<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:pingback="http://madskills.com/public/xml/rss/module/pingback/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>john kelly - vpn</title>
    <link>http://blog.johnkelly.co.uk/</link>
    <description>blackrock consultants</description>
    <language>en-us</language>
    <copyright>john kelly</copyright>
    <lastBuildDate>Sun, 24 Feb 2008 16:00:32 GMT</lastBuildDate>
    <generator>newtelligence dasBlog 2.2.8279.16125</generator>
    <managingEditor>mail@johnkelly.co.uk</managingEditor>
    <webMaster>mail@johnkelly.co.uk</webMaster>
    <item>
      <trackback:ping>http://blog.johnkelly.co.uk/Trackback.aspx?guid=49f66b9d-107c-463d-927a-ca29f33f16a5</trackback:ping>
      <pingback:server>http://blog.johnkelly.co.uk/pingback.aspx</pingback:server>
      <pingback:target>http://blog.johnkelly.co.uk/PermaLink,guid,49f66b9d-107c-463d-927a-ca29f33f16a5.aspx</pingback:target>
      <dc:creator>Your DisplayName here!</dc:creator>
      <wfw:comment>http://blog.johnkelly.co.uk/CommentView,guid,49f66b9d-107c-463d-927a-ca29f33f16a5.aspx</wfw:comment>
      <wfw:commentRss>http://blog.johnkelly.co.uk/SyndicationService.asmx/GetEntryCommentsRss?guid=49f66b9d-107c-463d-927a-ca29f33f16a5</wfw:commentRss>
      <body xmlns="http://www.w3.org/1999/xhtml">
        <p>
Sharepoint Central Administration<br />
Virtual Server Configuration<br />
Configure virtual server settings<br />
Default Web Site<br />
Virtual Server Management<br />
Define managed paths<br />
Add New path -&gt; certsrv -&gt; Excluded path<br />
OK
</p>
        <p>
See: <a href="http://www.microsoft.com/technet/prodtechnol/biztalk/2006/library/a4swift/39916663-b80e-49d8-ba9b-49276eb564fc.mspx?mfr=true">http://www.microsoft.com/technet/prodtechnol/biztalk/2006/library/a4swift/39916663-b80e-49d8-ba9b-49276eb564fc.mspx?mfr=true</a></p>
        <img width="0" height="0" src="http://blog.johnkelly.co.uk/aggbug.ashx?id=49f66b9d-107c-463d-927a-ca29f33f16a5" />
      </body>
      <title>certsrv on Sharepoint</title>
      <guid isPermaLink="false">http://blog.johnkelly.co.uk/PermaLink,guid,49f66b9d-107c-463d-927a-ca29f33f16a5.aspx</guid>
      <link>http://blog.johnkelly.co.uk/2008/02/24/certsrvOnSharepoint.aspx</link>
      <pubDate>Sun, 24 Feb 2008 16:00:32 GMT</pubDate>
      <description>&lt;p&gt;
Sharepoint Central Administration&lt;br&gt;
Virtual Server Configuration&lt;br&gt;
Configure virtual server settings&lt;br&gt;
Default Web Site&lt;br&gt;
Virtual Server Management&lt;br&gt;
Define managed paths&lt;br&gt;
Add New path -&amp;gt; certsrv -&amp;gt; Excluded path&lt;br&gt;
OK
&lt;/p&gt;
&lt;p&gt;
See: &lt;a href="http://www.microsoft.com/technet/prodtechnol/biztalk/2006/library/a4swift/39916663-b80e-49d8-ba9b-49276eb564fc.mspx?mfr=true"&gt;http://www.microsoft.com/technet/prodtechnol/biztalk/2006/library/a4swift/39916663-b80e-49d8-ba9b-49276eb564fc.mspx?mfr=true&lt;/a&gt;
&lt;/p&gt;
&lt;img width="0" height="0" src="http://blog.johnkelly.co.uk/aggbug.ashx?id=49f66b9d-107c-463d-927a-ca29f33f16a5" /&gt;</description>
      <comments>http://blog.johnkelly.co.uk/CommentView,guid,49f66b9d-107c-463d-927a-ca29f33f16a5.aspx</comments>
      <category>vpn</category>
      <category>Win/2003</category>
    </item>
    <item>
      <trackback:ping>http://blog.johnkelly.co.uk/Trackback.aspx?guid=9eb723cb-0bfd-4e6b-b326-6874553e5fec</trackback:ping>
      <pingback:server>http://blog.johnkelly.co.uk/pingback.aspx</pingback:server>
      <pingback:target>http://blog.johnkelly.co.uk/PermaLink,guid,9eb723cb-0bfd-4e6b-b326-6874553e5fec.aspx</pingback:target>
