Windows Server 2016 – Setup SSTP OR IKEV2 VPN ON Server



Windows Server 2016 – Setup SSTP OR IKEV2 VPN ON Server

Windows Server 2016 - Setup SSTP OR IKEV2 VPN ON Server

Windows Server – Setup SSTP OR IKEV2 VPN ON Server

Please see first: https://youtu.be/lWZIHoAwu2c

This video follows on from our last video on how to setup a root CA with OCSP. In this video we show you how to use your self-signed ROOT CA and then your VPN certificate to setup a maximum encryption SSTP or IKEv2 Virtual Private Network (VPN) on Windows Server 2016. This should also work on earlier versions of Windows Server.

For more visit:

https://www.windows10.ninja

https://www.servers2016.com

Transcript (machine generated so it contains errors)

In our last video we showed you how to set up our certificate authority with the OCSP service that basically checks to ensure that certificates issued by your CA certificate authority are still valid, et cetera, and that was a lengthy process that was there are so basically, if you’re just run are some of your VPN with SSTP or IP version 2 et cetera and you just this video we suggest that you actually go to step one, which the previous video and in the description. We should have the link for the previous year okay. Please watch that follow that first set up your CA so that the OCSP and band. Now it’s quite simple. Okay, so with all the previous having been done, what would you do is create a VPN. Okay, so as a virtual private network. Okay, where you are able to connect one PC or a lot of PCs to your server okay in a corporate environment under a secure encrypted system, so you could be working from home. For example, connecting into your works server during all the work that you need to do, and it’s all done by an encrypted Internet connection using this VPN service. Now if I could quite simple to set up once you’ve got your previous certificate thing so that we need to do is will have ServerManager here that basically get one you get to just click on the server manager. But we also need to now create that VPN certificate, so I’ll show you how MMC entering their and then we add okay certificate templates. We need that one okay certificates will be that one and make sure’s computer account. Click next man finish, and then it certificate authority. We are that one in their local computer is fine, click finish. Click okay. Now we need to create that VPN certificate is cold that I can and we got certificate templates, double-click on that and it literally is this certificate with a little bit extra so rather than modifying this template letter a copy of it for a certificate template and will give it a name. Let’s has that go general, let’s call it VPN cert. I don’t make sense inevitability period. You can change that. That’s fine if you want added into active directory box, but for what we’re doing right now it’s all get compatibility. If you want the certificates to be readable, usable by older machines. You can have that you can have it all going for the latest version backwards compatibility gives you a greater number of machines that can connect simple as that. Okay general than request handling. We want to allow private keys to be exported. We have a cryptography that is fine as you see is that the CSP is basically all sorted arm key attestation, nothing to add in their issuance requirements. Okay, you could click over their CA certificate manager needs to approve the et cetera before it issued but which keep it as simple and straightforward as possible so server looking to add their subject name. This is actually because one of create search terms certificates with their all special names were actually gonna change the setting rather than active directory, generating all the data for us automatically, which may be only one, maybe not want were actually in our supply the data ourselves so supply in the request and cureā€¦ The then decided to place over their extensions. This is the most important, we are gonna add in here server authentication, which is very important server authentication. Okay, were also can add alliance authentication so add those two and were now we could make the extensions critical will. Click okay will clear a day on that and now we have a VPN cert template created our way. Now we need to just go into assessment show everything running the way we want okay in our certificate templates in the certificate authority, but make a you can see it’s not here so we need to bring in let’s click no certificate template

Comments are closed.