Description:

This document describes how to use certificates created by LANCOM Smart Certificate for a certificate-based IKEv2-VPN client connection.

This scenario is particularly useful if you require a password to be entered before establishing a VPN connection with the LANCOM Advanced VPN Client.

Requirements:

Procedure:

1. Enable the certificate authority (CA) function in the LANCOM router:

In this example configuration, the LANCOM router acts as the CA for creating the certificates (Smart Certificate feature). If you wish to use certificates from another CA, you do not have to use the CA in the LANCOM router and you can skip this step of the configuration.

1.1) In LANconfig, open the configuration dialog for the LANCOM router and switch to the menu item Certificates → Cert. authority (CA).

Image of a LANCOM device's management interface showing a variety of settings including SW LAN Controller, CA hierarchy, certificate handling, and interfaces for configuring system management and security features.

1.2) Set a check mark for the option Certificate authority (CA) active. The LANCOM router functions as the root certificate authority (root CA).

For this configuration example we leave all the other parameters with their preset values.


2. Upload the router certificate to the LANCOM router:

2.1) Right-click on the LANCOM router in LANconfig and select the option Configuration management → Upload certificate or file.

Screenshot of a complex LANCOM management tool interface showing various configuration options including device settings, network monitoring, and system updates.

2.2) In the following dialog select the certificate file intended for the LANCOM router.

2.3) In the certificate type field, select a VPN container.

2.4) In the Cert. password box enter the password for the certificate file. Click on Open to start the upload.


3. Configure the certificate-based VPN client connection on the LANCOM router:

3.1) Start the Setup Wizard in LANconfig and select the option Provide remote access (RAS, VPN).

Screenshot of the LANCOM VA setup wizard interface showing options to configure basic settings, internet access, VoIP, dynamic DNS, VoIP provider access, and security settings.

3.2) Select the option IKEv2.

Image displaying the user interface of the Setup Wizard for LANCOM VAIcf, outlining steps to configure remote access via RAS VPN, focusing on securing connections with a VPN and the selection of exchange modes.

3.3) The connection should be established with the LANCOM Advanced VPN Client. Disable the 1-Click VPN option

A screenshot of the Setup Wizard interface for configuring a LANCOM Advanced VPN client with options for remote VPN access and automated settings inference from the current device configuration.

3.4) In this example, we do not use IPsec-over-HTTPS.

An image of a configuration menu for LANCOM VPN software, showcasing options for remote access setup and encapsulation of IPSec in TCP packets, highlighting specifics like IPSec over HTTPS for passing through restrictive firewalls and its limitations with VoIP connections.

3.5) Enter a name for the new VPN connection.

Screenshot of a configuration menu for setting up a LANCOM virtual access interface, including fields for VPN name and remote access settings.

3.6) Enter the public IP address or public DNS address of the LANCOM router.

Screenshot of a configuration menu of a VPN setup wizard, highlighting sections for remote access settings and specifying IP or FQDN for VPN client access.

3.7) Enter any values into this dialog, as they will later be manually replaced in the configuration of the LANCOM router by the certificate authentication parameters.

Image of a VPN setup wizard interface showing fields for entering a user identity and a pre-shared key for establishing a VPN connection.

3.8) As the LANCOM Advanced VPN Client supports Config Mode, there is no need to enter an IP address into this dialog.

Image displaying a configuration menu for setting up a LANCOM virtual access VPN, including fields for entering a unique IP address, network details, and netmask with additional VPN client settings.

3.9) Communication should be allowed with all IP addresses in the local network.

3.10) The VPN access credentials should be saved as an import file for the LANCOM Advanced VPN Client (*.ini file).

A screenshot of a LANCOM advanced VPN client setup wizard interface, displaying options for storing and exporting VPN profiles, sending profile via email, and security advisories.

3.11) Click on Finish to write the configuration back to the LANCOM router. The *.ini file generated is stored on your PC.

