How To Configure C2S VPN With AzureAD and 2FA
How To Configure C2S VPN With AzureAD and 2FA
How To Configure C2S VPN With AzureAD and 2FA
Customer would like to do 2FA for their remote access VPN solution on SMB and Enterprise gateway,
they are a Microsoft shop with On-Prem AD and AzureAD.
Customer would like to have the option for SMS, email or SmartPhone App to perform the 2FA, they
however do NOT want to use hardware tokens.
1 x 3200 (R80.40)
1 x Windows 10 PC
Check Point
1. Factory wipe of a SMB 750
2. Installed latest firmware
3. Enabled VPN blade
4. Setup radius connection
Client PC
1. Install Windows 10
2. Download and install Check Point VPN client (SecureClient)
3. Create VPN site
4. Test connection
Steps
Assumptions -
1. You have an active Azure sub with a p2 subscription, this is required for AzureAD 2fa
2. Active Directory is installed and working
3. Windows 10 Host is installed and working
4. You have all applicable licenses for Check Point and Microsoft
5. You created a “Custom Domain” under AzureAD that matches your onprem domain, to
ensure syncin of hash’s the UPN’s for AzureAD and On-Prem AD must be the same.
We will pick this up after step #3, so AD is installed and working. Nothing special was done to
get AD working, it is a standard 2019 deployment with DNS, NPS and AD installed. This was a
new deployment so during the DCPROMO command a new forest was created.
This is an oldschool app, but great for doing basic testing of a radius server
and hit SEND, if everything works you will see a response from the radius server that says....
response: Access-Accept
Azure AD Connect
Users can use a single identity to access on-premises applications and cloud services such as
Office 365.
Single tool to provide an easy deployment experience for synchronization and sign-in.
Provides the newest capabilities for your scenarios. Azure AD Connect replaces older versions of
identity integration tools such as DirSync and Azure AD Sync. For more information, see Hybrid
Identity directory integration tools comparison.
1. Login to the Azure portal, and click on Azure Active Directory on the left.
2. Scroll down to “Properties” and click it
3. Copy the “Directory ID” to a notepad for later use
4. Click on Users
5. Click on “New User”
6. Create a new user under the “custom domain” and assign it “Global Administrator” roles
7. Login to your local AD server
8. Download the MSI from - https://www.microsoft.com/en-us/download/details.aspx?id=47594
9. Once downloaded, install it
10. During the install process it will ask for your AzureAD admin account and your On-Prem Admin
account.
11. If everything is good, the process will end with ADConnect syncing your on-prem AD to Azure
The Network Policy Server (NPS) extension for Azure MFA adds cloud-based MFA capabilities to your
authentication infrastructure using your existing servers. With the NPS extension, you can add phone
call, text message, or phone app verification to your existing authentication flow without having to
install, configure, and maintain new servers.
This extension was created for organizations that want to protect VPN connections without deploying
the Azure MFA Server. The NPS extension acts as an adapter between RADIUS and cloud-based Azure
MFA to provide a second factor of authentication for federated or synced users.
8. NAS/VPN Server receives requests from VPN clients and converts them into RADIUS requests to
NPS servers.
9. NPS Server connects to Active Directory to perform the primary authentication for the RADIUS
requests and, upon success, passes the request to any installed extensions.
10. NPS Extension triggers a request to Azure MFA for the secondary authentication. Once the
extension receives the response, and if the MFA challenge succeeds, it completes the
authentication request by providing the NPS server with security tokens that include an MFA
claim, issued by Azure STS.
11. Azure MFA communicates with Azure Active Directory to retrieve the user's details and
performs the secondary authentication using a verification method configured to the user.
1. Login to the AD Server
2. Download the MSI from - https://aka.ms/npsmfa
3. Install
4. Run Windows PowerShell as an administrator.
5. Change directories.
6. cd "C:\Program Files\Microsoft\AzureMfa\Config"
7. Run the PowerShell script created by the installer.
8. .\AzureMfaNpsExtnConfigSetup.ps1
9. Sign in to Azure AD as an administrator.
10. PowerShell prompts for your tenant ID. Use the Directory ID GUID that you copied from the
Azure portal in the prerequisites section.
11. PowerShell shows a success message when the script is finished.
12. Reboot the Server
At this point every RADIUS request sent to the NPS server will be sent to AzureAD for MFA
Azure AD
There are a few items that should be enabled within AzureAD to ensure self enrollement to MFA
At this point 2fa will be enabled but not working as Azure does not know the phone numberr or email of
the user
be sent -
Testing with NTRADPING
So now that everything should be working we can test the MFA sms function.
4. As you should see, the “Reply-Message” should say “Enter your microsoft verification code”
5. Within a few seconds you should also get an SMS with your OTP
The VPN setup of a 750 (or any embedded device) is the same process