Ipsec ikev2 mutual psk how to setup

Started by robertkwild, January 19, 2022, 01:34:45 AM

Previous topic - Next topic
Hi all,

Im trying to set up ipsec ikev2 mutual psk on my opnsense fw

I've looked on Google and can only find how to set up mschapv2

Anyone know of any good how tos to do this

Thanks,
Rob


I don't see ipsec ikev2 mutual psk in the list


I'm not after site to site I'm after site to remote clients


January 21, 2022, 08:03:39 PM #6 Last Edit: January 21, 2022, 08:07:38 PM by robertkwild
thanks

looks like MS windows 10 only supports IKEv2 MSCHAPv2, bit of a bummer as the user needs to install a cert on there machine

January 21, 2022, 08:57:43 PM #7 Last Edit: January 21, 2022, 09:28:52 PM by robertkwild
do i need to import the CA or server cert to the remote user who wants to connect to my ipsec server?

Finally got it working by following the link you sent

One thing I didn't do was to untick block private networks as I thought that was a bad idea

Also I had to import my CA to my remote user otherwise I got a user error when trying to connect to vpn

QuoteFinally got it working by following the link you sent
Great to hear.

QuoteOne thing I didn't do was to untick block private networks as I thought that was a bad idea
Correct. This is only for internal lab without public ip addresses.

QuoteAlso I had to import my CA to my remote user otherwise I got a user error when trying to connect to vpn
Yes. The computer of the remote user want to identify the vpn certificate and for this you have to trust your VPN-CA manually by importing the ca certificate.