A screenshot of the setup wizard interface for LANCOM VAI, displaying options to enter data for a remote access account with 'Back', 'Finish', and 'Cancel' buttons.

3.12) Open the configuration of the LANCOM router in LANconfig and navigate to VPN → IKEv2/IPsec → Authentication.

3.13) Select the available entry for the certificate-based VPN client connection (in this case: CLIENT_CERT).

  • Set the parameters for local and remote authentication for each entry to the values Digital signature and 1 Distinguished Name.
  • Set each Local dig. signature profile to DEFAULT-RSA-PKCS.
  • As the local identity, enter the name of the certificate in the LANCOM router.
  • As the remote identity, enter the name of the certificate in the VPN client.
  • As the Local certificate, select the VPN Container you used in step 2.3.

Image showing a fragment of a technical user interface with various configuration options and menu items.

3.14) Write the configuration back to the LANCOM router.


4.  Installing the client certificate in Windows:

4.1) Double-click to open the *.p12 file of the client certificate.

4.2) Select the storage location used by the current user.

4.3.) Click on Next.

4.4) Enter the password for the client certificate. Leave the import options in their default settings.

4.5) The certificate store must be selected automatically by Windows.

4.6) Click Next and conclude the certificate import.


5. Importing the client certificate into the LANCOM Advanced VPN Client:

5.1) In the LANCOM Advanced VPN Client, open the option Configuration → Certificates.

An image displaying the user interface of LANCOM Advanced VPN Client, featuring various menu options such as Connection Profiles, VPN Bypass, Quality of Service, Logon Options, and other configurable settings.

5.2) Create a new certificate configuration using the Add button

Screenshot showing a user interface for managing different types of certificates, including 'UserCertificate' and 'ComputerCertificate'.

5.3) Enter a name for the new certificate configuration.

  • In the Certificate field, select the option CSP User Certificate Store
  • The fields Subject CN and Issue CN must be left blank.

Screenshot of a configuration setting titled Client Certificate, with an option to PIN request at each connection.

5.4) Switch to the tab Computer Certificate.

  • Set the Certificate field to Computer Certificate Store.
  • The field Subject CN must be set to the common name of the client certificate (in this case: CN=Client)
  • Leave the Issue CN field blank.

5.5) Save the configuration with OK.

Image of a computer interface showing options for certificates management, including client certificates, PIN policies, certificate renewal, and a computer certificate store settings.


6. Import the *.ini file and the configuration of the VPN connection into the LANCOM Advanced VPN Client:

6.1) In the LANCOM Advanced VPN Client open the option Configuration → Profiles, and click Add/import.

Screenshot of a user interface displaying VPN profiles with the option to show all profiles.

6.2) Select the option Profile import.

Screenshot of a LANCOM configuration menu displaying options for connecting to a corporate network using IPsec and linking to the Internet, with a profile import feature.

6.3) Set the path to the VPN profile file that was created in step 3.10.

A screenshot of the 'NewProfileWizard' interface in LANCOM showing the 'Import File' section where a user is prompted to enter the full path and filename for importing a file.

6.4) Click on Finish to conclude the import.

6.5) Select the imported profile and then click Next.

6.6) Switch to the menu IPsec General Settings and set IKEv2 Authentication to the value Certificate.

Screenshot of a user interface displaying IPsec general settings and other assorted configuration options.

6.7) Switch to the menu identity and set the local identity type to the value ASN1 Distinguished Name.

6.8) The ID is set to the option from certificate field “cn”.

6.9) You need to set the Certificate configuration to the certificate configuration created in step 5.5 (in this case: VPN_Client).

An image displaying a partial view of a technical user interface involving Extended Authentication and related settings.

6.10) This concludes the configuration. Close the dialogs of the LANCOM Advanced VPN Client with OK.

After a successful configuration, the  Advanced VPN Client shows the icons for Smartcard and PIN.