When initializing a VPN tunnel using the IKEv2/IPsec protocol, the user is authenticated using login and password via Radius. To connect VPN clients to the corporate network, NGFW needs to be configured for working in the VPN server role and the user with the UserGate Client software installed acts as a VPN client.
The VPN client initiates the process of establishing a VPN tunnel with the VPN server by sending an IKE_AUTH message. The server responds to the client that authorization via EAP-MSCHAPv2 is required. The client exchanges several EAP packets with the server. The VPN server broadcasts EAP packets via RADIUS to the domain RADIUS server, which makes the authentication decision. Next, after receiving a positive response from the RADIUS server, the VPN server, using the received login, requests the domain for this user and asks all of its groups, then a decision is made whether this user can connect to the VPN server.
Name |
Description |
---|---|
Step 1. Allow the VPN service in the zone to which VPN clients will connect. |
In the Network ➜ Zones section, edit the access control settings for the zone to which VPN clients will connect and enable the VPN and Connecting endpoints services. Usually, this is the Untrusted zone. |
Step 2. Create a zone where the clients connecting using a VPN will be placed. |
In the Network ➜ Zones section, create a zone where the clients connecting through a VPN will be placed. This zone can later be used in security policies. |
Step 3. Create a NAT rule for the newly created zone. |
In order for connected VPN clients to be able to access the Internet through the NGFW tunnel, it is necessary to create a NAT rule from the VPN for remote access zone to the Untrusted zone. Create the corresponding rule in the Network policies ➜ NAT and routing section. As an example, a rule named NAT from VPN for remote access to Trusted and Untrusted is created in NGFW that allows IP address substitution from the zone VPN for remote access to the Trusted and Untrusted zones. |
Step 4. Create a firewall rule that allows traffic from the zone created earlier. |
In the Network policies ➜ Firewall section, create a firewall rule that allows traffic from the zone you created to other zones. |
Шаг 5. Create authentication profile. |
Create a profile for VPN users in the Users and devices ➜ Auth profiles section. Specify the Authentication method. Note that transparent authentication methods such as Kerberos, NTLM, or SAML IDP cannot be used for VPN authentication. VPN supports multi-factor authentication. The second factor can be received in the form of TOTP single-use codes. To enter the second authentication factor, the user connecting to the VPN server should provide their password as follows: password:single_use_code where password is the user's password : is a separator single_use_code is the second authentication factor. For more details on authentication profiles, see the Authentication Profiles section. |
Step 6. Create a VPN server security profile. |
In the VPN security profile settings, the encryption and authentication algorithms are defined. Multiple profiles may be used for connecting to different client types. In the VPN section, security profiles are created for the VPN server and client. To create a VPN server security profile, go to VPN ➜ Server security profiles, click Add, and fill in these fields:
Next, the settings for the first and second phases of tunnel negotiation need to be configured. In the first phase, IKE security is negotiated. The authentication is done using a pre-shared key in the mode selected earlier. Provide the following settings:
In the second phase, the method for securing IPsec connections is selected. You need to specify the following:
|
Step 7. Create a VPN interface. |
A VPN interface is a virtual network adapter that will be used to connect VPN clients. This is a cluster-type interface, which means that it will be created automatically on all UserGate nodes included in a configuration cluster. If an HA cluster exists, in case any problems are identified with the active server, VPN clients will be automatically switched to a backup server, and without terminating existing VPN connections. In the Network ➜ Interfaces section, click Add and select Add VPN. Provide the following settings:
|
Step 8. Create a VPN network. |
A VPN determines the network settings that will be used for connecting the client to the server. This is primarily the assignment of IP addresses to the clients inside the tunnel, the DNS settings, and the routes that will be passed to the clients that support the use of routes assigned to them. Multiple tunnels may be used with different settings for different clients. To create a VPN tunnel, go to VPN ➜ VPN networks, click Add, and fill in these fields:
|
Step 9. Create a VPN server rule. |
Create a VPN server rule using the VPN network, interface, and profile created earlier. To create the rule, go to VPN ➜ Server rules, click Add, and fill in these fields:
For more information on setting up two-factor authentication via TOTP for VPN connections, see the Multi-Factor Authentication with Time-Based One-Time Passwords (TOTP) section.
Important! The traffic processing logic is as follows:
-- The conditions are combined using Boolean OR, if several IP address and/or domain lists are specified. -- The conditions are combined using Boolean AND, if GeoIPs and IP address and/or domain lists are specified.
In NGFW, there is a default server rule named Remote access VPN rule that provides the required settings for a Remote Access VPN, and VPN access is allowed to the members of the local group VPN users. Important! To apply different server rules to different clients, use the Source zone and Source address settings. The Users setting does not govern the selection of a server rule, as the user is checked only after the VPN connection has been established.
|
Step 10. Configure a VPN connection on the client computer. |
When authentication is done using the EAP protocol with MSCHAPv2 (AAA) method, specify the user authentication credentials (Login/Password). To configure a VPN connection on a user's computer, provide these settings:
For more details on using UserGate Client endpoints in conjunction with NGFW, see the UserGate Client Endpoints section. |