I've got a RRAS VPN setup using IKEv2 and certs issued by the domain's CA. It has a cert for the public domain and I know this is getting presented to the client.
How ever it seems that either the server is sending the wrong cert, or is sending all its server authentication certs which includes one issued by MS-Organization-P2P-Access [2022]. This of course isn't trusted by the clients who then kick it back.
Looking at Get-VpnAuthProtocol
I can see that its told to use the domain's CA.
Not sure how I tell RRAS to use the right cert.