This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

PPTP/L2TP radius Authentication failing

Hello,

I am having an issue where VPN authentication is failing for all users when using radius as the authentication method. Local user authentication is working as long as the user in the user directory has not been created from Active Directory.

The radius server is granting access to the user authentication request, but the XG logs are denying the connection. This occurs for MS_CHAPv2 or PAP authentication requests.

I have tried with both console commands set vpn l2tp authentication MS_CHAPv2 and set vpn l2tp authentication ANY

     

Any suggestions are much appreciated.

Thankyou,
Derek



This thread was automatically locked due to age.
Parents
  • FIXED THIS (it's a heavy handed work-around, but read on).

    I'm having the exact same issue. I got through to a great tech and we've narrowed down this issue with a work-around for now. Although this is not a viable long-term solution, it does actually allow for the RADIUS + L2TP connection to be made. I've confirmed both with Mac / macOS 10.12 and PC / Win10.

    First, make sure you configure your NPS based on this KB article:
    https://kb.cyberoam.com/default.asp?id=2407&SID=&Lang=1&hglt=radius

    Turns out the Sophos XG system is using Cyberroam as it's authentication server.

    Once this is configured as noted above and you are receiving the "Success" message with your "Test Connection" at: Authentication > Servers > *RADIUS SERVER NAME* ... now for the work-around:

    - Under: Authentication > Services > Firewall Authentication Methods > add your RADIUS server > Save
    - Navigate to the external User Portal address of your Sophos (without the :4444 or any port).
    - Log in with your end user's domain account.
    - Log out.
    - Log back in to Sophos management as admin.
    - Navigate: Authentication > Users > select the newly added user
    - Scroll down, ***ENABLE L2TP*** (TA DAAAAA)
    - Sophos requires you enter en email address, that's up to you which email you put in > save changes.
    - CONNECT!

    After we confirmed this works with several accounts I asked for my ticket to be escalated so that this rigmarole isn't necessary and the end-users can log in without these manual changes needing to be made. Hope this helps!

  • Hi Paul,

     

    Did you ever get a response from Sophos when this will be fixed? The issue still exists in SFOS 16.05.6 MR-6.

     

    Kind regards,

     

    C. Wright

  • Hi Wright, 

    The issue should be resolved now . Please check the logs on the XG on console 

    Steps to conduct 

    console> set vpn l2tp authentication MS_CHAPv2

    Take the output using shell command

    #tcpdump -nn port 1812 or port 1813

    #tail -f /log/access_server.log

    #tail -f /log/l2tpd.log

    Post the output when authentication failed, Run the commands and wait for the output and post them here.

     

  • Hello Mr. Patel,

    I didn't mean the authentication, I was referring to the workaround that Paul mentioned to get Authentication to work.

    I mean this part:

    - Under: Authentication > Services > Firewall Authentication Methods > add your RADIUS server > Save
    - Navigate to the external User Portal address of your Sophos (without the :4444 or any port).
    - Log in with your end user's domain account.
    - Log out.
    - Log back in to Sophos management as admin.
    - Navigate: Authentication > Users > select the newly added user
    - Scroll down, ***ENABLE L2TP*** (TA DAAAAA)
    - Sophos requires you enter an email address, that's up to you which email you put in > save changes.
    - CONNECT!

    This workaround is still required to get L2TP to work with Radius credentials. It hasn’t been fixed. An additional odd behavior of the user portal is that user authentication only works if the Radius server allows PAP/SPAP.

    The tcpdump command you listed returns the error % Error: Unknown Parameter 'port'.

    Kind regards,

    C. Wright

  • Assuming this issue is still not fixed, we are seeing the exact same issue on SFOS 17.0.3 MR-3 using PPTP/L2TP and RADIUS authentication.
    The Server shows authentication success using MS-CHAPv2, but the firewall logs "MS-CHAPv2 : Authentication Failed for User"

    The Authentication and encryption are set correctly:

    /log/pptpvpn.log shows:

    Paul's suggestion of setting the PPTP/L2TP enabled on the specific user account in the firewall negates the point of using AD groups to control access.

    It's a workaround, yes, but a PITA when administering many users.

Reply
  • Assuming this issue is still not fixed, we are seeing the exact same issue on SFOS 17.0.3 MR-3 using PPTP/L2TP and RADIUS authentication.
    The Server shows authentication success using MS-CHAPv2, but the firewall logs "MS-CHAPv2 : Authentication Failed for User"

    The Authentication and encryption are set correctly:

    /log/pptpvpn.log shows:

    Paul's suggestion of setting the PPTP/L2TP enabled on the specific user account in the firewall negates the point of using AD groups to control access.

    It's a workaround, yes, but a PITA when administering many users.

Children