Files
windows-itpro-docs/windows/security/threat-protection/windows-firewall/securing-end-to-end-ipsec-connections-by-using-ikev2.md
John Liu 9444d5ca5b add new issues for multiple window platforms (#882)
* Update windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

* Update windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update policy-csp-update.md

In 1903 we deprecated the value of 32 and combined Semi-Annual Channel (Targeted) with the Semi-Annual Channel. We need to communicate this change in the documentation.

* chore: Replace tab after unorderd list marker

* Update windows/security/identity-protection/credential-guard/credential-guard-manage.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

* markdown syntex issue

There was a syntex issue with formating. It has been fixed.

* Update MDM Path

https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowflash

Issue 
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3553

* HTML Tag fix

There was issue with HTML tag in live 203 and has been fixed.

* Update windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/deployment/update/waas-overview.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

* Update waas-overview.md

* Update hello-hybrid-cert-whfb-settings-policy.md

removing extra "want"

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update hello-planning-guide.md

* Update windows/deployment/update/waas-delivery-optimization-reference.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/deployment/update/waas-delivery-optimization-reference.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

* Update whiteboard-collaboration.md

* Update hello-key-trust-policy-settings.md

* Update integrate-configuration-manager-with-mdt.md

* Update use-system-center-configuration-manager-to-manage-devices-with-semm.md

* Update start-layout-xml-desktop.md

Added syntax and note

* remove reference about Windows 10 Pro 

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3255

* Fixed Typo

* Adding Question to FAQ

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4288

* Adding Question to FAQ

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4288

* Updated with TVM refs

* Emphasize Device Sync

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4401

* Update windows/security/threat-protection/windows-defender-atp/configure-mssp-support.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/windows-defender-atp/configure-mssp-support.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* fix: MD005/list-indent

Inconsistent indentation for list items at the same level

* Update integrate-configuration-manager-with-mdt.md

* Update use-system-center-configuration-manager-to-manage-devices-with-semm.md

* Update enable-admx-backed-policies-in-mdm.md

Added two links to notes.

* Update windows/configuration/start-layout-xml-desktop.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update index.md

Corrected typo: 'annd' to 'and'

* Update windows/security/identity-protection/hello-for-business/hello-planning-guide.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update devices/surface-hub/whiteboard-collaboration.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/identity-protection/hello-for-business/hello-key-trust-policy-settings.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update windows/security/threat-protection/auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Create troubleshooting-agpm40-upgrades.md

* Update TOC.md

Addition of Troubleshooting AGPM Upgrades top-level link

* Update windows-10-upgrade-paths.md

* Update white-glove.md

Removed a singular reference to WG and replaced with white glove

* remove last 3 blocks in IT Admin

* Fixes typo issue in line 47

Closes #4557

* Update metadata to replace non-existent author

* Update index.md

Typo - corrected 'Bitlocker' to 'BitLocker'

* Rename windows/security/threat-protection/windows-defender-atp/configure-mssp-support.md to windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md

* Update hello-planning-guide.md

* Update configure-wd-app-guard.md

* Update configure-wd-app-guard.md

* Update configure-wd-app-guard.md

* Update kiosk-xml.md

* Update kiosk-xml.md

* Update waas-servicing-differences.md

Removed double use of the word critical

* Minor update to properly reflect supported macros

* Update applocker-csp.md

* Update kiosk-xml.md

* Update applocker-csp.md

* updated image needed 

I don't have rights to upload a new file (the updated error image)

More details here: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/2489

* MDOP May 2019 Servicing Release: new Hotfix Link

Microsoft Desktop Optimization Pack May 2019 Servicing Release.
Replaces the outdated MDOP link to July 2018 Servicing Release.

Thanks to CaptainUnlikely for the Technet blogs information update.

Closes #4574

* Creating a WDATP alert requires recommendedAction

Otherwise the following will be returned by the API:

```
{"error":{"code":"BadRequest","message":"recommendedAction argument is missing"}}
```

* Update windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update guidelines-for-assigned-access-app.md

* Corrected typo

 Changed "ConnecionSuccess" to "ConnectionSuccess

* Update install-wd-app-guard.md

* Update self-deploying.md

Added additional links.

* Update install-wd-app-guard.md

* Update hello-hybrid-cert-trust-devreg.md

* Update waas-delivery-optimization.md

fixed typo

* Fixed a small typo

Changed "wwitches" to "switches".

* Update for the month June 2019

I have added the content for surface hub based on an update KB4503289. There was no update released for a hub for the month of July. 

