Skip to main content

Skyhigh Security is launching standalone documentation portals to support Japanese, German, and French languages. We are not supporting auto-translation. Stay tuned for further updates. Thanks for your support.

Skyhigh Security

Ivanti Neurons Configuration Flow for iOS

Prerequisites

This article assumes your device is already managed with Ivanti Neurons. The enrollment of devices into Ivanti Neurons is not part of the scope for this document.

Configuration Steps

The following 3 configurations will need to be created in Ivanti Neurons cloud console:
1. Configure server root CA certificate
2. Configure Identity Certificate
3. Create VPN Profile and distribute

Configure server root CA certificate

Go to the Configuration tab, search for Certificate configuration, and click on it.

clipboard_ec80a3893a98836db6cc911668047a9c5.png

 

Enter the appropriate name in the Name field.

In the Configuration Setup field, choose the server root CA certificate from the system.

clipboard_e30f7363747d53ecb5cbb9a5244843dc8.png

Click on Next → select in which device certificate to be pushed → click on Done.
For more details on distributing the certificate to a device, refer #3 Step.

Configure Ivanti Neurons with SCEP Server

Step1 : Configure Certificate Authority


1. Login to Ivanti Neurons.
2. Navigate to Admin → Certificate Authority ( on the left-hand pane )→ Add.
3. Select Create a Standalone Certificate Authority → Continue and fi ll in the CA Certificate details and Click Generate.

clipboard_e4fb43fbb31eff23e733a57457c35ce79.png

You will now be able to see the generated CA Authority as shown above in the image.

Configure Identity Certificate

Step1: Go to Configurations tab, search for Identity Certificate configuration, and click on it.

Step 2: Configure Identity Certificate Template

  1. Navigate to Configurations → Add → Identity Certificate
  2. From Configuration, Setup chooses Dynamically Generated.
  3. Select Source as the Certificate Authority you created in the previous step, fi ll in details.
  4. Test Configuration and Continue→ Select distribution→Save.

clipboard_e38bcd7bf3e9f2c09c072f2835db8a52f.png

clipboard_e48b177c0abc5712612612bd134b779db.png

Create VPN Profile and distribute

Go to the Configurations tab, search for VPN configuration, and click on it.

clipboard_e96b07b83007898ac70dabedb6b7867f2.png

Enter all the required fields in the profile configuration.

clipboard_ee6de23e288b9c6f88f50e0408fdb0f72.png

For example, the following are the values used in Dev/QA testing:

Fields Values
Server

c49493498.vpn.mcafee-cloud.com
Get this information from MVision cloud ->certificate page

clipboard_e8df5aac374896594500d4e7604d15508.png

Connection Type IKEv2
Local Identifier Client_Key1
(This string is SAN -(Subject Alternate Name ) of client certificate)
Remote Identifier vpn.mcafee-cloud.com
(This string is SAN -(Subject Alternate Name ) of client certificate)
Enable EAP true
TLS Minimum Version N/A
TLS Maximum Version N/A
EAP Authentication Certifi cate
Credential IPsecContainer:ClientCertsIdentityForTest
Dead Peer Detection Rate Medium
Server Certificate Issuer Common Name VPN Server Root CA
(This string is CN-Common Name of server root certifi cate)
Server Certificate Common Name vpn.mcafee-cloud.com
(This string is CN-Common Name of server root certifi cate)
Use IP4 andIP6 subnetsattributes true
Enable IKEv2Mobility andMultihomingProtocol(MOBIKE) true
Enable PerfectForwardSecrecy (PFS) true
Enable IKEv2redirect true
Enable NATkeepalive true
NAT keepaliveinterval 20 second(s)
IKE SAParams
&
Child SAParams
Encryption Algorithm: AES-256
Encryption Algorithm: SHA2-256
Diffi e Hellman Group: 2
Lifetime In Minutes: 1440
Proxy Setup None

 

Distributing/Pushing the profile : Click on Next , click on Custom or All Devices.

clipboard_e69999e556b5bc8d67642be3a1cb29ef4.png

If it is Custom , select in which mobile configuration to be pushed.

Click on Done.

clipboard_e8814c545daa03f0d2197b15697e3012e.png

For Force Check-in, go to Devices tab → click on Actions → select Force Check-in.

clipboard_ed4dc75a8f04340ce9b34b02a73303a4b.png

This opens a new window with the " Force Check-in " button. Click on that button, then the configuration will be pushed immediately.

clipboard_e7b8312cb39007f6b2482cb4332821100.png

Check the status of the configuration Push

To check the pushed configuration status, Go to Devices tab, click on the registered device, and check the status of configuration.

clipboard_e8c7c6271296a02bff3d9415f8e32b6b0.png

Verify the VPN profile on your device

Verify the distributed VPN profile in the IOS device (Settings → VPN):

clipboard_e0f93d60d21a1cdf39533f128b33421df.png

clipboard_e27e7e8492ec4fdd7cde2ecab271c49ea.png

 

 

 

  • Was this article helpful?