Description
When trying to initiate a connection with Clavister OneConnect Client you may get the following error.
Windows: Server certificate is not trusted by Windows
iOS: Invalid certificate format
Background
Certification validation is done in several steps.
- First Client initiates a connection to the configured NetWall (vpnserver.mydomain.com).
- Next, the Netwall presents it's system certificate. The subject field needs to contain the correct DNS name(s) (FQDN), either vpnserver.mydomain.com (or *.mydomain.com when using a wildcard certificate).
- If the first two steps are successful the certificate will be checked against the clients system certificate store.
If there is a mismatch (for example you enter the IP address instead of the FQDN, or the certificate is not trusted) you get the described error.
Common Windows VPN client Errors that are related to certificate mismatch
- Windows: Server certificate is not trusted by Windows.
- Windows: Server Certificate is not valid for the requested usage. This error is also returned if the certificate has an invalid name.
Solution
- Make sure that your certificate fits the requirements and has the correct FQDN
- Import the certificate incl. private key in your NetWall under /Objects /General /Key Ring. Type must show as Local.
- Select the certificate as HTTPS certificate under /System /Device /Device Settings /Remote Management → /Advanced Settings
Be aware that this is also the certificate of your Web-User-Interface! - Import the certificate to your clients system certificate store.
- If the certificate is bought from a well-known CA authority you should be able to skip this step, as your computer already trusts the according CA.
- If the certificate is self-signed then you need to import it on all clients using OneConnect. Please follow the documentation of your operating system on how to do this.
- Note: The private key should not be exported.
Using public certificates in Clavister NetWall (cOS Core) for OneConnect
If you want to use a public certificate for your clients, please refer to the following article in this Knowledge Base: Configuring public certificates in NetWall firewalls
Using self-signed certificates in Clavister NetWall (cOS Core) for OneConnect
An example on how to generate a self-signed certificate from Cos Core itself.
- Navigate to Object->Key Ring
- Click the drop-down menu Add->Certificate
- Provide a name to the Certificate (eg., Oneconnect_160)
- Under Generate Certificate Sub-menu ->Click Configure->It will open a Certificate Generator Pop-Up window.
5. Select the Certificate Type as Self-Signed.
6. Provide the Subject Name and Subject Alternative Name along with Key size and Type details.
Example:
- Subject name = CN=Clavister
- Subject Alternative Names = 10.122.137.160
- Public Key Type : RSA or EC
- Key Size : 2048 bits
- Signature Algorithm : SHA-256
- Validity : 365 days
7. Click Generate.
8. Once when the certificate is successfully generated, verify and download.
Important: Client hostname must match certificate hostname
A specific requirement when using certificates with the OneConnect Interface is that the
hostname value entered into the clientmust be the same as either the Common Name
(CN) or one of the Subject Alternative Name (SAN) options in the certificate used by the
cOS Core OneConnect Interface**.
Note that the One connect VPN client profile must be specified with a IP Address or a FQDN that matches with the certificate in the Cos Core.
The above image is taken from the Windows One connect VPN client
9. Select the certificate as HTTPS certificate under /System /Device /Device Settings /Remote Management → Advanced Settings.
10. Import the certificate to your client system certificate store.
Additional Notes
Certificate validity period max. one year
If you are using public certificates, please make sure that they are valid no longer than one year. SSL/TLS certificates issued after September 1, 2020 with a validity period greater than 398 days will not be trusted by Apple’s Safari browser and iOS/iPadOS/ devices for security reasons.
Self-signed certificates should not be affected by this rule as per today. But that could change anytime.
Related articles
15 Jan, 2024 dictionary troubleshoot core stream incontrol incenter oneconnect cloudservice
13 Jun, 2022 oneconnect macos ios windows android
3 Jun, 2022 oneconnect openconnect sslvpn
26 Mar, 2024 oneconnect sase cloud
5 Feb, 2024 oneconnect sase
28 Apr, 2023 openconnect oneconnect macos ios iphone
18 Mar, 2024 core certificate oneconnect ipsec vpn
28 Feb, 2024 oneconnect windows
23 Aug, 2022 sslvpn openconnect oneconnect android core
29 Oct, 2021 sslvpn openconnect oneconnect windows
13 Oct, 2021 oneconnect macos openconnect ios
9 Feb, 2024 core oneconnect windows splittunneling dns
2 Feb, 2021 core sslvpn macos certificate
18 Mar, 2024 core incontrol certificate oneconnect ipsec vpn
27 Oct, 2022 oneconnect log
5 Mar, 2021 sslvpn openconnect oneconnect linux core
8 Apr, 2021 core sslvpn oneconnect interfaces arp
25 Feb, 2022 oneconnect windows howto
10 Oct, 2024 sase oneconnect core userauth
27 Feb, 2024 oneconnect userbased core
23 Aug, 2022 core oneconnect
28 Nov, 2022 core configuration oneconnect
9 Oct, 2024 oneconnect sase cloud radius
25 Nov, 2022 core configuration sslvpn management
29 Jun, 2021 core oneconnect
11 May, 2023 oneconnect certificate howto
27 Aug, 2024 oneconnect windows
8 Jun, 2022 openconnect oneconnect android
23 Aug, 2022 sslvpn openconnect oneconnect macos windows linux core