This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Problems with AD Authentication and PPTP VPN Access

I am having issues setting up VPN access authenticated through Active Directory.  I have my active directory servers added to the list of authentication servers, and I confirmed that I am now able to log in to the user portal using my AD credentials.

In Authentication Services, I have the Active Directory servers selected as authentication servers for VPN, and they are listed higher than "Local."  I also confirmed that for my AD user, L2TP and PPTP are both checked (I am trying to use PPTP).

I also created a Local user for testing, and configured all of the settings to mirror what I set for my AD user (user name and password are both different, however).

I am able to connect to the VPN without issue using the Local user, but not using the AD user.  In the Sophos log viewer, for my AD attempts, it just tells me that the VPN Authentication FAILED, and Auth Mechanism shows all three approved methods (AD, AD, Local).  For the local user, I see SUCCESSFUL entries for VPN Authentication with the Auth Mechanism listing "Local," and then there are some followup entries for Firewall Authentication.

Any thoughts on why the AD authentication is failing for the VPN connection, but not for the portal?



This thread was automatically locked due to age.
  • Tim007,


    can you try the SSL VPN and check if it works with AD user?

  • Tim007,

    if using SSL works, check the L2TP logs from cli, using this command:

     show vpn L2TP-logs

    Also check that on User properties, L2TP and PPTP is enabled.

  • Connecting using SSL VPN works.

  • Nothing in the L2TP logs (have not tried connecting that way) but there is some data in the PPTP logs.  I don't understand all of what I am looking at.  Here are lines that appear to be related to the failure (I removed account names and IP addresses).

    crauth_chap_verify called
    crauth_pap_auth: REMOTE IP ADDRESS: '[removed]'
    Peer [removed] failed CHAP authentication
    sent [CHAP Failure id=0xa "The system could not log you on. Make sure your password is correct"]
    sent [LCP TermReq id=0x3 "Authentication failed"]
    rcvd [LCP TermAck id=0x3 "Authentication failed"]

  • Tim007,

    thank you for your output. On userA (your AD user) make sure PPTP is enabled (by default is disabled). Go to Objects > Identity > Users, select your user and enable PPTP. See Screenshot.


    Try to connect using PPTP again.

  • Yes, PPTP is enabled.  This is what mine looks like:

  • After some analysis of the tcpdump output, it appears that the XG firewall is not forwarding the AD requests to the AD controller when using a PPTP VPN.  Weird the other authentications are working okay (SSL-VPN and User Portal), but not PPTP VPN.

  • I suspect you issue here is a miss match in the authentication method, the default authentication method for L2TP and PPTP is MS CHAP v2 which will require authentication via a RADIUS server (such as NPS). In order to directly authenticate against Active Directory Services directly you will need to modify the authentication method, this can be performed at the console.

    Execute the following command to set authentication method for L2TP users:

    console> set vpn l2tp authentication <ANY/CHAP/MS_CHAPv2/PAP>

                                                          OR

    Execute the following command to set authentication method for PPTP users:

    console> set vpn pptp authentication <ANY/CHAP/MS_CHAPv2/PAP>

    You can try either PAP or ANY. However from a security perspective I would strongly recommend you implement NPS and use MS CHAP v2

  • Leon and TIm,


    today I found the time to test PPTP and L2TP. PPTP works with local user (does not matter if MSCHAP-v2 and Strong Encryption is enabled), while using AD Users, PPTP ends with "Bad Username or Password). I left enabled MSCHAP-v2 and Strong Encryption.

    L2TP is not working even using local user. In both phase 1 and 2, peer requests to delete the session.

    Using SSL, I can connect to XG using both local and AD users. AD Users have been added to both PPTP and L2TP Member Group and on their account PPTP and L2TP is enabled.

    If you need any log from my XG, let me know.

  • Any update from Sophos staff?

    Thanks