[USG FLEX H]How to Set Up 2FA with Google Authenticator for Remote Access VPN and SSL VPN
Google Authenticator is a highly secure method for receiving verification codes for two-factor authentication (2FA). It generates a new code every 30 seconds, ensuring that each code remains valid for only a brief period. Additionally, Google Authenticator is free to download, easy to use, and functions without requiring an internet connection. This guide demonstrates how to configure Google Authenticator for both Remote Access VPN and SSL VPN.
Note: All IP addresses and subnet masks used in this article are examples. Replace them with your actual network settings. This example was tested using USG FLEX 200H (Firmware Version: uOS 1.20).
Two-Factor Authentication with Google Authenticator Workflow
- Enable Google Authentication for a user.
- Set up Google Authenticator.
- Configure valid time and VPN types.
Step 1: Enable Google Authentication for a User
- Navigate to User & Authentication > User/Group.
- Select a local user account.
- Enable Two-Factor Authentication.
- Click "Set up Google Authenticator" to begin the configuration on your mobile device.
Step 2: Set Up Google Authenticator
- Download and install Google Authenticator on your mobile device.
- Open the Google Authenticator app and scan the barcode displayed on the Web GUI.
- Enter the token code shown on the app into Step 3 on the Web GUI.
- Click "Verify Code and Finish".
- After successful registration, backup codes will be displayed. Download these codes and store them securely for future use if you lose access to the app.
Step 3: Configure Valid Time and VPN Service Types
- Enable Two-Factor Authentication for VPN access.
- Set the Valid Time, which specifies the time limit for entering the 2FA code (default is 3 minutes).
- Select the VPN types (e.g., Remote Access VPN or SSL VPN) requiring 2FA.
- After establishing the VPN tunnel, users will need to enter the token code via the Web GUI.
Testing the Configuration
Remote Access VPN (IKEv2)
- Open the Remote Access VPN tunnel using SecuExtender VPN Client.
- When prompted, enter the verification code displayed on Google Authenticator or use a backup code.
- Log in with your username, password, and token code.
SSL VPN
- Open the SSL VPN tunnel using SecuExtender VPN Client.
- When prompted, enter the verification code displayed on Google Authenticator or use a backup code.
- Log in with your username, password, and token code.
By following these steps, you can successfully enable and configure two-factor authentication with Google Authenticator for enhanced VPN security.
Kay
See how you've made an impact in Zyxel Community this year!
Categories
- All Categories
- 415 Beta Program
- 2.4K Nebula
- 151 Nebula Ideas
- 98 Nebula Status and Incidents
- 5.7K Security
- 271 USG FLEX H Series
- 274 Security Ideas
- 1.4K Switch
- 74 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.4K Consumer Product
- 250 Service & License
- 389 News and Release
- 84 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 74 Security Highlight