      <dc:creator>Your DisplayName here!</dc:creator>
      <wfw:comment>http://blog.johnkelly.co.uk/CommentView,guid,9eb723cb-0bfd-4e6b-b326-6874553e5fec.aspx</wfw:comment>
      <wfw:commentRss>http://blog.johnkelly.co.uk/SyndicationService.asmx/GetEntryCommentsRss?guid=9eb723cb-0bfd-4e6b-b326-6874553e5fec</wfw:commentRss>
      <body xmlns="http://www.w3.org/1999/xhtml">
        <p>
Just some notes:
</p>
        <p>
          <a href="http://support.microsoft.com/kb/926182">http://support.microsoft.com/kb/926182</a>
        </p>
        <p>
          <hr />
        </p>
        <p>
        </p>
        <p>
I order to run  an IPSEC/NAT-T type VPN you need to insert the following
registry keys on the client : 
<br /><br /><b>XP SP2:</b><br /><br />
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IPsec] 
</p>
        <div>
        </div>
        <p>
          <font size="2"> "AssumeUDPEncapsulationContextOnSendRule"=dword:00000002” 
<br /><br /><b><span class="high">Vista</span>: 
<br /></b><br />
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent] 
<br />
"AssumeUDPEncapsulationContextOnSendRule"=dword:00000002” 
<br /><br />
Now... I'm not quite sure that these alone will help you get connected. 
<br />
Make sure that since you are connecting from a non-domain member that you certificate
is properly installed. 
<br /><br />
Import the Administrator-Cert to both 
<br />
Local Machine: "Personal" &amp; "Trusted Root Certification Authorities" 
<br /><br />
This in combination with the above registry-hack should do it. 
<br /><br />
BTW: The one for SP 2 is documented in: </font>
          <a href="http://support.microsoft.com/default.aspx?kbid=885407" target="_blank">
            <font size="2">http://support.microsoft.com/default.aspx?kbid=885407</font>
          </a>
          <br />
          <br />
          <font size="2">The one for <span class="high">Vista</span> is not... but it works  <img src="http://forums.isaserver.org/image/s4.gif" /></font>
        </p>
        <p>
          <font size="2">[TX Geir Johansen, isaserver.org]</font>
        </p>
        <p>
          <font size="2">
            <p>
              <hr />
            </p>
            <p>
OK, here is a way to do it (but it is not an easy 
<br />
solution). 
</p>
            <p>
1) You need to use certmgr.msc on the Vista Client 
<br />
2) You need to generate Custom Request in the console 
<br />
(see Create a Custom Certificate Request in the Help 
<br />
file). 
<br />
3) Best to add Custom subject information (be sure to 
<br />
include an Alternate Name that includes the User 
<br />
Principal Name 
<br />
4) Save the file to a PKCS#10 request 
</p>
            <p>
              <br />
Create a custom v2 certificate template that allows the 
<br />
Subject to be created in the Request. Base it on the 
<br />
template you want to use (for the love of G*D, do not 
<br />
use User &lt;G&gt;) Ensure that the template is available at 
<br />
the CA you are using. Assume it is named VistaUser 
</p>
            <p>
              <br />
You now use the Certsrv Web page to submit the request 
<br />
1) Connect to <a href="https://CAName/certsrv">https://CAName/certsrv</a><br />
2) Provide credentials from the domain 
<br />
3) Choose Request a Certificate 
<br />
4) CHoose Advanced Certificate Request 
<br />
5) Choose Submit a certificate request by using a base-   
<br />
64-encoded CMC or PKCS #10 file, or submit a renewal 
<br />
request by using a base-64-encoded PKCS #7 file. 
