Windows 10 IKEv2 clients sent incorrect user certificate to the server
| 本帖最後由 角色 於 2022-6-13 10:51 編輯 
 If you have multiple IKEv2 clients installed on Windows 10, the system will send incorrect client certificate to the remote IKEv2 server. The following can be used to resolve this issue:
 If you find the serial number of ca, for instance, 1234567890複製代碼Now, if you have more than one IKE2 RSA VPN's created, you should specify which certificate Windows should use, because Windows is stupid and can't automatically determine the right certificate for each VPN profile.
1. Open Powershell and enter certlm.msc to open Local Machine Certificate tool
2. Under Trusted Root Certification.. find your certificate and open it with double click
3. Select Details and copy Serial number
4. Go back to Powershell and create new variable with specified serial number
$ca = Get-ChildItem Cert:\LocalMachine\Root\ | ? SerialNumber -EQ <serial number>
5. Check whether variable can find you certificate, it should return something
$ca
6. Add certificate to your created VPN profile
Set-VpnConnection -Name <your VPN profile name> -MachineCertificateIssuerFilter $ca
$ca = Get-ChildItem Cert:\LocalMachine\Root\ | ? SerialNumber -EQ 1234567890
 
 If you create an VPN profile: IKEv2 abc
 Set-VpnConnection -Name "IKEv2 abc" -MachineCertificateIssuerFilter $ca
 
 How to invoke powershell?
 Type powershell in Windows "Type here to search" box
 
 1. Please note that the name for VPN profile must not have a period/fullstop character.
 2. One ca only have one client private key. If more than one client key, the last one user's key is used. In simplicity, when you click both IKEv2 clients, always the last installed client certificate.
 3. The above method is one ca to one client private key. That's why we only choose the ca which is corresponding the client's private key.
 
 Reference:
 https://forum.mikrotik.com/viewt ... mp;p=878614#p878614
 |