cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
797
Views
5
Helpful
7
Replies

FlexVPN name-mangler won't match on email or DN

Popa_Marius
Level 1
Level 1

Dear community,

Have a small problem where I am trying to connect a strongswan client via x509 certificates to a Catalyst 8000v (Version 17.08.01a) in the cloud. The connection is working without problems except for when I am using the name-mangler to match on DN or email.
This is the IKEv2 profile where the client connectes:

crypto ikev2 profile FlexLink_OS
description *** VT_FlexLink FlexLink OS Certificates ***
match certificate FlexLink_OS
identity local fqdn tt-flexgw4.awsgw.xxxxx.org
authentication remote ecdsa-sig
authentication local ecdsa-sig
pki trustpoint EC-PKI_VPN
dpd 10 3 periodic
aaa authorization group cert list FlexVPN_AAA FlexLink_OS
aaa authorization user cert list FlexVPN_AAA name-mangler email-USR
virtual-template 5 mode auto
!
crypto ikev2 name-mangler email-USR
email username
* If I use the fqdn all, the client is connecting! The username looks like that: name1.name-idc-phone.xxxxx.org
With the "email" or "dn" matching, I get the error:
*Jul 26 10:57:16.357: IKEv2-ERROR:AAA user author request failed
*Jul 26 10:57:16.357: IKEv2-ERROR:Address type 0 not supported

I think that the problem can be in one of the 3 places:

1. IOS BUG (tested with 17.07.01a and 17.08.01a)
2. Certificate format. Certificates are release with Linux strongswan-pki
3. faulty configuration. 

If I open the certificates on my computer, I can see the DN and email fields. They are there, but I think that the router can't read them for some reason. 

This is the cert:

Popa_Marius_0-1658835710896.png

Thank you for taking the time!  

7 Replies 7

I will try first see the Cert. in strongswan 
check the dn 
and e-mail 
are it appear or not ?

cert screenshot added in original post. 

crypto pki certificate map ......
issuer-name .......

can you check if you enter certification map with  issuer-name OR email  
is connect success 

I think that the problem is with the name-mangler rather. 
When I modify the name mangler and use FQDN, it work. 
When I match based on DN or e-mail it doesn't.
I modified the certificate map and I can match based on issuer name. 
The problem is with the user authorization:

*Jul 26 12:33:17.502: IKEv2:(SA ID = 1):[IKEv2 -> AAA] Authorisation request sent
*Jul 26 12:33:17.503: IKEv2:(SA ID = 1):[AAA -> IKEv2] Received AAA authorisation response
*Jul 26 12:33:17.503: IKEv2-ERROR:AAA user author request failed
*Jul 26 12:33:17.503: IKEv2-ERROR:Address type 0 not supported

email username <-

here the issue 
for example 
name......org
the SW will take only the name not full email from the certificate and send it to AAA.
in AAA you must add User name not add User full email.

Will make a test now. 
I have local AAA for now. Tried matching other fields and I still get the error:
Address type 0 not supported
What's the best practice of generating certificates for FlexVPN authentication? 
I'm seeing examples where Windows Server CA was used. 

crypto ikev2 profile FlexLink_OS
description *** VT_FlexLink FlexLink OS Certificates ***
match certificate FlexLink_OS/CERT-MAP
identity local fqdn tt-flexgw4.awsgw.xxxxx.org
authentication remote ecdsa-sig
authentication local ecdsa-sig
pki trustpoint EC-PKI_VPN
dpd 10 3 periodic
aaa authorization group cert list     FlexVPN_AAA/AAA-Author
aaa authorization user cert list   FlexVPN_AAA/AAA-Author    name-mangler email-USR 
virtual-template 5 mode auto
!
crypto ikev2 name-mangler email-USR
email username

I make some change please check it, 
The IKEv2 Author Policy attr. from the AAA
the Cert-MAP need to config