What Certificate store is used for machine certificates

I have a requirement to have windows 7/8 users connect to the company network using VPN & IKEv2.
I have a RH Linux 7 firewall/authentication server that the windows clients will connect to via a vpn.
I have generated a self-signed Certificate Authority, and a client certificate. (using NSS & certutil)
I have configured a VPN/IKEv2 connection on my windows 7 client system.
I have selected "use machine certificates" on the security tab.
However when I attempt to connect to the Linux 7 server. Windows returns a 13806 error. The windows process
for locating the certificate cannot find the certificate. (I used mmc to install both the CA certificate & the client certificate)
So I wondering since I specified the use of machine certificates, perhaps I've installed the certificates in the wrong "store".
Is there a special "store" for machine certificates?   

Hi MeipoXu, many thanks for working with me on this issue.
Thru some trial & error testing I determined the Local Computer store "combo" that DOES NOT generate
a 13806 error (cert not found) is to import the client cert to the "Personal" store under "Local Computer"
and import the CA into the Trusted Root Certificates store, also under the "Local Computer"
However I still get the 13819 error Invalid Certificate Type.  When I attempt to make a connection over vpn.
Here are the trace entries:
 Frame: Number = 4, Captured Frame Length = 234, MediaType = NetEvent
+ NetEvent:
- MicrosoftWindowsWFP: IPsec: Receive ISAKMP Packet
  - WfpUnifiedTracing_IKE_PACKET_RECV IKE_PACKET_RECV: IPsec: Receive ISAKMP Packet
     AsciiString ICookie: 76991f2483ab8271
     AsciiString RCookie: be81c4728325eb7f
     AsciiString ExchangeType: IKEv2 SA Init Mode
     UINT32 Length: 284 (0x11C)
     AsciiString NextPayload: SA
     UINT8 Flags: 32 (0x20)
     UINT32 MessageID: 0 (0x0)
     UnicodeString LocalAddress: 192.168.10.4
     UINT32 LocalPort: 500 (0x1F4)
     UINT32 LocalProtocol: 0 (0x0)
     UnicodeString RemoteAddress: 69.54.99.132
     UINT32 RemotePort: 500 (0x1F4)
     UINT32 RemoteProtocol: 0 (0x0)
     UINT64 InterfaceLuid: 1688849960927232 (0x6000006000000)
     UINT32 ProfileId: 2 (0x2)
  Frame: Number = 5, Captured Frame Length = 121, MediaType = NetEvent
+ NetEvent:
- MicrosoftWindowsWFP: User Mode Error
  - WfpUnifiedTracing_WFP_USERMODE_ERROR WFP_USERMODE_ERROR: User Mode Error
     AsciiString Function: IkeFindLocalCertChainHelper
   - WinErrorCode ErrorCode: ERROR_IPSEC_IKE_NO_CERT
      UINT32 WinErrorValue: 0x000035EE - ERROR_IPSEC_IKE_NO_CERT - The IKE failed to find a valid machine certificate. Contact your network security administrator about installing a valid certificate in the appropriate certificate store.
  Frame: Number = 6, Captured Frame Length = 121, MediaType = NetEvent
+ NetEvent:
- MicrosoftWindowsWFP: User Mode Error
  - WfpUnifiedTracing_WFP_USERMODE_ERROR WFP_USERMODE_ERROR: User Mode Error
     AsciiString Function: IkeFindLocalCertChainHelper
   - WinErrorCode ErrorCode: ERROR_IPSEC_IKE_NO_CERT
