RADIUS Configuration for VPN MFA
  • 12 Jul 2022
  • 1 Minute to read
  • Contributors
  • Dark
    Light

RADIUS Configuration for VPN MFA

  • Dark
    Light

Article summary

RADIUS Settings

If desired, specific registry settings can be configured for different connection policies within NPS. Simply create a new registry key underneath the Radius key and name it the same as the Connection Policy in NPS to which these settings should apply.

Server RADIUS Feature

RADIUS / Network Policy Overview

  1. Check that the NPS is on.
    Check NPS is on.jpg

  2. Configure the RADIUS Client.

  3. Configure the Connection Request Policy.

  4. Configure the Network Policy.
    Network Policy.jpg

  5. Enable RADIUS.bat.
    (Powershell)
    cd "C:\Program Files\2FA\ONE Server\tools"
    .\Enable_2FA_RADIUS.bat
    Enable Radius CLI.jpg

Enable Radius CLI 2.jpg{height="" width="750px"}
net stop IAS & sc start IAS

  1. Enable NPS Logs
    Enable NPS Logs.jpg
Note

By default, the NPS server does not have logging enabled. You will have to enable this logging either through the Network Policy Server GUI or through the CLI with the following command:

Run as Administrator:
auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable
Enable NPS CLI.jpg

  1. Cycle NPS Server.
    1. net stop IAS & sc start IAS
      Cycle Option 1.jpg

    2. Network Policy Server
      Option 2a.jpg

Option 2b.jpg

How to Configure RADIUS Account Lockout Policy

Watch the video


Was this article helpful?


What's Next