This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

L2TP over IPSec - Enforce OTP for local auth?

Hi everyone

As the Windows Surface RT tablet doesn't support SSL VPN and doesn't have any third-party SSL VPN clients available for download neither, I have configured "L2TP over IPSec" on my Sophos UTM Home 9.308-16.

There is a local user I am using for that purpose - with a password and OTP.

On my Surface tablet, I have created a VPN profile using the following Powershell command:
Add-VpnConnection -Name  -ServerAddress 
 -TunnelType L2tp -L2tpPsk  -Force


The connection will establish successfully, HOWEVER, it does not require the OTP to be entered. Upon connecting, I only enter the Username and Password on the tablet, and the connection will succeed.

I believe this is a security risk and am asking myself, why wouldn't the Sophos require the OTP to be entered for L2TP over IPSec? (It requires the OTP for SSL Remote Access and wouldn't let the user connect if not entered)

Am I missing something?
How can I enforce the OTP for L2TP over IPSec?

In the Authentication Services section on my Sophos, I have set the following:
- One-time Password
-- All users must use one-time passwords
-- Enable OTP for facilities:
--- User Portal
--- IPSec Remote Access
--- SSL Remote Access

In "L2TP over IPSec", the following settings are defined:
- Authentication Mode: Preshared Key
- Authentication via: Local

Thank you very much for your support!

Have a good weekend!


This thread was automatically locked due to age.
Parents Reply Children
  • I ran into the same problem so when I found this thread, although it saved me a lot of time, I was rather disappointed. That L2TP wasn't listed under facilities didn't escape my attention, but since L2TP is often referred to as L2TP/Ipsec, I assumed it fell under that category.

    So, I guess that apart from telling myh users they'll have to use OTP, I will also need to tell them they have to use SSL VPN. Tough job :-(