Firebox Mobile VPN with IKEv2 Integration with AuthPoint for Microsoft Entra ID Users
Deployment Overview
This document describes how to set up AuthPoint multi-factor authentication (MFA) for Microsoft Entra ID users that use Mobile VPN with IKEv2. Your Firebox must run Fireware v12.10.4 or higher to authenticate Microsoft Entra ID users with the AuthPoint authentication server.
This integration guide is for the Firebox. To configure MFA for Microsoft Entra ID users that use Mobile VPN with IKEv2 with Firebox Cloud, see Firebox Cloud Mobile VPN with IKEv2 Integration with AuthPoint for Microsoft Entra ID Users.
To configure AuthPoint MFA for Active Directory users that use Mobile VPN with IKEv2, see Firebox Mobile VPN with IKEv2 Integration with AuthPoint for Active Directory Users.
Your WatchGuard Firebox must already be deployed and configured before you set up MFA with AuthPoint.
Contents
Integration Summary
The hardware and software used in this guide include:
- Firebox with Fireware v12.10.4 or higher
- Windows Server 2019 with Microsoft Network Policy Server (NPS)
WatchGuard Firebox Authentication Data Flow with AuthPoint
AuthPoint communicates with various cloud-based services and service providers. This diagram shows the data flow of an MFA transaction for a WatchGuard Firebox.
Before You Begin
Before you begin these procedures, make sure that:
- You have a Microsoft Entra ID global administrator account
- You have an active Azure subscription
- You have installed and configured Microsoft Entra Domain Services
- You have installed Network Policy and Access Services, which includes Network Policy Server (NPS)
- You have joined NPS to your Microsoft Entra Domain Services managed domain
- A token is assigned to a user in AuthPoint
- You have registered and connected your Firebox to WatchGuard Cloud as a locally-managed Firebox or a cloud-managed Firebox (see Add a Locally-Managed Firebox to WatchGuard Cloud and Add a Cloud-Managed Firebox to WatchGuard Cloud)
Mobile VPN with IKEv2 does not support OTP authentication. If you need to use OTP authentication, such as with a hardware token, we recommend that you configure AuthPoint MFA for Mobile VPN with SSL.
Additional charges might apply for the use of Microsoft Azure. To learn more about Microsoft Azure, go to What is Microsoft Entra Domain Services.
Configure a Inbound Security Rule for NPS Server
To configure a inbound security rule for NPS server:
- Log in to the Azure portal with your Microsoft Azure account credentials.
- Click Resource groups.
- Select your NPS resource group.
- Select the NPS server virtual machine.
- From the vertical navigation pane, select Networking > Network settings.
The Network settings page opens. - Select Create port rule > Inbound port rule.
The Add inbound security rule dialog appears.
We recommend configuring a source filter of your Firebox External IP address in this inbound security rule for better security.
- (Optional) From the Source drop-down list, select IP Addresses.
- (Optional) In the Source IP addresses/CIDR ranges text box, type your Firebox External IP address. For our example, we type 203.0.113.2.
- In the Destination port ranges text box, type 1812.
- In the Priority text box, type the number between 100 and 4096. In our example, we type 100.
- In the Name text box, type a name.
- Leave the default value for all other settings.
- Click Add.
Configure Security Settings for Domain Services
To configure security settings for Domain Services:
- Log in to the Azure portal with your Microsoft Azure account credentials.
- Click Microsoft Entra Domain Services.
- Select your managed domain.
- From the vertical navigation pane, select Settings > Security settings.
- Enable the NTLM v1 Authentication option.
- Click Save.
The Update security settings dialog appears. - Click Yes.
Configure Microsoft NPS Server
To enable users synced from Microsoft Entra ID to authenticate with MS-CHAPv2, you must configure the Microsoft Network Policy Server (NPS). The NPS is required to validate the user credentials from MS-CHAPv2 requests against Microsoft Entra ID.
To configure Microsoft NPS Server:
- On the Windows server, run Server Manager.
- Select Tools > Network Policy Server.
The Network Policy Server console appears. - Select RADIUS Clients and Servers > RADIUS Clients.
- Right-click RADIUS Clients and select New.
The New RADIUS Client window appears. - In the Friendly name text box, type a name.
- In the Address (IP or DNS) text box, type the public IP address of the Firebox. In our example, the IP address of the Firebox is 203.0.113.2.
- In the Shared secret and Confirm shared secret text boxes, type a shared secret key. This key is used to communicate with the Firebox.
