- Under Configuration > IKEv2 > Port/Realm Mapping, select the port and realm corresponding to where IKEv2 traffic will be sent.
- Click Add.
In this example, IKEv2 will be sent to the internal port and tied to the "IKEV2" realm.
Note that you must make adjustments from the provided example if the traffic will be sent to the external port and a realm with a different name.
- Under Realm/Protocol Set Mapping, select the corresponding realm name and set protocol set to EAP-MSCHAP-V2.
- Click Add > Save Changes.
- Under Configuration > Certificates > Device Certificates, ensure there is a trusted and valid device certificate installed on the PCS device and bound to the port configured in earlier.
- Under the Trusted Client CA, install the certificate authority that signed the device certificate. If the certificate is chained, install the complete chain here.
- Configure/create a certificate authentication server on the Junos Pulse Secure Access device. Click Save Changes.
- Navigate to User Realms > [User Realm Name] > Role Mapping > New Rule. From the "Rule based on" drop down, select Custom Expressions and click Update.
- For the name of the role mapping rule, enter "IKEV2," then click Expressions. Configure role mapping based on the custom expression below. Click Save Changes.
- Assign the corresponding role to the "IKEv2" custom expressions. Click Save Changes.
- Under the corresponding user role, ensure that VPN Tunneling is enabled.
- Configure the network connect ACLs and connection profile.
- Run mmc.exe.
- From the console window, click File > Add/Remove Snap-in.
- From the list, select Certificates and click Add > Computer account. Click Next.
- Select Local Computer. Click Finish.
- From the left pane, navigate to Console Root > Certificate (Local Computer) > Personal.
- Under Personal, right-click the Certificates folder, then select All Tasks > Import.
- The Certificate import wizard will appear. Click Next.
- Click Browse.
- Navigate to the created machine certificate (should be a PFX or P12 file) and click Open.
- Click Next.
- Select Automatically select the certificate store based on the type of certificate. Click Next.
- Click Finish.
- After a successful import, the machine certificate will appear in the right pane.
- Under Trusted Root Certification Authorities, right-click Certificates, then select All Tasks > Import. Repeat Steps 5-8 and import the root certificate authority and its chain for the device certificate.
- From the Windows 7 machine, navigate to Start menu > Control Panel > Network and Sharing Center > Set up a new connection or network.
- Select Connect to workplace.
- Select Use my Internet connection (VPN).
- For internet address, enter the address of the PCS device (this must match the common name of the device certificate).
For the destination name, leave it as "VPN Connection."
Click the checkbox Don't connect now; just set it up so I can connect later > Next.
- Enter a pseudo username, password, and domain, as machine certificates are going to be used. Click Create.
- Under network connections, a new connection named "VPN Connection" will exist.
- Right-click VPN Connection, then click Properties > General. Ensure that the hostname/IP address matches the common name of the device certificate installed on the Junos Pulse Secure Access device.
- Under the Security tab, from the "Type of VPN" drop down, select IKEv2. Select the radio button for Use machine certificate. Click OK.
- The VPN is connected and Internet access is not allowed for the user.
In this case, only intranet access is allowed.