<br />
6) Paste the contents of the file created in the first 
<br />
procedure into the Saved Request box 
<br />
7) Choose the VistaUser template in the Certificate 
<br />
Template sectino 
<br />
8) Click Submit 
<br />
9) Save the issued certificate to a PKCS#7 file (all 
<br />
certs in the chain) 
</p>
            <p>
              <br />
Go back to the Vista box 
<br />
1) Import the PKCS#7 file 
<br />
2) Put all certs in the Personal store (for now) 
<br />
3) Once the import is complete, move the CA certificates 
<br />
into the appropriate stores (root in the root, all other 
<br />
CAs in the intermediate store 
<br />
4) Use the certificate 
</p>
            <p>
              <br />
Brian 
<br />
P.S. Please do not ask for more detailed steps &lt;G&gt; 
</p>
            <p>
              <br />
In article &lt;D85CB163-D832-4D40-B009-B5A28A685BF0 
<br />
@microsoft.com&gt;, <a href="mailto:S...@discussions.microsoft.com">S...@discussions.microsoft.com</a> says... 
</p>
            <p>
              <br />
 
</p>
            <p>
            </p>
          </font>
          <img width="0" height="0" src="http://blog.johnkelly.co.uk/aggbug.ashx?id=9eb723cb-0bfd-4e6b-b326-6874553e5fec" />
        </p>
      </body>
      <title>L2TP IPSec Win2003 - Vista</title>
      <guid isPermaLink="false">http://blog.johnkelly.co.uk/PermaLink,guid,9eb723cb-0bfd-4e6b-b326-6874553e5fec.aspx</guid>
      <link>http://blog.johnkelly.co.uk/2007/02/14/L2TPIPSecWin2003Vista.aspx</link>
      <pubDate>Wed, 14 Feb 2007 20:26:40 GMT</pubDate>
      <description>&lt;p&gt;
Just some notes:
&lt;/p&gt;
&lt;p&gt;
&lt;a href="http://support.microsoft.com/kb/926182"&gt;http://support.microsoft.com/kb/926182&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;hr&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;
I order to run&amp;nbsp; an IPSEC/NAT-T type VPN you&amp;nbsp;need to insert the following
registry keys on the client : 
&lt;br&gt;
&lt;br&gt;
&lt;b&gt;XP SP2:&lt;/b&gt; 
&lt;br&gt;
&lt;br&gt;
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\IPsec] 
&lt;/p&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;p&gt;
&lt;font size=2&gt;&amp;nbsp;"AssumeUDPEncapsulationContextOnSendRule"=dword:00000002” 
&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;span class=high&gt;Vista&lt;/span&gt;: 
&lt;br&gt;
&lt;/b&gt;
&lt;br&gt;
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PolicyAgent] 
&lt;br&gt;
"AssumeUDPEncapsulationContextOnSendRule"=dword:00000002” 
&lt;br&gt;
&lt;br&gt;
Now... I'm not quite sure that these&amp;nbsp;alone will help you get connected. 
&lt;br&gt;
Make sure that since you are connecting from a non-domain member that you certificate
is properly installed. 
&lt;br&gt;
&lt;br&gt;
Import the Administrator-Cert to both 
&lt;br&gt;
Local Machine: "Personal"&amp;nbsp;&amp;amp; "Trusted Root Certification Authorities" 
&lt;br&gt;
&lt;br&gt;
This in combination with the above registry-hack should do it. 
&lt;br&gt;
&lt;br&gt;
BTW: The one for SP 2 is documented in: &lt;/font&gt;&lt;a href="http://support.microsoft.com/default.aspx?kbid=885407" target=_blank&gt;&lt;font size=2&gt;http://support.microsoft.com/default.aspx?kbid=885407&lt;/font&gt;&lt;/a&gt; 
&lt;br&gt;
&lt;br&gt;
&lt;font size=2&gt;The one for &lt;span class=high&gt;Vista&lt;/span&gt; is not... but it works&amp;nbsp;&amp;nbsp;&lt;img src="http://forums.isaserver.org/image/s4.gif"&gt; &lt;/font&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;font size=2&gt;[TX Geir Johansen, isaserver.org]&lt;/font&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;font size=2&gt; 
&lt;p&gt;
&lt;hr&gt;
&lt;/p&gt;
&lt;p&gt;
OK, here is a way to do it (but it is not an easy 
&lt;br&gt;
solution). 