      UINT32 WinErrorValue: 0x000035EE - ERROR_IPSEC_IKE_NO_CERT - The IKE failed to find a valid machine certificate. Contact your network security administrator about installing a valid certificate in the appropriate certificate store.
  Frame: Number = 7, Captured Frame Length = 117, MediaType = NetEvent
+ NetEvent:
- MicrosoftWindowsWFP: User Mode Error
  - WfpUnifiedTracing_WFP_USERMODE_ERROR WFP_USERMODE_ERROR: User Mode Error
     AsciiString Function: IkeEncodeCertChainIkeV2
   - WinErrorCode ErrorCode: ERROR_IPSEC_IKE_INVALID_CERT_TYPE
      UINT32 WinErrorValue: 0x000035FB - ERROR_IPSEC_IKE_INVALID_CERT_TYPE - Invalid certificate type.
  Frame: Number = 8, Captured Frame Length = 117, MediaType = NetEvent
+ NetEvent:
- MicrosoftWindowsWFP: User Mode Error
  - WfpUnifiedTracing_WFP_USERMODE_ERROR WFP_USERMODE_ERROR: User Mode Error
     AsciiString Function: IkeEncodeCertChainIkeV2
   - WinErrorCode ErrorCode: ERROR_IPSEC_IKE_INVALID_CERT_TYPE
    - HRESULT ErrorValue: ERROR_IPSEC_IKE_INVALID_CERT_TYPE
     -  LEHResult:
        UINT32 Code:      (................0011010111111011) 0x000035FB - ERROR_IPSEC_IKE_INVALID_CERT_TYPE - Invalid certificate type.
        UINT32 Facility:  (.....00000000111................) WIN32
        UINT32 X:         (....0...........................) Reserved
        UINT32 N:         (...0............................) Not NTSTATUS
        UINT32 C:         (..0.............................) Microsoft-defined
        UINT32 R:         (.0..............................) Reserved
        UINT32 S:         (1...............................) Failure
$$$$$$$ N O T E :   Frame Numbers 9 thru 13 are exact same error message as Frame numbers 8 (the first) and Frame 14 (the last) $$$$$$$$ Then I close the connection
and stop the trace.  
  Frame: Number = 14, Captured Frame Length = 123, MediaType = NetEvent
+ NetEvent:
- MicrosoftWindowsWFP: User Mode Error
  - WfpUnifiedTracing_WFP_USERMODE_ERROR WFP_USERMODE_ERROR: User Mode Error
     AsciiString Function: IkeConstructAndSendMMResponse
   - WinErrorCode ErrorCode: ERROR_IPSEC_IKE_INVALID_CERT_TYPE
    - HRESULT ErrorValue: ERROR_IPSEC_IKE_INVALID_CERT_TYPE
     -  LEHResult:
        UINT32 Code:      (................0011010111111011) 0x000035FB - ERROR_IPSEC_IKE_INVALID_CERT_TYPE - Invalid certificate type.
        UINT32 Facility:  (.....00000000111................) WIN32
        UINT32 X:         (....0...........................) Reserved
        UINT32 N:         (...0............................) Not NTSTATUS
        UINT32 C:         (..0.............................) Microsoft-defined
        UINT32 R:         (.0..............................) Reserved
        UINT32 S:         (1...............................) Failure
So after a response is received from the Server (to complete the SA Initiation)
Windows then "looks" for a cert to send to the server.
It appears initially it can't find one because 13806 errors are reported (Frames  5 & 6)
However the session does not issue an 13806.
It goes on to Frame 7: Note the function IkeEncodeCertChainIkeV2 detects the invalid cert type
Frames 8 thru 14 are just a repeat of the same error.
Could this be a flaw in the windows VPN logic ?
Guy