You must use the same shared secret key when you configure your Firebox resource in the Configure a Firebox Resource section.
- Click OK.
- Select Policies > Connection Request Policies. Make sure the default policy is enabled.
- Right-click Network Policies and select New.
The New Network Policy window appears. - In the Policy Name text box, type a name for this policy. In our example, we type ecotest.
- Click Next.
- In the Specify Conditions section, click Add.
- Select User Groups. Click Add > Add Groups.
- In the Enter the object name to select text box, type the group name. The name of this group must match the name of the Microsoft Entra ID group your users belong to.
- Click Check Names. If the Enter Network Credentials window appears, you must enter the login information for an account with permissions for the Microsoft Entra Domain Services managed domain.
- To return to the New Network Policy window, click OK three times.
- Click Next.
- Click Next.
- In the Configure Authentication Methods section, clear the User can change password after it has expired check box.
- Click Next.
- Click Next.
- Click Next.
- Click Finish.
Configure AuthPoint
Before AuthPoint can receive authentication requests from the Firebox, you must:
- Add the Firebox as a Firebox resource in AuthPoint.
- Add a Zero Trust authentication policy for the Firebox resource or add the Firebox resource to an existing authentication policy.
- (Optional) Add users and groups.
Configure a Firebox Resource
From the AuthPoint management UI:
- From the navigation menu, select Resources.
- Click Add Resource.
The Add Resource page opens. - From the Type drop-down list, select Firebox.
Additional fields appear. - In the Name text box, type a descriptive name for the resource.
- From the Firebox drop-down list, select the Firebox that you want to connect to AuthPoint.
- To configure the Firebox resource to accept MS-CHAPv2 authentication requests, select the Enable MS-CHAPv2 check box.
Additional fields appear. - In the NPS Firebox Server trusted IP or FQDN text box, type the public IP address or fully qualified domain name (FQDN) of the NPS RADIUS server.
- In the Port text box, type 1812.
- In the Timeout in Seconds text box, type 60.
- In the Shared Secret text box, type the shared secret key that you specified in the Configure Microsoft NPS Server section.
- Click Save.
This list only shows Fireboxes and FireClusters that you have added to WatchGuard Cloud, and the device status in WatchGuard Cloud must be Connected.
After you add the Firebox resource in AuthPoint, the AuthPoint authentication server on your Firebox is Enabled. When you configure Mobile VPN with IKEv2 on the Firebox, you must add the AuthPoint authentication server to your Mobile VPN with IKEv2 configuration.
Add a Group in AuthPoint
You must have at least one user group in AuthPoint to configure MFA. If you already have a group, you do not have to add another group.
To add a WatchGuard Cloud-hosted group to the WatchGuard Cloud Directory:
- Go to Configure > Directories and Domain Services.
- Click the WatchGuard Cloud Directory domain name. If you have not yet added the WatchGuard Cloud Directory, click Add Authentication Domain and select the WatchGuard Cloud Directory.
The New Group page appears.
- In the Groups tab, click Add Group.
- In the Group Name text box, type a descriptive name for the group.
- (Optional) In the Description text box, type a description of the group.
- Click Save.
Your group is added to the WatchGuard Cloud Directory and to AuthPoint.
Add a Zero Trust Authentication Policy
Zero Trust policies specify which resources users can authenticate to and which authentication methods they can use (Push, QR code, and OTP).
You must have at least one Zero Trust authentication policy that includes the Firebox resource. If you already have Zero Trust authentication policies, you do not have to create a new authentication policy. You can add this resource to your existing authentication policies.
Users who not have an authentication policy for a specific resource cannot authenticate to log in to that resource.
To configure a Zero Trust authentication policy:
- Go to Configure > Zero Trust. If you have a Service Provider account, you must select an account from Account Manager.
- Click Add Policy.
- Type a name for this policy.
- In the Target section, from the Content drop-down list, select which groups this policy applies to. You can make multiple selections to add multiple groups.
- In the Resources section, select the resource that you created in the Configure a Firebox Resource section. If you want this policy to apply to additional resources, select each resource this policy applies to.
- In the Conditions section, select the conditions that apply to this policy. When you add a condition to an authentication policy, the policy applies only to user authentications that match the policy and the policy conditions. For example, if you add a time schedule to a policy, the policy only applies to user authentications that occur within that time schedule. Users who only have a policy that includes a time schedule do not get access to the resource when they authenticate outside of the allowed times (because they do not have a policy that applies, not because authentication is denied). For more information, go to About Zero Trust Conditions
Policies that have a Network Location do apply to Firebox resources.
