At the certificate preparation phase,
you should be carefull with OU (or department) entitiy in certificate
request. This entity should match your vpngroup
definition in your PIX configuration. ( test_vpn in this case) Also if
you are directly issuing cert from web site (rather than 
requesting via file) you should use IPSec Offline template in MS CA. ou
(department) definition is found in that template.
(Leaving as an exercise to find how to add IPSec Offline  template :-)
You should add both CA certificate to VPN client and a personal
certificate. Use certificate manager which comes
with VPN client installation.

7- Lastly, you should create a connection using newly installed
certificates and connect tou your PIX.

I hope this helps to someone who is preparing for certs. As you see, the
procedure is straight forward.
My mistake was to match organization name to vpngroup definition,
instead of OU (department) name when I fail to 
connect. (It took two days blind search of the mistake of my
configuration :-))

Best regards,

Ufuk Yasibeyli.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=45434&t=45434
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to