Similar Messages

  • What are the required settings for Quality Certificate

    Hi Team
    What are the required settings for Quality Certificate for Raw material from vendor. This is my RR - Result Recording  for inspection lot.
    Please sugget me T-Code to view this.
    Can I see say for 6-9 months RR done insp. lot.
    Thanks

    Settings for Quality Certificate for Raw material from vendor,
    Activate QM Procurement key, enter qm control key with certificate and Enter certificate type in certificate field.
    There are 2 cases,
    u want details of certificate send by vendor
    u want to record results and see inspection lot wise results.
    case1
    depending upon the certificate selected by u, system will give u warning or error msg for certificate confirmation at the time of gr. for confirmation QC51 t_code is used. here status has to be changed to 'filed and inspected' then gr will be allowed.
    all these certificates can be dispalyed in QC55 T_CODE.
    CASE2
    U can record results and see in inspection report tab in QA33
    Edited by: YOGINI B THORAT on Aug 4, 2009

  • What are cookie domains used for?

    there is a choice, can someone give me some suggestion?
    What are cookie domains used for?
    A/ to be easily recognizable by digital certificates that are also based on domains
    B/ to instruct the browser that the cookie should be send only to the domain it came from
    C/ to provide convenient way for the user to group cookies by their domains
    D/ All of Above
    E/ None of Above

    Not only does that not appear to be a Java question,
    but the OP didn't even take a guess at the answer and
    explain why he thought that that answer was correct.thanks! i support with your viewpoint, solve a problem will be the most important mission, but not consured! i am cognizant of this is a mistake to ask other questions in java forum ,but this question didn't far away j2ee project, though this is a choice, but only get a answer is not my original intention! i hope i can call on anyone join in this discussion!
    thanks...

  • Apple App Store is used for Account. How to Avoid It? How to Delete All Sharing Preferences?

    Every time I go to the Apple App Store, I have intrusion, relentless stalking, piggy back computer usage, ID Theft, Account takeovers, and theft problems on everything including all brands of email accounts. I keep changing the ID and the passwords intermittently, but attacks continue. Erasing or replacing the HD does not remedy the situation either.
    As of now, the computer has practically empty; 979.87 GB free out of 1TB. It may have a couple of notes, pdf's, and some bookmarks. It was recently erased and is running on the OS X 10.7.5 to avoid Apple App Store updates to Mavericks, Pages, Keynote, etc. The security was set on everything I could think of to use the internet safely. 
    Besides surfing the web, I only did a few things. Because Chrome is better recommended, I used Safari to download Firefox, then used Firefox to download Chrome. Safari won't download it directly. I checked Yahoo mail. I used the Apple ID to post a question in the Apple Communities (within 24-48 hours of today). I changed the password to Apple ID in case there was an issue later. (I have to change the password almost 100% of the time because it gets stolen often) I usually erase Firefox because I don't use it. This time I left it there while I worked on other things & erased it later.
    After reading some online material, the system started to run slow as though there was too much data or space being taken up. Then I felt that someone or someone was using it at the same time. I disconnected the Ethernet and left an idle screen (it will sleep after a few minutes) because no sharing options remained. All fields are depopulated. All internet connection options were turned off and removed. Only the Ethernet remains. Unfortunately, that Bluetooth button can still be turned "on" and/or "discoverable". I don't know it this will still work with Bluetooth turned off  and removed in Sharing. Please clarify that for me.
    When I returned, the screen saver was changed. I expected to use a password to get back onto the computer, but no password was needed. I checked the settings and found the password for logging onto an idle & sleeping screen was removed. No one physically changed things around. This was done remotely or through malware.
    I checked various system preferences, and found the locks to Sharing was open with some of the components set up for usage (public files, bluetooth, remote apple events, etc.). I tried to change some options, but some items did not move. I tried to lock it but it would not lock. I tried other sys pref screens and found that some of them had been dismantled too.
    I tried to open the lock for other changes, but the password to System Preferences was changed.
    Is it normal to get a password popup window to LOCK users & groups when it is OPEN? I don't believe you need a password to lock it. Eventually, open locks closed with no chance to immediately reopen it to adjust the preferences (all passwords were changed).
    The terminal looks like it was used. No history was found. Reseting Password rejected new passwords. iTunes sharing could not be changed and parental control refused to lock. After waiting an hour or two, was able to lock it. I wonder what it was being used for.
    Now that the internet and the network are disconnected (before sending this message), everything is still extremely slow. A single window takes a long time to open. I have no idea what is making it drag and I don't know where to look.
    If history is repeating itself, then the computer is set for piracy just like before. Every place I go is watched, all passwords are captured, all files are checked, all email accounts can be stolen, chat and messages are used (email & computer), iTunes will be logged into, other types of accounts are stolen/taken over, and everything I type is read. Any changes will be sabotaged.
    I am confident that someone in the Apple Community will have the answers to getting rid of this problem for good. If you don't have all the answers, then perhaps you have good resources and referrals (not speculations or guesses).
    I read about apps, software, or devices that either detect or deter this type of problem. What are they and how do they work?
    Q- Also, exactly what are the steps to transfer the OS X 10.7.5, Mavericks, and the future Yosemite to a flash drive or disk to avoid future contact with the Apple App Store or using the Apple ID? (external HD's have been sabotaged in the past-via remote or erasing program of some sort)
    Q- How to permanently get rid of Messages & Chats
    Q- How to permanently remove Dropbox & Public file sharing?
    Q- How to permanently remove all sharing options?
    Q- Are there other ways to share (codes, commands, etc.) that need be to blocked/fixed/patched? If so, then what are they?
    Q- Are computers stalked by IP address? by Network? by computer numbers or codes? or just by traps or their accounts?
    Q- Is there a handy, "go to" type of checklist of where to look or what to do when there is a a suspicion of implants in the computer?

