establish a connection from macOS.

"> establish a connection from macOS.

">

< Knowledge Base

IKEv2 VPN with EAP Authentication from macOS to Vigor Router

Published On: May 16, 2018 

DrayOS support IKEv2 with EAP authentication since firmware version 3.9.0, Vigor3900 and Vigor2960 support it since firmware version 1.4.0. It can make IKEv2 VPN even more secure by additional username and password authentication and certificate verification. This article demonstrates how to create a self-signed certificate for server authentication, set up Vigor Router an IKEv2 VPN server, and how to establish a connection from macOS.

Setup on Vigor Router

1. Go to Certificate Management >> Trust CA Certificate, and click Create.

create rootCA

2. Enter certificate information, select "2048 Bit" for Key Size. Then click Generate.

rootCA info

3. Click Export to download the RootCA

export rootCA

4. Go to Certificate Management >> Local Certificate, and click Generate.

  • Select "Domain Name" for Subject Alternative Name Type
  • Enter router's domain for Domain name and Common Name(CN)
  • Fill out the all the other information for the certificate   
  • Select "2048 Bit" for Key Size
  • Click Generate
create local cert

5. Click Sign for the certificate created.

local cert sign

6. Specify the valid date then click Sign

self sign

7. Go to VPN and Remote Access >> IPsec General Setup select the local certificate created in the previous steps for Certificate for Dial-in

ipsec cert setting

8. Go to VPN and Remote Access >> Remote Dial-in User, click an available index number and edit the profile as follows.

  • Check IKEv2 EAP at Allowed Dial-In Type
  • Give Username and Password
  • Click OK to save.
vpn setting

1. Go to Certificate Management >> Trusted CA, click Build RootCA

  • Enter all the information
  • Select "2048" for Key Size
  • Enter the Passphrase to sign the local certificate
  • Click Apply to save
a screenshot of creating root ca

2. Click Download to export the Root CA, which will need to be installed to the VPN client.

a screenshot of downloading rootCA

3. Go to Certificate Management >> Local Certificate, click Generate:

  • Select "Domain Name" for ID Type and enter the domain of router for ID Value
  • Enter all the information
  • Enter the domain of router for Common Name (CN)
  • Select "2048" for Key Size
  • Select "Enable" for Self Sign
  • Enter the Passphrase of Root CA at CA Key Passphrase
  • Click Apply
a screenshot of creating local cert.

4. Go to User Management >> User Profile to add a user profile:

  • Check Enable
  • Enter Username and Password
  • Select "Enable" for Xauth/EAP at PPTP/L2TP/SSL/OpenVPN Server
a screenshot of user profile for IKEv2 VPN

5. Go to VPN and Remote Access >> VPN Profiles >> IPsec to add a profile:

  • Give a profile name and check Enable
  • Select "Enable" for Remote Dial-In User
  • Enter router's LAN network for Local IP / Subnet Mask
  • Select "IKEv2" for IKE Protocol
  • Select "RSA" for Auth Type and choose the certificate created in previous steps for Local Certificate.
a screenshot of ipsec profile
Connecting from macOS

1. Open Keychain Access, install the RootCA downloaded from the router by dragging it into the window.

keychain

2. Select "Always Trust" for Extensible Authentication (EAP) and IP Security (IPsec)

root keychain allow

3. Go to Network settings and click ' + ' to create a new network:

  • Select "VPN" for Interface
  • Select "IKEv2" for VPN Type
  • Click Create
macOS network

4. Enter the domain of the router for Server Address and Remote ID. Then, click Authentication Settings...

macOS ID

5. Select Username and enter the Username and Password. Then, click OK.

userpass

6. Click Connect to start the VPN connection to the router.

macOS working

Was this helpful?     


Related Articles