PeeluckyDuckee
Diamond Member
I've setup enterprise root CA on one computer, and a sub enterprise CA on another. Have acquired both user and computer certificate for both computers.
When I try to create a VPN to the the enterprise subordinate CA computer I get the message:
"Error 919: The remote computer refused to be authenticated using the configured authentication protocol. The line has been disconnected."
What am I doing wrong? I remember doing this in a lab at school once and it worked. Hmmm...
Also, when I create an IPSEC policy on both computers and try to see if it works by hitting on the other computers shares by doing \\whatever I get a list of Active Associations (20+) created. Huh? I only make one connection, why so many active associations?
When I hit the command prompt and go ipconfig /all I get two WAN connections. One has an IP of 192.168.1.101 and DNS server of 127.0.0.1 The weird thing is the VPN has already been disconnected, yet it still remains in the system and still accessible by the 192.168.1.101 IP. I'm at a lost here 😕
One last thing, when you create an IPSEC policy. When can you use a "tunnel", and if you set it up how can you test to see if it really worked? Thx.
Plucky
When I try to create a VPN to the the enterprise subordinate CA computer I get the message:
"Error 919: The remote computer refused to be authenticated using the configured authentication protocol. The line has been disconnected."
What am I doing wrong? I remember doing this in a lab at school once and it worked. Hmmm...
Also, when I create an IPSEC policy on both computers and try to see if it works by hitting on the other computers shares by doing \\whatever I get a list of Active Associations (20+) created. Huh? I only make one connection, why so many active associations?
When I hit the command prompt and go ipconfig /all I get two WAN connections. One has an IP of 192.168.1.101 and DNS server of 127.0.0.1 The weird thing is the VPN has already been disconnected, yet it still remains in the system and still accessible by the 192.168.1.101 IP. I'm at a lost here 😕
One last thing, when you create an IPSEC policy. When can you use a "tunnel", and if you set it up how can you test to see if it really worked? Thx.
Plucky