    See Recover your iTunes library from your iPod or iOS device.
    tt2

  • How to tell what recovery point was used for restore

    Is there a way to determine what recovery point was used for a restore after the restore was started.

    The question comes from the experience of having a package installed but not being able to build it from the same PKGBUILD (due to nontrivial issues). The package must have been built successfully by *a* build system, so ideally one would want to replicate that build. The relevant differences I could think of are the compiler flags and to a lesser extent the hardware build platform.
    You should describe these supposedly non-trivial issues. I've never experienced what you describe in my years using Arch, nor have I ever heard it suggested that the famously vanilla Arch packages are built using some sort of unconventional compiler flags. I have heard multiple developers say using highly modified CPU optimizations and modified linking and such are mostly pointless, however. So I'd bet a week's pay that the build system uses vanilla GCC with the default settings. Why would the thing that actually builds Arch Linux be the one part of the Arch ecosystem that doesn't abide by the Arch standards? Why would only some packages have library linking problems and such when all packages are built on the same machine against the same library versions---and thus the conditions resulting in a failed build would be identical to those in a successful build? I could be wrong, but I think you're on the wrong track. The quickest way to find out is to describe what the real problem is, not what you imagine the solution to be.

  • What ecommerce easy to use for muse

    What ecommerce easy to use for muse

    Hi,
    You can try Adobe Business catalyst platform with adobe Muse, take a looks to this short video
    http://tv.adobe.com/watch/introducing-business-catalyst/bc-showcase-a-stunning-online-stor e-/
    Adobe Muse + Business Catalyst Integration, Training, Consulting: AID+BC
    Please let me know if you have any other query.

  • What  cable i can use for Thunderbolt port?

    what  cable i can use for Thunderbolt port?

    You can use a mini displayport cable as long as it is connected to a mini displayport peripheral.
    You can use a thunderbolt cable as long as it is connected to a thunderbolt peripheral.
    There are now thunderbolt cables available in the Apple store.

  • I need to know what Adobe version to use for my iPad to fill in and pay forms online

    I need to know what Adobe version to use for my iPad to fill in and pay bills online

    In the App Store search for Adobe Reader.

  • My Time Capsule won't allow my computer to back up.  It says it is already in use but that is what it is being used for.

    My Time Capsule won't allow my computer to back up.  It says it is already in use but that is what it is being used for. It has been working fine for years.  All of a sudden I keep getting a message that TC (time capsule) cannot complete back up as it is already in use.  I am doing the backups automatically through Time Capsule.

    Restart the Time Capsule by disconnecting and reconnecting the power adapter. When it's back online, open the AirPort Utility application and check to see whether there's a firmware update for it.

  • How to find out what are the interfaces used for Job and Job Codes

    HI All,
    I just wanted to know how do we find out what are the interfaces used for Job and Job codes .
    Thanks In Advance
    Sunny

    Hi,
    Here is an idea for your request.
    Basically you can create a simple query on multiprovider 0TCT_MC01.
    Filter: you can use a variable for restriction of time ( calday, or calmonth) since you should be interested for a time period.
    Choose following characters into your objects:
    InfoProvider ( 0TCTIFPROV )  - you can create a variable for choosing infoprovider before query runs.
    *Tp.[Type of BI Application Object] 0TCTBISOTYP  = filter this with 'QUERY' or whatever your need is.
    *BI Application Object 0TCTBISBOBJ,  ( this will give you the name of the queries)
    In key figures choose,  Count for BI Appl. (0TCTWTCOUNT).
    (number for query run)
    Create a condition , for top 20.
    Hope this helps.
    Derya

