This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

L2TP with 2FA using Windows (native) VPN client

Current setup: UTM with users who VPN in using the native Windows 10 client via L2TP. Users are authenticated through UTM, RADIUS connection to Windows server.

Need 2FA solution.

Already tried:

  • Duo - doesn't work. We have their proxy installed. It works fine for WebAdmin, but for L2TP it fails as the Duo proxy isn't able to handle the MS-CHAPv2 format.
  • OTP function in UTM - doesn't work. We tried some Feitian tokens and it doesn't seem to work. We tried appending the nonce after the password, we tried password - comma - nonce. It doesn't work and the connection fails.

We need to use L2TP with native Windows VPN client because roaming profiles and folder redirection is in use, and the users are synchronizing/authenticating with AD before Windows login occurs.

Any suggestions appreciated.



This thread was automatically locked due to age.
Parents Reply Children
  • That's a good question actually. Let me explain.

    In UTM9, L2TP(over IPSec) and IPSec remote access are two different VPN services.

    L2TP has its origins in PPTP. Since it does not provide security features such as Encryption or strong authentication, it is often combined with IPsec. The combination of these two protocols is known as L2TP over IPsec.

    Now the IPsec Remote Access is simply a host-to-host IPSec connection in tunnel mode. 

    Regards

    Jaydeep