Windows Clients in Tunnel mode? Tips?

Hello,

I am looking into setting up a Windows-Client in tunnel mode, without using the standard VPN-client, with user/name password for (eap-authentication), a long the lines that I connect my strongswan-client in this post:

http://forum.mikrotik.com/t/vpn-gateway-ikev2-roadwarriors-and-ipv6/173511/1

As far as I can tell I won’t be able to use the built in client-interface, without getting an IP from the responder.

Does anyone have any experience that can be shared on how to achieve this?

The following power-shell cmdlet, looks promissing:

https://learn.microsoft.com/en-us/powershell/module/netsecurity/new-netipsecrule

In combination with this one:

https://learn.microsoft.com/en-us/powershell/module/netsecurity/new-netipsecphase2authset

But it seems unclear whether it can do eap-authentication.

if anyone have done a similar setup between windows servers, or clients, their input would be very welcome.

It might not be doable :thinking:

Windows supports four distinct types of authentications: Kerberos, certificates, NTLMv2, and preshared key.

https://learn.microsoft.com/en-us/azure/expressroute/expressroute-howto-ipsec-transport-private-windows

This seems to be the Microsoft proprietary-protocol authip:

https://learn.microsoft.com/en-us/windows/win32/fwp/ipsec-configuration#what-is-authip

The Add-VpnConnection-commandlet seems promissing:


https://learn.microsoft.com/en-us/powershell/module/vpnclient/add-vpnconnection

But configuring “plain tunnelmode” as in strongswan, doesn’t seem clear in any way.