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4586

* Update devices/surface-hub/surface-hub-update-history.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

* typo

typo the Action Sataus column instead of the Action Status column

* Correcting small mistake on which version of Win10 displays MBEC

Correcting initial mistake when changed docs.

* Updated links

Hotlink for configuring MTP integration and API support was missing and has been updated.

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4569

* Resolves #4620 - typo in command line

Issue #4620

Set-ProcesMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode
should be
Set-ProcessMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode

* HTML to MarkDown in hello-hybrid-aadj-sso-cert.md

This is a combined effort to alleviate a translation bug as well as
improving the MarkDown codestyle in this document, both for the English
(en-us) version of the document as well as the translated versions.

This change should in theory close the issue tickets #3451 and #3453
after the scripted translation process has been re-run on this document.

This solution is based on a user discussion in issue ticket #4589 .

* Update windows/deployment/windows-autopilot/self-deploying.md

Co-Authored-By: Nicole Turner <39884432+nenonix@users.noreply.github.com>

* Update index.md

* Update waas-configure-wufb.md

* Update hello-features.md

Removes \ typo

* Update windows-analytics-get-started.md

adding IE site discovery to GDPR blurb

* Update sideload-apps-in-windows-10.md

* Update upgrade-readiness-deployment-script.md

replacing support email with official support channels

* missing bold on GUI element

* formatting again - italicize typed word

* fixing warnings

* restored missing art, somehow

* CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_2019080917545405 (#881)
2019-08-09 19:17:27 -07:00

9.0 KiB
Raw Blame History

title, description, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.localizationpriority, author, manager, audience, ms.collection, ms.topic, ms.date, ms.reviewer, ms.author
title description ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.localizationpriority author manager audience ms.collection ms.topic ms.date ms.reviewer ms.author
Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 (Windows 10) Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012 w10 deploy library security medium dansimp dansimp ITPro M365-security-compliance conceptual 08/17/2017 dansimp

Securing End-to-End IPsec connections by using IKEv2

Applies to

  • Windows 10
  • Windows Server 2016

IKEv2 offers the following:

  • Supports IPsec end-to-end transport mode connections

  • Provides interoperability for Windows with other operating systems that use IKEv2 for end-to-end security

  • Supports Suite B (RFC 4869) requirements

  • Coexists with existing policies that deploy AuthIP/IKEv1

  • Uses the Windows PowerShell interface exclusively for configuration. You cannot configure IKEv2 through the user interface.

  • Uses certificates for the authentication mechanism

You can use IKEv2 as a virtual private network (VPN) tunneling protocol that supports automatic VPN reconnection. IKEv2 allows the security association to remain unchanged despite changes in the underlying connection.

In this document

Note:  This topic includes sample Windows PowerShell cmdlets. For more info, see How to Run a Windows PowerShell Cmdlet.

Prerequisites

These procedures assume that you already have a public key infrastructure (PKI) in place for device authentication.

Devices joined to a domain

The following Windows PowerShell script establishes a connection security rule that uses IKEv2 for communication between two computers (CLIENT1 and SERVER1) that are joined to the corp.contoso.com domain as shown in Figure 1.

the contoso corporate network

Figure 1 The Contoso corporate network

This script does the following:

  • Creates a security group called IPsec client and servers and adds CLIENT1 and SERVER1 as members.

  • Creates a Group Policy Object (GPO) called IPsecRequireInRequestOut and links it to the corp.contoso.com domain.

  • Sets the permissions to the GPO so that they apply only to the computers in IPsec client and servers and not to Authenticated Users.

  • Indicates the certificate to use for authentication.

    Important:  The certificate parameters that you specify for the certificate are case sensitive, so make sure that you type them exactly as specified in the certificate, and place the parameters in the exact order that you see in the following example. Failure to do so will result in connection errors.

  • Creates the IKEv2 connection security rule called My IKEv2 Rule.

powershell logoWindows PowerShell commands

Type each cmdlet on a single line, even though they may appear to wrap across several lines because of formatting constraints.

# Create a Security Group for the computers that will get the policy
$pathname = (Get-ADDomain).distinguishedname
New-ADGroup -name "IPsec client and servers" -SamAccountName "IPsec client and servers" `
-GroupCategory security -GroupScope Global -path $pathname

# Add test computers to the Security Group
$computer = Get-ADComputer -LDAPFilter "(name=client1)"
Add-ADGroupMember -Identity "IPsec client and servers" -Members $computer
$computer = Get-ADComputer -LDAPFilter "(name=server1)"
Add-ADGroupMember -Identity "IPsec client and servers" -Members $computer

# Create and link the GPO to the domain
$gpo = New-gpo IPsecRequireInRequestOut
$gpo | new-gplink -target "dc=corp,dc=contoso,dc=com" -LinkEnabled Yes

