Set up MFA / 2FA for IKEv2 on Flex 200h

Smith166
Smith166 Posts: 4  Freshman Member
First Comment

Honestly, I spent huge amount of time to find a correct guide to set up a VPN IKEv2 with MFA on our USG 200h but I had no luck yet. All guides talking about old version of Zywall, the screens are totally different, everything very confusing, tons of options and menus looks different. I would really appreciate if someone can help me to configure it properly.

  • IKEv2
  • MFA / 2FA via Goole Authenticator (or any other OTP stuff)
  • VPN is already working but no MFA configured

Why I can't select the WAN interface?

My assumption is that after connecting to the normal VPN, any WEB access should give me a portal where I can enter the secondary code. Or is that not the case? How it should work? How should I imagine the MFA/2FA with a built-in VPN clients on WIndows/MacOS?

Thank you very much if anyone can shed me a light on this.

Accepted Solution

All Replies

  • Zyxel_Kay
    Zyxel_Kay Posts: 1,252  Zyxel Employee
    Zyxel Certified Network Engineer Level 2 - Nebula Zyxel Certified Network Engineer Level 2 - WLAN Zyxel Certified Network Engineer Level 2 - Switch Zyxel Certified Network Engineer Level 2 - Security
    Answer ✓

    Hi @Smith166

    To set up 2FA for Remote Access VPN using IKEv2 on your USG FLEX 200H, you can refer to this guide:

    Currently, 2FA functionality is streamlined when using the Zyxel VPN Client (SecuExtender). In this case, after connecting to the VPN, the authentication page will automatically open in your browser. For other VPN clients, you’ll need to manually navigate to the authentication URL (e.g., http://yourdeviceip:8008).

    Feel free to let us know if you encounter any specific issues or need further clarification!

    Kay

    See how you've made an impact in Zyxel Community this year! https://bit.ly/Your2024Moments_Community

  • Smith166
    Smith166 Posts: 4  Freshman Member
    First Comment

    Hi Kay,

    thank you very much, I'm almost there now, it's more clear. That was the key: "For other VPN clients, you’ll need to manually navigate to the authentication URL (e.g., http://yourdeviceip:8008)"

    Might be the last question, do you have any idea why I can't select WAN interface at the delivery settings? Only the LAN interfaces (VLANs) are showing there. This case I can access only the 2FA auth page on the local IP (http://172.16.4.1:8008) after I connected VPN, I suppose without the successful second authentication the authentication page is the only one reachable resource.

  • Zyxel_Kay
    Zyxel_Kay Posts: 1,252  Zyxel Employee
    Zyxel Certified Network Engineer Level 2 - Nebula Zyxel Certified Network Engineer Level 2 - WLAN Zyxel Certified Network Engineer Level 2 - Switch Zyxel Certified Network Engineer Level 2 - Security

    Hi @Smith166

    Once a VPN connection is established, the user is considered a VPN LAN client. At this point, accessing the 2FA authentication page must be done via a LAN interface IP (e.g., http://yourdeviceip:8008). Without successful secondary authentication, the authentication page remains the only accessible resource.

    The reason the WAN interface cannot be selected in the delivery settings is that allowing access via WAN would create a potential security risk. If WAN were selectable, external users could attempt to access the 2FA authentication page directly without first establishing a secure VPN connection.

    Kay

    See how you've made an impact in Zyxel Community this year! https://bit.ly/Your2024Moments_Community

  • PeterUK
    PeterUK Posts: 3,487  Guru Member
    100 Answers 2500 Comments Friend Collector Seventh Anniversary
    edited January 8

    But you can select WAN on FLEX200 but not on FLEX H?