&lt;/p&gt;
&lt;p&gt;
1) You need to use certmgr.msc on the Vista Client 
&lt;br&gt;
2) You need to generate Custom Request in the console 
&lt;br&gt;
(see Create a Custom Certificate Request in the Help 
&lt;br&gt;
file). 
&lt;br&gt;
3) Best to add Custom subject information (be sure to 
&lt;br&gt;
include an Alternate Name that includes the User 
&lt;br&gt;
Principal Name 
&lt;br&gt;
4) Save the file to a PKCS#10 request 
&lt;/p&gt;
&lt;p&gt;
&lt;br&gt;
Create a custom v2 certificate template that allows the 
&lt;br&gt;
Subject to be created in the Request. Base it on the 
&lt;br&gt;
template you want to use (for the love of G*D, do not 
&lt;br&gt;
use User &amp;lt;G&amp;gt;) Ensure that the template is available at 
&lt;br&gt;
the CA you are using. Assume it is named VistaUser 
&lt;/p&gt;
&lt;p&gt;
&lt;br&gt;
You now use the Certsrv Web page to submit the request 
&lt;br&gt;
1) Connect to &lt;a href="https://CAName/certsrv"&gt;https://CAName/certsrv&lt;/a&gt; 
&lt;br&gt;
2) Provide credentials from the domain 
&lt;br&gt;
3) Choose Request a Certificate 
&lt;br&gt;
4) CHoose Advanced Certificate Request 
&lt;br&gt;
5) Choose Submit a certificate request by using a base-&amp;nbsp;&amp;nbsp; 
&lt;br&gt;
64-encoded CMC or PKCS #10 file, or submit a renewal 
&lt;br&gt;
request by using a base-64-encoded PKCS #7 file. 
&lt;br&gt;
6) Paste the contents of the file created in the first 
&lt;br&gt;
procedure into the Saved Request box 
&lt;br&gt;
7) Choose the VistaUser template in the Certificate 
&lt;br&gt;
Template sectino 
&lt;br&gt;
8) Click Submit 
&lt;br&gt;
9) Save the issued certificate to a PKCS#7 file (all 
&lt;br&gt;
certs in the chain) 
&lt;/p&gt;
&lt;p&gt;
&lt;br&gt;
Go back to the Vista box 
&lt;br&gt;
1) Import the PKCS#7 file 
&lt;br&gt;
2) Put all certs in the Personal store (for now) 
&lt;br&gt;
3) Once the import is complete, move the CA certificates 
&lt;br&gt;
into the appropriate stores (root in the root, all other 
&lt;br&gt;
CAs in the intermediate store 
&lt;br&gt;
4) Use the certificate 
&lt;/p&gt;
&lt;p&gt;
&lt;br&gt;
Brian 
&lt;br&gt;
P.S. Please do not ask for more detailed steps &amp;lt;G&amp;gt; 
&lt;/p&gt;
&lt;p&gt;
&lt;br&gt;
In article &amp;lt;D85CB163-D832-4D40-B009-B5A28A685BF0 
&lt;br&gt;
@microsoft.com&amp;gt;, &lt;a href="mailto:S...@discussions.microsoft.com"&gt;S...@discussions.microsoft.com&lt;/a&gt; says... 
&lt;/p&gt;
&lt;p&gt;
&lt;br&gt;
&amp;nbsp;
&lt;/p&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;/font&gt;&lt;img width="0" height="0" src="http://blog.johnkelly.co.uk/aggbug.ashx?id=9eb723cb-0bfd-4e6b-b326-6874553e5fec" /&gt;</description>
      <comments>http://blog.johnkelly.co.uk/CommentView,guid,9eb723cb-0bfd-4e6b-b326-6874553e5fec.aspx</comments>
      <category>vista</category>
      <category>vpn</category>
      <category>Win/2003</category>
    </item>
  </channel>
</rss>