

This is an example of IKEv2 configuration: !! IP Pool for IKEv2 Clients In order to see if the certificate contains all the required options, use this show command: ikev2# show crypto pki cert verbose Enroll the IKEv2 server with the CA with this command:.When the trustpoint is configured, you need to: If a Cisco IOS CA server auto grants certificates, the IKEv2 server must be configured with the CA server URL in order to receive a certificate as shown in this example: crypto pki trustpoint IKEv2Įnrollment url subject-name cn=,ou=TAC,o=cisco !! Note: ikev2.p12 is a pkcs12 format certificate that has CA Certificate bundled in it.
#Flex type win7 password
If the CA issues the certificates in Public-Key Cryptography Standards (PKCS) #12 format on the IKEv2 server to the clients and the server, and if the certificate revocation list (CRL) is not reachable or available, it must be configured: crypto pki trustpoint FlexRootCAĮnter this command in order to import the PKCS#12 certificate: copy flash:/Ĭrypto pki import FlexRootCA pkcs12 flash:/ikev2.p12 password

In this case, both 'Server Authentication' and 'Client Authentication' are seen on the server certificate and client certificate respectively, which is acceptable. Typically, the same CA is used to sign both the client and server certificates. The certificate must have the EKU fields set to 'Server Authentication' for Cisco IOS and 'Client Authentication' for the client. Issuer-name cn=,ou=TAC,o=ciscoĬonfigure Cisco IOS Headend Obtain a Certificate
#Flex type win7 software
If you use a Cisco IOS CA server, make sure you use the most recent Cisco IOS Software release, which assigns the EKU. KeyUsage = nonRepudiation, digitalSignature, keyEncipherment, dataEnciphermentĮxtendedKeyUsage = serverAuth, clientAuth Cisco IOS CA Server The 'config' file for the OpenSSL server should have: OpenSSL CA is based on the 'config' file.
#Flex type win7 how to
However, the steps in this section show you how to configure the CA so it can issue certificates for this kind of deployment. This document does not provide detailed steps on how to set up a CA. Note: Use the Command Lookup Tool ( registered customers only) in order to obtain more information on the commands used in this section. Microsoft CA server - In general, this is the preferred option because it can be configured to sign the certificate exactly as desired.Įach of these major steps is explained in detail in the subsequent sections.Cisco IOS CA server - Self-signed certificates cannot be used because of bug CSCuc82575.

For example, on the IKEv2 server, 'Server Auth EKU' is required, while the client certificate needs 'Client Auth EKU.' Local deployments can make use of: The CA should allow you to embed the required Extended Key Usage (EKU) in the certificate.
#Flex type win7 windows 7
There are four major steps in configuration of the Windows 7 built-in IKEv2 client in order to connect a Cisco IOS headend with the utilization of a CA: Refer to Cisco Technical Tips Conventions for information on document conventions. If your network is live, make sure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. The information in this document is based on these hardware and software versions: Note: SUITE-B protocols do not work because the IOS headend does not support SUITE-B with IKEv1, or the Windows 7 IKEv2 Agile VPN client does not currently support SUITE-B with IKEv2.Ĭisco recommends that you have knowledge of these topics: Note: The Adaptive Security Appliance (ASA) now supports IKEv2 connections with the Windows 7 built-in client as of Release 9.3(2). This document describes how to configure the IKEv2 client that is built into Windows 7 in order to connect a Cisco IOS headend with the utilization of a Certificate Authority (CA). FlexVPN is the new Internet Key Exchange version 2 (IKEv2)-based VPN infrastructure on Cisco IOS ® and is meant to be a unified VPN solution.
