Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Confuse to use Server Certifcate Common name for IPSec Mobile with EAP-MSCHAPv2

    IPsec
    4
    11
    2.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DonnyD
      Donny
      last edited by

      I have confused to use Server Certifcate Common name for IPSec Mobile with EAP-MSCHAPv2 (for Windows Client)
      when I read a pfSense document on a Gold Subscription. The Common name of Server Certifcate have to use or "enter the Common Name as the hostname of the firewall as it exists in DNS".

      Example: my pfSense firewall at General Setup >Hostname: zwolle and Domain: ned.example.com = zwolle.ned.example.com and
      I put "zwolle.ned.example.com" of pfSense firewall hostname in to the Common name of Server Certificate.

      When I try to use Windows 10 Mobile Client  to connect to IPSec VPN with common name "zwolle.ned.example.com". It could not connect because the name could not resolve.
      but when i used real WAN Public IP address I don't have any issue and work find.

      This this is my testing network running Active Directory (domain: ned.example.com)

      Do I have to ask provider to registry the name "zwolle.ned.example.com" (FQDN) of my pfSense firewall hostname to be exists in DNS?

      Thank you

      Donny

      1 Reply Last reply Reply Quote 0
      • B
        brandur
        last edited by

        Yes. You have to register a DNS A-record for that FQDN(which you can't really do in your case, because i doubt that you own the domian example.com)
        Purchase a domain(very cheap these days)  that you can use for your test setup/AD/DNS. For example testzwolle.com.
        Then you have complete control of the public DNS belonging to this domain.

        You have to be able to resolve the FQDN (example: vpn.testzwolle.com) to an IP address.
        The point being if you change the IP in the future, you dont have to re-issue new certificates that points to the new IP, but only change the DNS A-record for "vpn.testzwolle.com".
        It makes future maintenance easier ;)

        I hope what i wrote makes sense  :o

        P.S. This post really dosen't belong under 2.3Beta. I recommend that it gets moved to an appropriate part of the forum.

        SG-4860 w/128GB SSD & 8GB RAM

        1 Reply Last reply Reply Quote 0
        • J
          jonathanbaird
          last edited by

          When I try to use Windows 10 Mobile Client  to connect to IPSec VPN with common name "zwolle.ned.example.com". It could not connect because the name could not resolve.
          but when i used real WAN Public IP address I don't have any issue and work find.

          As this is a test environment, you could always create a forward lookup zone in your DNS server or even edit the host file in this instance. Both should achieve the desired results.

          1 Reply Last reply Reply Quote 0
          • DonnyD
            Donny
            last edited by

            @jonathanbaird:

            When I try to use Windows 10 Mobile Client  to connect to IPSec VPN with common name "zwolle.ned.example.com". It could not connect because the name could not resolve.
            but when i used real WAN Public IP address I don't have any issue and work find.

            As this is a test environment, you could always create a forward lookup zone in your DNS server or even edit the host file in this instance. Both should achieve the desired results.

            I already create a forward lookup zone "zwolle.ned.example.com" in my DNS server Active Directory. and still can not connect

            In forward lookup zone DNS server, Do I have to use public IP address or pfsense LAN IP with "zwolle.ned.example.com"?

            Thank you  very much

            1 Reply Last reply Reply Quote 0
            • J
              jonathanbaird
              last edited by

              @Donny:

              @jonathanbaird:

              When I try to use Windows 10 Mobile Client  to connect to IPSec VPN with common name "zwolle.ned.example.com". It could not connect because the name could not resolve.
              but when i used real WAN Public IP address I don't have any issue and work find.

              As this is a test environment, you could always create a forward lookup zone in your DNS server or even edit the host file in this instance. Both should achieve the desired results.

              I already create a forward lookup zone "zwolle.ned.example.com" in my DNS server Active Directory. and still can not connect

              In forward lookup zone DNS server, Do I have to use public IP address or pfsense LAN IP with "zwolle.ned.example.com"?

