Code: Select all
no policy found/generated
can't get private key
got fatal error: AUTHENTICATION_FAILED
I have already create an IPsec group, and set my identity's "Policy Template Group" to this group. What is missing?
no policy found/generated
can't get private key
got fatal error: AUTHENTICATION_FAILED
/ip ipsec identity add auth-method=pre-shared-key secret=<password> remote-id=user-fqdn:<username>
I've compared the DHCPACK response to the DHCPINFORM from a 6.47.10 responder identifying the initiator by certificate and the DHCPACK response to the DHCPINFORM from a 7.2rc3 responder identifyng the initiator by EAP. The initiator was the same Win10 PC with two different VPN profiles. The contents of the DHCPACK is the same except items that must differ due to the topology. So I suspect the Windows PC gets scared by some particular values, which may be related to the fact that the 7.2rc3 machine is a CHR running on Hyper-V on the PC itself. So there is a chance that in a real life setup, the connection will survive.Regarding UN/PW for connection, I'm running routerOS 6.49, I think upgrading the OS is more than I can handle at this point. But I'll keep an eye on when that's working. I don't mind distributing my own CA cert to users, but creating a per user cert is painful. For now I think I'll create one cert for each group of users.
Are you talking about /ip ipsec identity (auth-mode=eap-radius, eap-methods) or about the User Manager? I had no need to run 6.49.2 yet, but I haven't noticed anything related to User Manager in the changelog since 6.39 until 7.1. And the User Manager of 6.x did not support EAP.You say EAP is not supported on ROS v6, but I do see these options on 6.49.2 Do you mean they don’t function?
It indeed does. I've realized that an old Sextant was collecting dust in my attic, so I've made it a 7.1.2 User Manager, added a row with auth-mode=eap-radius to /ip ipsec identity at the same 6.47.10 responder to which the Windows 10 PC connects fine using machine certificate, and it works this way as well. And the Framed-IP-Netmask attribute is even not required.So there is a chance that in a real life setup, the connection will survive.