# Set permissions to security group for the GPO
$gpo | Set-GPPermissions -TargetName "IPsec client and servers" -TargetType Group -PermissionLevel GpoApply -Replace
$gpo | Set-GPPermissions -TargetName "Authenticated Users" -TargetType Group -PermissionLevel None -Replace

#Set up the certificate for authentication
$gponame = "corp.contoso.com\IPsecRequireInRequestOut"
$certprop = New-NetIPsecAuthProposal -machine -cert -Authority "DC=com, DC=contoso, DC=corp, CN=corp-APP1-CA"
$myauth = New-NetIPsecPhase1AuthSet -DisplayName "IKEv2TestPhase1AuthSet" -proposal $certprop PolicyStore GPO:$gponame

#Create the IKEv2 Connection Security rule
New-NetIPsecRule  -DisplayName "My IKEv2 Rule" -RemoteAddress any -Phase1AuthSet $myauth.InstanceID `
-InboundSecurity Require -OutboundSecurity Request -KeyModule IKEv2 -PolicyStore GPO:$gponame

Devices not joined to a domain

Use a Windows PowerShell script similar to the following to create a local IPsec policy on the devices that you want to include in the secure connection.

Important:  The certificate parameters that you specify for the certificate are case sensitive, so make sure that you type them exactly as specified in the certificate, and place the parameters in the exact order that you see in the following example. Failure to do so will result in connection errors.

powershell logoWindows PowerShell commands

Type each cmdlet on a single line, even though they may appear to wrap across several lines because of formatting constraints.

#Set up the certificate
$certprop = New-NetIPsecAuthProposal -machine -cert -Authority "DC=com, DC=contoso, DC=corp, CN=corp-APP1-CA"
$myauth = New-NetIPsecPhase1AuthSet -DisplayName "IKEv2TestPhase1AuthSet" -proposal $certprop

#Create the IKEv2 Connection Security rule
New-NetIPsecRule  -DisplayName "My IKEv2 Rule" -RemoteAddress any -Phase1AuthSet $myauth.InstanceID `
-InboundSecurity Require -OutboundSecurity Request -KeyModule IKEv2

Make sure that you install the required certificates on the participating computers.

Note:

  • For local devices, you can import the certificates manually if you have administrator access to the computer. For more info, see Import or export certificates and private keys.
  • You need a root certificate and a computer certificate on all devices that participate in the secure connection. Save the computer certificate in the Personal/Certificates folder.
  • For remote devices, you can create a secure website to facilitate access to the script and certificates.

Troubleshooting

Follow these procedures to verify and troubleshoot your IKEv2 IPsec connections:

Use the Windows Defender Firewall with Advanced Security snap-in to verify that a connection security rule is enabled.

  1. Open the Windows Defender Firewall with Advanced Security console.

  2. In the left pane of the Windows Defender Firewall with Advanced Security snap-in, click Connection Security Rules, and then verify that there is an enabled connection security rule.

  3. Expand Monitoring, and then click Connection Security Rules to verify that your IKEv2 rule is active for your currently active profile.

Use Windows PowerShell cmdlets to display the security associations.

  1. Open a Windows PowerShell command prompt.

  2. Type get-NetIPsecQuickModeSA to display the Quick Mode security associations.

  3. Type get-NetIPsecMainModeSA to display the Main Mode security associations.

Use netsh to capture IPsec events.

  1. Open an elevated command prompt.

  2. At the command prompt, type netsh wfp capture start.

  3. Reproduce the error event so that it can be captured.

  4. At the command prompt, type netsh wfp capture stop.

    A wfpdiag.cab file is created in the current folder.

  5. Open the cab file, and then extract the wfpdiag.xml file.

  6. Open the wfpdiag.xml file with your an XML viewer program or Notepad, and then examine the contents. There will be a lot of data in this file. One way to narrow down where to start looking is to search the last “errorFrequencyTable” at the end of the file. There might be many instances of this table, so make sure that you look at the last table in the file. For example, if you have a certificate problem, you might see the following entry in the last table at the end of the file:

    <item>
      <error>ERROR_IPSEC_IKE_NO_CERT</error>
      <frequency>32</frequency>
    </item>
    

    In this example, there are 32 instances of the ERROR_IPSEC_IKE_NO_CERT error. So now you can search for ERROR_IPSEC_IKE_NO_CERT to get more details regarding this error.

You might not find the exact answer for the issue, but you can find good hints. For example, you might find that there seems to be an issue with the certificates, so you can look at your certificates and the related cmdlets for possible issues.

See also