Configure VPN 2FA via PortalGuard RADIUS (Optional)
The following steps are specific to Cisco VPNs, but similar steps can be used for other VPN vendors.The PortalGuard RADIUS configuration steps will be identical.
On the VPN side using Cisco ASDM:
Create new AAA Server Group
Add AAA Server
Create Remote Access Connection Profile
On the PortalGuard side using PortalGuard Configuration Editor:
Enable Radius Configuration
Change Windows Firewall on PG server to allow inbound access to 1812 & 1813 over UDP
Create new client configuration
With the VPN Client:
Point the profile being used (or create a new one) at PortalGuard instead of locally. Users will now be able to use their AD logins.