    But in any case the FLEX H for VPN 2FA via Goole Authenticator does not work

    Authorize Link URL Address not working at all or correctly — Zyxel Community

  • Zyxel_Kay
    Zyxel_Kay Posts: 1,252  Zyxel Employee
    Zyxel Certified Network Engineer Level 2 - Nebula Zyxel Certified Network Engineer Level 2 - WLAN Zyxel Certified Network Engineer Level 2 - Switch Zyxel Certified Network Engineer Level 2 - Security

    Hi @PeterUK

    Considering our huge ZLD(USG/USG FLEX/ATP) customer base using ZLD for many years they adapt to the design of ZLD, thus we determined not changing the ZLD design however keep it's flexibility.

    Though the design might cause unwanted exposure, HQ will communicate with our customer base applying strict countermeasures to keep their network safe.

    On the other hand the uOS(USG FLEX H) is new to the market and there is no burden.

    From day one we determined to take proactive design to enhance security in the 2FA case.

    In summary, we have no intention to make changes to the legacy ZLD, nor to modify the design of the new uOS.

    We do commit to providing a secure and consistent experience, while educating and communicating to our legacy product customer base.

    Kay

    See how you've made an impact in Zyxel Community this year! https://bit.ly/Your2024Moments_Community

  • PeterUK
    PeterUK Posts: 3,487  Guru Member
    100 Answers 2500 Comments Friend Collector Seventh Anniversary
    edited January 10

    OK Kay

    so one  2FA via Goole Authenticator dose not work on FLEX200H for VPN even if I set to a LAN interface go to HTTP://192.168.255.235:8008 I get no page even with a firewall rule allow from any to Zywall for port 8008 only when I disable the firewall do I see the Authorize page and even then when tested with SSL VPN and enter the code from Goole Authenticator for the test user setup it still don't work.

    And two what would be the point of Authorize page only be accessed LAN side only? isn't the point of a VPN that you connect externally? and then do 2FA to the firewall WAN side? as is you can use User defined to get around this by FQDN but like I said above it don't work. plus you can harden the Authorize page (when you get it working) by source FQDN so that a client with DDNS can have the firewall known the source IP from FQDN to the Authorize page for better security. 

  • Smith166
    Smith166 Posts: 4  Freshman Member
    First Comment

    Guys, as you are experts on this, I really appreciate your comments.

    But, it's working now on my FLEX200H. I can reach authorization page from outside on the http://my_public_ip:8008 and can be authorised myself with the code from Google Authenticator. Also I can reach auth page on the LAN IP.

  • Alanl
    Alanl Posts: 15  Freshman Member
    First Comment Friend Collector Sixth Anniversary
    edited January 12

  • Zyxel_Kay
    Zyxel_Kay Posts: 1,252  Zyxel Employee
    Zyxel Certified Network Engineer Level 2 - Nebula Zyxel Certified Network Engineer Level 2 - WLAN Zyxel Certified Network Engineer Level 2 - Switch Zyxel Certified Network Engineer Level 2 - Security

    Hi @PeterUK

    Regarding your queries:

    1. Accessing the 2FA Authorization Page:As mentioned earlier, USG FLEX H (uOS firewall) models are designed to enhance security by not supporting WAN IP or FQDN-based access to the VPN 2FA link. This proactive approach minimizes potential WAN attack surfaces.
    2. Accessing the 2FA Page via LAN IP Using FQDN:If you wish to access the 2FA link using an FQDN instead of the LAN IP, you can achieve this by creating an address record that maps the FQDN to the internal LAN IP. Here's how:
      • Step 1: Add an address record in your DNS server to map the FQDN (e.g., zzz.com) to the LAN IP address (e.g., 192.168.168.1 or 192.168.169.1).
      • Step 2: Update the 2FA link to reference the FQDN.
      • Step 3 (Optional): If you're using SecuExtender, ensure the automation page link is modified to align with the updated 2FA link.
      • Step 4 (Optional): With SecuExtender, the 2FA authentication page will automatically open in your browser once the VPN connection is established.

    Kay

    See how you've made an impact in Zyxel Community this year! https://bit.ly/Your2024Moments_Community