Windows 2008 R2 IPSEC second authentication
I'm setting up an IPSEC VPN tunnel between a fortinet and a Windows 2008 R2 server. Using the Windows Advanced Firewall I've been able to create the main and quick mode encryption settings. However when I setup the actual rule I'm only able to set 1 policy using a pre-shared key. Is there a way to manually do this using NETSH? On the firewall side I can see that I'm getting a successful negotiation of the Phase 1 conversation, but Phase 2 fails. This seems to be different from Windows 2008.
July 8th, 2011 3:36pm

The NETSH command to create a connection security rule in Windows 2008 R2 using PSK is: netsh advfirewall consec add rule name="Authentication Test" endpoint1=any endpoint2=any action=requestinrequestout auth1=computerpsk auth1psk=test The example creates a consec rule with first authentication set to PSK and the second authentication is disabled. If you want to enable the second authentication then you need to specify the auth2= command. ComputerPSK is only available during the first authentication and can not be used for the second authentication. /Hasain
Free Windows Admin Tool Kit Click here and download it now
July 9th, 2011 11:32am

Hello Matthew, i'm trying to do the same here, but i have the oproblem with that i never get to phase2. i never get the windows 2008r2 server to respond, is it possible for you to put together a small how-to what you did on both sides (fortigate and windows2008r2). i would be very grateful. maybe som other people out there too :) Thanks in advance.
July 20th, 2011 11:04am

But i think it is enough with what you do on the windows side. if you make a how-to :)
Free Windows Admin Tool Kit Click here and download it now
July 20th, 2011 12:30pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics