====== vpn ikev2 anyconnect with freeradius ====== ===== Introduction ===== ===== Configuring and deploying Cisco IOS certificate server ===== conf t First define the new CA. ip http server crypto pki server ca-server database level names no database archive hash sha512 lifetime certificate 3650 lifetime ca-certificate 7305 23 59 eku server-auth client-auth auto-rollover 365 database url flash:ca exit Now we have a CA operating, we need to generate a certificate for our router to identify itself to clients. crypto key generate rsa general modulus 2048 exportable label ca-server do crypto pki server ca-server start crypto key generate rsa general modulus 2048 exportable label router crypto pki trustpoint router enrollment url http://:80 ip-address fqdn subject-name CN=,OU=user-vpn,O= revocation-check crl rsakeypair router auto-enroll regenerate hash sha512 exit crypto pki authenticate router crypto pki enroll router The certificate server should now have a pending request. do show crypto pki server ca-server requests do crypto pki server ca-server grant The request number is often 1 ===== Client Related Configuration ===== crypto key generate rsa general modulus 2048 exportable label anyconnect crypto pki trustpoint anyconnect enrollment url http://:80 serial-number none fqdn none ip-address none subject-name CN=,OU=user-vpn,O= revocation-check none rsakeypair anyconnect crypto pki authenticate anyconnect crypto pki enroll anyconnect The certificate server should now have a pending request. do show crypto pki server ca-server requests do crypto pki server ca-server grant The request number is often 1 ===== Export And Install Certificates For Client ===== crypto pki export anyconnect pem terminal ===== Crypto Configuration ===== aaa new-model aaa group server radius freeradius server-private auth-port 1812 acct-port 1813 key cisco12 aaa authentication login win7 group freeradius aaa accounting network default start-stop group freeradius crypto ikev2 profile default match identity remote key-id anyconnect_remote_access match identity remote key-id cisco.com identity local dn authentication remote eap query-identity authentication local rsa-sig pki trustpoint anyconnect dpd 60 2 on-demand aaa authentication eap win7 aaa authorization user eap cached aaa accounting eap default virtual-template 1 crypto ipsec transform-set default esp-aes 256 esp-sha-hmac mode tunnel crypto ipsec profile default set ikev2-profile default interface Virtual-Template1 type tunnel ip unnumbered Loopback0 tunnel mode ipsec ipv4 tunnel protection ipsec profile default ip local pool mypool 192.168.1.3 access-list 99 permit any a ggggg a ggggg a gggggg a ===== Introduction ===== ===== Introduction =====