Authenticating VPN Users

Genians RADIUS Server can be used as the Authentication Server for your VPN environment. You can also limit which users can authenticate with the RADIUS Server.

../../_images/vpn-radius.png

Integrating the Radius Server

First, ensure that the RADIUS Server is properly configured, and that your settings are compatible with your VPN environment.

See: Configuring RADIUS Enforcement

Next, configure Genian ZTNA as an Authentication Server in your VPN settings, by entering the Shared Secret, Server Address, Authentication Port, Accounting Port, and other info, as shown in the example below:

../../_images/cisco_vpn_radius_integration_1.png

Configuring Authentication Restrictions

In some situations, you may wish to place restrictions on who can authenticate using the RADIUS Server. This can be accomplished by configuring an RADIUS Policy, and setting the Access Policy to REJECT.

  1. Go to Policy in the top panel.
  2. Go to Policy > RADIUS Policy in the left panel.
  3. Click Tasks > Create
  4. For General, input Name, Priority, and activation Status.
  5. For Conditions, select Attribute.
  6. Select Operator and Value.
  7. Click Add button.
  8. For Policy, choose to REJECT Authentication Requests that match the attribute conditions.
  9. Click Add button.
  10. Click Create button.

When an Authentication request meets the conditions defined, it will be rejected, unless it also meets the conditions of a policy with a higher priority.