If you need to renew the Always On VPN IKEv2 server certificate, here are three lines that will help you. Assuming you have the right certificate and the thumbprint, execute the following commands on the VPN server:
Here are the ADCS Templates needed for the deployment:
VPN Server Authentication
Make sure you leave Authenticated Users. Add Autoenroll to Ras and IAS Servers.
In Application Policies, Add IP Security IKE Intermediate
Allow the private key to be exported.
VPN Authentication Offline (Make a duplicate of the template that you just created)
Subject Name – Supply in the request
VPN User Authentication
Add the group that will contain the VPN Users
Do not make the key exportable.
You might not need the Microsoft Software Key Storage Provider. If you test the client side on a VM though, the user will not be able to obtain the certificate, because the client computer needs a TPM chip. By selecting the Software Key Storage Provider a certificate is still obtainable.
Next, VPN Computer Authentication
Add the group containing the VPN Computers. Computers will use a device tunnel and have access to the Domain Controllers and PKI infrastructure.
Edit the existing template Domain Controller Authentication. Make sure that KDC Authentication and Smart Card Logon is added.
Auto enrollment should be active. Just double check.
Add the templates that were just created.
If there is no GPO for Certificate Auto Enrollment, create one at the top of the Domain on the User and Computer Level (Policies > Windows Settings > Security Settings > Public Key Policies > Certificate Services Client – Auto Enrollment):
Now, let’s configure the NPS server. Just install the feature through Server Manager (I skipped that part here).
Register the server in Active Directory.
Add a new Radius Client (which will be the RRAS Server outside of the Domain, in a DMZ network). Save the Shared secret externally. It will be added to the VPN server as well.
Open the properties of the server > Security. Set the Shared secret that was automatically generated on the Radius server. Insert the IP of the Radius server. Communication is done through Port 1812 UDP.
Select the imported certificate.
Under IPv4 specify the VPN clients network settings.
Disable the unused Ports.
Same thing for Wan Miniport L2TP, PPTP and PPOE
To allow the device tunnel, run these PowerShell commands. The device will not be authenticated by the NPS server, instead the RRAS server will validate if the certificate is valid and issued by the Certificate Authority that we trust.
Ports 4500 and 500 UDP must be reachable from the internet. The NAT rule should point to the VPN server.
To deploy the user and device tunnel check out the references at the end. Both scripts must be executed as SYSTEM user. I used Task Scheduler to execute the PowerShell scripts as SYSTEM.
If you need help, let me know. It is fairly straight forward, but you should take your time and thoroughly read the documents before testing.