  • What are the classes used for bropdownListBox in BSP and purpose and how

    what are the classes used for bropdownListBox in BSP and purpose and how
    thank you,
    Regards.
    Jagrut BharatKumar Shukla

    Benje001,
    Right-click on the CWAI control on your form. Choose Properties. The first tab is the Channels tab. After you choose your device from the drop down box on the right, you can type in the Channels box which channel you want to use.
    If you want to see a CWAI control that is already configured, all of the shipping examples will have this already done.
    Also, if you have questions about any item on the CWAI (or any other NI ActiveX control) you can click the ? icon in the right corner of the properties page and then click on the item in the dialog that you need help with. This "What's this" help will describe that particular control on the dialog.
    Hope that helps!
    Regards,
    Shannon R.
    Applications Engineer
    National Instruments

  • What format i should use for my external hard drive that can be used interchangeably between mac and pc?

    What format i should use for my external hard drive that can be used interchangeably between mac and pc?

    Usually Fat32/MS-DOS as mentioned, but that has several limitatiuns, like 4GB filesize limit.
    One option is MacDrive for you PCs... allows them to Read/Write HFS+...
    http://www.mediafour.com/products/macdrive/
    More options...
    NTFS-3G Stable Read/Write Driver...
    http://www.ntfs-3g.org/
    MacFUSE: Full Read-Write NTFS for Mac OS X, Among Others...
    http://www.osnews.com/story/16930

  • What format do I use for internal drive?

    I want to install a new internal harddrive into my Macbook.  What format should I use for it?
    Mac OS Extended (Journaled)
    Mac OS Extended
    Mac OS Extended (Case-sensitive, Journaled)
    Mac OS Extended (Case-sensitive)
    MS-DOS (FAT)
    ExFAT
    I know MS-DOS(FAT) is what I should use for external to work on mac and windows.  Can't remember which to use for the internal.  I have an Intel-based Mac.
    Thanks for your help.

    I use SuperDuper for cloning my OSX volumes and it does not change the size of the destination partition to the size of the source partition.
    So, you can make the destination partitions size to your liking and the cloning will not change it afterwards.
    Keep in mind that SuperDuper or Carbon Copy Cloner cannot clone a BootCamp Windows partition to a new harddisk, only OSX partitions.
    But Parallels doesn't need to have a Windows partitions but is mostly just two files plus the Parallels app on your OSX partition.
    And therefor it would be cloned with the rest of the OSX.
    Stefan

  • What setting should I use for Abbey Road drums?  Getting a cpu overload issue

    What setting should I use for Abbey Road drums (i.e. multi-output, stereo, etc)?  Getting a cpu overload issue.  I have a macbook pro, 4 gb ram, running Logic Pro 9.  Just 3 tracks of drums and a few real instrument tracks.  Can't find a guide in the manual for either Kontakt or Logic.  Thanks in advance!

    Hi
    AR drums are complete resource (CPU) hogs. They work better if you turn off as many of the AR internal plugins as you can.
    See section 4 (?) of the AR manual, which you can find within Kontakt (In the library area of Kontakt click hold the small "i" on the right of the "AR drummer" Library).
    Alternatively, your only solution is to increase the I/O buffer in Preferences:Audio, with the associated increase in latency
    CCT

  • What is the method used for upload of  data

    Hi All,
    What is the method used for upload of  Data from excel spread sheets to SAP HR.
    it is Bulk Data from many countries.LSMW or BDC Session Method?
    what are country specific infotypes used for PA and OM.
    can u plz give the list of country specific infotypes used for PA n OM Module.
    Thanks
    Archana

    Hi Archana,
    To Upload bulk data I think BDC is the best and effecient way.
    Regarding Infotypes we dont have any country specific Infotypes in OM & PA. In Payroll we do have according to country wise.
    I hope you had understood the point
    Regards
    Pavani
    Remainder: Points to be given on answers

Maybe you are looking for