This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Problems with AD Authentication and PPTP VPN Access

I am having issues setting up VPN access authenticated through Active Directory.  I have my active directory servers added to the list of authentication servers, and I confirmed that I am now able to log in to the user portal using my AD credentials.

In Authentication Services, I have the Active Directory servers selected as authentication servers for VPN, and they are listed higher than "Local."  I also confirmed that for my AD user, L2TP and PPTP are both checked (I am trying to use PPTP).

I also created a Local user for testing, and configured all of the settings to mirror what I set for my AD user (user name and password are both different, however).

I am able to connect to the VPN without issue using the Local user, but not using the AD user.  In the Sophos log viewer, for my AD attempts, it just tells me that the VPN Authentication FAILED, and Auth Mechanism shows all three approved methods (AD, AD, Local).  For the local user, I see SUCCESSFUL entries for VPN Authentication with the Auth Mechanism listing "Local," and then there are some followup entries for Firewall Authentication.

Any thoughts on why the AD authentication is failing for the VPN connection, but not for the portal?



This thread was automatically locked due to age.
Parents Reply Children
  • Nothing in the L2TP logs (have not tried connecting that way) but there is some data in the PPTP logs.  I don't understand all of what I am looking at.  Here are lines that appear to be related to the failure (I removed account names and IP addresses).

    crauth_chap_verify called
    crauth_pap_auth: REMOTE IP ADDRESS: '[removed]'
    Peer [removed] failed CHAP authentication
    sent [CHAP Failure id=0xa "The system could not log you on. Make sure your password is correct"]
    sent [LCP TermReq id=0x3 "Authentication failed"]
    rcvd [LCP TermAck id=0x3 "Authentication failed"]

  • Tim007,

    thank you for your output. On userA (your AD user) make sure PPTP is enabled (by default is disabled). Go to Objects > Identity > Users, select your user and enable PPTP. See Screenshot.


    Try to connect using PPTP again.

  • Yes, PPTP is enabled.  This is what mine looks like:

  • After some analysis of the tcpdump output, it appears that the XG firewall is not forwarding the AD requests to the AD controller when using a PPTP VPN.  Weird the other authentications are working okay (SSL-VPN and User Portal), but not PPTP VPN.

  • I suspect you issue here is a miss match in the authentication method, the default authentication method for L2TP and PPTP is MS CHAP v2 which will require authentication via a RADIUS server (such as NPS). In order to directly authenticate against Active Directory Services directly you will need to modify the authentication method, this can be performed at the console.

    Execute the following command to set authentication method for L2TP users:

    console> set vpn l2tp authentication <ANY/CHAP/MS_CHAPv2/PAP>

                                                          OR

    Execute the following command to set authentication method for PPTP users:

    console> set vpn pptp authentication <ANY/CHAP/MS_CHAPv2/PAP>

    You can try either PAP or ANY. However from a security perspective I would strongly recommend you implement NPS and use MS CHAP v2

  • Leon and TIm,


    today I found the time to test PPTP and L2TP. PPTP works with local user (does not matter if MSCHAP-v2 and Strong Encryption is enabled), while using AD Users, PPTP ends with "Bad Username or Password). I left enabled MSCHAP-v2 and Strong Encryption.

    L2TP is not working even using local user. In both phase 1 and 2, peer requests to delete the session.

    Using SSL, I can connect to XG using both local and AD users. AD Users have been added to both PPTP and L2TP Member Group and on their account PPTP and L2TP is enabled.

    If you need any log from my XG, let me know.

  • Hi Luk,

    As mentioned if you wish to authenticate directly against Active Directory you need to downgrade your authentication mechanism.

    Execute the following command to set authentication method for L2TP users:

    console> set vpn l2tp authentication ANY

                                                          OR

    Execute the following command to set authentication method for PPTP users:

    console> set vpn pptp authentication ANY

    If you require strong authentication you will need to move to using a RADIUS server to connect to Active Directory, you can use NPS.

  • Hi Leon,

    sorry if I enter on this thread but, without rewriting all, I'm in the exact same situation and, also with your console command fix, the authentication don't works.

    So this is the check list:

    1- PPTP and L2TP enabled and the address range is correctly configured (VPN->L2TP settings or VPN->PPTP)

    2- In L2TP connections there is the L2TP configuration correctly configured (with preshared key method)

    3- The specific domain user has the right to access both VPN type in the user configuration (Authentication-> Users)

    4- This user is also a member of PPTP and L2TP (in the VPN->PPTP->Add Memeber)

    5- VPN has the three AD Server as the primary authentication method, and last local authentication

    6- The firewall rule is correct dedicated to the configured user and the FROM is VPN Zone

    7- VPN zone has NTLM enabled (Administration -> Device Access)

    8- set vpn pptp authentication ANY and set vpn l2tp authentication ANY command entered in console

     

    I'm trying with an android devices (android 6.0) using both user/password or user@domain/password or domain\user / password

    So, with all this done, I continuosly get error on authentication on the firewall logs.

    With a local user, with local authentication, all works fine.

    This domain user can correctly log on user portal using user/password (without the domain) so AD Authentication is working.

    Have I lost something in the configuration?

  • Just 2 more tests:

    IPSEC not working also

    SSL VPN works like charm with OpenVPN and AD Authentication

  • Good!

    You are in the same situation as mine. [:'(]