- (Optional) To create a new condition, click Add New Condition. After you create a new condition, you must still add the condition to the policy.
- From the Type drop-down list, select the type of condition to add to the policy.
- From the Name drop-down list, select which condition of the chosen type to add to the policy.
- To add more conditions, repeat Step 6.
If you add conditions to a policy, we recommend that you create a second policy for the same groups and resources without the conditions. Assign a higher priority to the policy with the policy objects. For more information about priority, go to About Zero Trust Policy Precedence.
- In the Action section, select an option to specify whether to allow or deny authentications for the resources in this policy. In our example, we want to allow authentications.
- Allow — Allow user groups in this policy access to the resources associated with this policy.
- Deny — Deny authentications when users in the groups associated with this policy try to authenticate to the resources associated with this policy.
- If you allow access with this policy, select the Password and Push check boxes.
QR code authentication is not supported for Firebox resources. OTP authentication is not supported for MS-CHAPv2 Firebox resources.
- Click Save.
Your policy is created and added to the end of the policy list. - Review the order of your policies and adjust as necessary. For more information about priority, go to About Zero Trust Policy Precedence.
Sync Users to AuthPoint from Microsoft Entra ID
To sync users from Microsoft Entra ID, you must add an Azure AD external identity in the AuthPoint management UI.
In AuthPoint, Azure AD external identities represent external user databases. They connect to user databases to get user account information and validate passwords. The queries you add to an external identity specify which users to sync from your Microsoft Entra ID database. They pull user information and create AuthPoint user accounts for the users that are found.
For detailed instructions to sync users from Microsoft Entra ID, see Sync Users from Microsoft Entra ID.
Configure Mobile VPN with IKEv2
To configure Mobile VPN with IKEv2:
- Log in to Fireware Web UI (https://<your Firebox IP address>:8080).
- From the vertical navigation pane, select VPN > Mobile VPN.
- In the IKEv2 section, click Manually Configure.
- Select the Activate Mobile VPN with IKEv2 check box.
- In the Firebox Addresses section, click Edit.
- From the Type drop-down list, select Firebox-Generated Certificate.
- In the Domain Name or IP Address section, type the External IP address of the Firebox.
- Click Add.
- Click OK.
- In the Networking section, select Force all client traffic through the tunnel.
You can also select Specify allowed resources. For more information about IKEv2 Mobile VPN, see Mobile VPN with IKEv2.
- Select the Authentication tab.
- In the Authentication Server section, from the drop-down list, select AuthPoint, and click Add.
- To make the AuthPoint as the default authentication server, in the Authentication Server list, select AuthPoint and click Move Up to move it to the top of the list.
Mobile VPN with IKEv2 uses the default authentication server unless a user specifies an authentication server on the Mobile VPN with the IKEv2 client. - In the Users and Groups section, from the Create new drop-down list, select AuthPoint.
- From the adjacent drop-down list, select Group.
You can add a user or a group. In our example, we add a group.
- Click Add.
The Add User or Group window appears. - For Type, select Group.
- In the Name text box, type a name for the group. The name of this group must match the group name in AuthPoint.
If you add a user, the name of the user must match the name of the Microsoft Entra ID user.
- From the Authentication Server drop-down list, select AuthPoint.
- Click Save.
Your new group added to the Users and Groups list. - Click Save to save your configuration.
- From the vertical navigation pane, select VPN > Mobile VPN.
- In the IKEv2 section, click Client Profile.
The Client Profiles and Instructions page opens. - Click Download.
- Extract the .TGZ file to your Windows 10 computer and find the Windows_8.1_10_11 folder.
- Run the WG IKEv2.bat file.
The IKEv2 VPN will be created and configured automatically on your Windows 10 computer.
Test the Integration
To test the integration of AuthPoint and the configuration of your Mobile VPN with IKEv2, you authenticate with a mobile token on your mobile device. For Firebox resources with MS-CHAPv2 enabled, you authenticate with a push notification (you receive a push notification in the mobile app that you must approve to authenticate).
- From a Windows 10 computer, open the Windows menu and select Settings.
- Select Network & Internet > VPN.
- Select your VPN connection and click Connect.
- Type your username and password.
- Approve the authentication request that is sent to your mobile device.
The VPN connects successfully.