Configure VPN 2FA via PortalGuard RADIUS (Optional)

 

The following steps are specific to Cisco VPNs, but similar steps can be used for other VPN vendors.The PortalGuard RADIUS configuration steps will be identical.

Summary

On the VPN side using Cisco ASDM:

Create new AAA Server Group

Add AAA Server

Create Remote Access Connection Profile

On the PortalGuard side using PortalGuard Configuration Editor:

Enable Radius Configuration

Change Windows Firewall on PG server to allow inbound access to 1812 & 1813 over UDP

Create new client configuration

With the VPN Client:

Point the profile being used (or create a new one) at PortalGuard instead of locally. Users will now be able to use their AD logins.