Remote Access VPN Support NCAS

Options
Zyxel_Claudia
Zyxel_Claudia Posts: 194 image  Zyxel Employee
Network Detective-New Adventure Badge Network Detective Badge First Comment Friend Collector
edited November 14 in Other Topics

USG FLEX H Series Firewall has expanded its cloud-managed capabilities by integrating Nebula Cloud Authentication Service (NCAS) into its Remote Access VPN solutions. This enhancement enables administrators to manage VPN user credentials directly from Nebula Control Center (NCC) without relying on local databases or external authentication servers.

This article explains how NCAS works for VPN and setup procedures.

1. What Is Nebula Cloud Authentication (NCAS)?

NCAS allows administrators to create and manage user accounts entirely in the cloud, bypassing the need for on-premises servers or the firewall’s local database. With this integration, NCAS can now be used as the authentication server for:

  • SSL VPN
  • IPSec Remote Access VPN

This is especially useful for businesses that do not have an existing Active Directory (AD), RADIUS, or LDAP infrastructure.

2. Where to Configure NCAS for VPN

You can set NCAS as the authentication method in Nebula, under the Authentication Server section, simply select:Nebula Cloud Authentication

image.png

Note: Only one primary authentication server is allowed when using NCAS. Secondary servers cannot be added in this setup.

3. Creating VPN Users with NCAS

You can create cloud authentication users in two places:

Option A: Directly from the Remote Access VPN Settings

  1. Go to Remote Access VPN in Nebula
  2. Enable IPSec VPN Server
  3. Under authentication, select Nebula Cloud Authentication
  4. Click “Add Account”
  5. Enter email address and username
  6. By default, VPN access is enabled
    image.png

This is the easiest method and automatically prepares users for VPN connection.

Option B: From the Cloud Authentication User Page

  1. Navigate to Site-wide > Configure > Cloud Authentication
  2. Click “Add User”
  3. Fill in user details

By default, VPN access is disabled here - make sure to enable the option “Allow user to use Remote Access VPN.”

4. VPN Connection: Using the Configuration Script

Once users are created, they can download the VPN configuration script:

  • Click “Download” in the Remote Access VPN section
  • Import the file into either:
    • SecureExtender (Zyxel’s official VPN client)
    • Native OS VPN clients (requires manual import)
      image.png

This configuration script includes all necessary parameters for establishing a secure VPN tunnel.

5. Login Verification and Monitoring

You can verify user login in Login User, Once the VPN is connected, the user information will include the NCAS user type

Login Users Monitor

  • Shows active VPN sessions
  • Lists the username, IP, and login type (ncas-users)
    image.png

6. Current Limitations

While NCAS simplifies VPN management, there are a limitation, Two-factor authentication is not currently supported. It will be implemented in the future firmware.