              Thank you  very much

              It depends where your pfSense is situated, if it is over a WAN you would use the public IP address. If you PING zwolle.ned.example.com does it resolve to an IP address at all?

              1 Reply Last reply Reply Quote 0
              • K
                kapara
                last edited by

                The only way I got things to work is by assigning both the CA and IKEv2 certificate  with the same fully qualified domain name as is listed under general

                Skype ID:  Marinhd

                1 Reply Last reply Reply Quote 0
                • DonnyD
                  Donny
                  last edited by

                  @kapara:

                  The only way I got things to work is by assigning both the CA and IKEv2 certificate  with the same fully qualified domain name as is listed under general

                  Ok I will try and let you know.

                  Thank you

                  Donny

                  1 Reply Last reply Reply Quote 0
                  • K
                    kapara
                    last edited by

                    All should be the same like this: pfSense.domain.com and you should create an A record in DNS with your domain registrar or with whomever hosts your DNS.

                    I am assuming you are importing the very into the trusted root certificates on the remote machines.

                    Skype ID:  Marinhd

                    1 Reply Last reply Reply Quote 0
                    • DonnyD
                      Donny
                      last edited by

                      Thank you to everyone for help.

                      I will try this weekend from the people who have suggested me about this.

                      Donny

                      1 Reply Last reply Reply Quote 0
                      • DonnyD
                        Donny
                        last edited by

                        Now IPSec Mobile work fine.
                        1. I made a record FQDN my pfsene hostname: zwolle.xxxxx.com with Public WAN IP Address from my ISP in to the domain name system (DNS): xxxxx.com
                        2. At local host computer windows 10, I tested PING to FQDN pfsene hostname > zwolle.xxxxx.com. it is worked.
                        3. Create IPSec CA certificate, the common name whatever
                        4. Create Sever Certificate to Common Name with FQDN pfsene hostname > zwolle.xxxxx.com. For Alternative name, I don't use Max OS, Linux and etc.
                        5. Setup IPSec tunnel Phase 1 My identifier to Distinguished name with "zwolle.xxxxx.com" that is the same common name on Server Certificate.
                        6. Another setup is the same pfsense document wiki
                        7. export only IPSec CA to Windows 10 Client and then installation IPSec CA to Trusted Root Certificate Authorities.
                        8. configuration the propertie of IPSec Connection adapter example at Security tab > IKEv2, Requir encryption and Secured password (EAP-MSCHAPv2) (encryption enable)
                        9. test the connect by use username and password that created on Pre-SharedKeys tab
                        10. finally connected and can ping to local host, copy files and etc.

                        Donny

                        1 Reply Last reply Reply Quote 0
                        • DonnyD
                          Donny
                          last edited by

                          @Donny:

                          Now IPSec Mobile work fine.
                          1. I made a record FQDN my pfsene hostname: zwolle.xxxxx.com with Public WAN IP Address from my ISP in to the domain name system (DNS): xxxxx.com
                          2. At local host computer windows 10, I tested PING to FQDN pfsene hostname > zwolle.xxxxx.com. it is worked.
                          3. Create IPSec CA certificate, the common name whatever
                          4. Create Sever Certificate to Common Name with FQDN pfsene hostname > zwolle.xxxxx.com. For Alternative name, I don't use Max OS, Linux and etc.
                          5. Setup IPSec tunnel Phase 1 My identifier to Distinguished name with "zwolle.xxxxx.com" that is the same common name on Server Certificate.
                          6. Another setup is the same pfsense document wiki
                          7. export only IPSec CA to Windows 10 Client and then installation IPSec CA to Trusted Root Certificate Authorities.
                          8. configuration the propertie of IPSec Connection adapter example at Security tab > IKEv2, Requir encryption and Secured password (EAP-MSCHAPv2) (encryption enable)
                          9. test the connect by use username and password that created on Pre-SharedKeys tab
                          10. finally connected and can ping to local host, copy files and etc.

                          Donny

                          Just want to be sure. the way i did it above, is it correct?

                          Thank you. Donny

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.