Configuring Remote Access Users
On the VPN > Remote Access section > Remote Access Users page, you can configure Remote Access VPN An encrypted tunnel between remote access clients (such as Endpoint Security VPN) and a Security Gateway. permissions for individual users and user groups.
You can configure users and user groups on the Users & Objects view > Users Management > Users page.
The Remote Access Users page is dedicated to users with Remote Access VPN permissions.
You can configure:
-
Local users
-
Local user groups
-
Active Directory users (R81.10.15 and higher)
-
Active Directory user groups
-
Active Directory permissions
-
Azure AD (now known as Microsoft Entra ID) (in versions R81.10.15 and higher
-
RADIUS groups
-
RADIUS users ( in versions R81.10.15 and higher)
You can also configure SSL VPN bookmarks by user, user group, RADIUS users and Active Directory group.
|
Best Practice - If no authentication servers are defined, click the Active Directory / RADIUS link at the top to define them. |
|
Note - When User Awareness is turned off, there is no user identification based on Browser-Based Authentication and Active Directory Queries. |
Watch the Video (for versions R81.10.10 and lower):
Adding Remote Access Permissions to a Specific Local User
-
Near the Add button, click the downward arrow > click New Local User.
-
In the Remote Access tab:
-
In the Name field, enter a username.
-
In the Password field, enter a password.
Note - The password can be up to 100 characters.
-
In the Confirm Password field, enter the password again.
-
In the Email field, enter the user's email. This is required for Two-Factor Authentication.
-
In the Mobile phone number field, enter the user's phone number. This is required for Two-Factor Authentication.
-
Optional: In the Comments field, enter the applicable description for this user.
-
Select Temporary user if you configure a temporary user.
Enter the expiration date and time.
-
Select Remote Access permissions.
Starting from R81.10.15, two additional checkboxes appear:
-
Optional: Select Use Office Mode static IP address and enter the desired IP address for Office Mode. Instead of getting the WAN IP address allocated dynamically from the gateway, the user receives the static IP address associated with that user.
-
Optional: Select Override global settings to configure policy per individual user instead of applying the settings on the gateway.
Two additional checkboxes appear:
-
Optional: Select Route all traffic for this user through VPN to route the traffic for this user through the VPN tunnel.
-
Optional: Select Enable Two-Factor Authentication (2FA) enforcement to enforce Two-Factor Authentication for this user.
Select the applicable option:
-
Use SMS/email
-
Use an Authenticator app
-
-
-
-
-
Optional: In the SSL VPN Bookmarks tab:
-
Click Add > New Local User/Users Group/Active Directory Group > SSL VPN Bookmarks tab.
-
In the new window, enter new bookmarks or select existing bookmarks.
Note - If you select the Global bookmark, this bookmark always appears.
-
Click Save.
-
-
Click Save.
Adding Remote Access Permissions to a Local User Group
-
Near the Add button, click the downward arrow > click New Users Group.
-
In the Remote Access tab:
-
In the Group name field, enter the group name.
-
Select Remote Access permissions.
-
Select initial users to add to the group by selecting the relevant checkboxes in the user list or by clicking New to create new users.
You can see a summary of the group members above the user list.
You can remove members by clicking the X next to the relevant user name.
-
-
Optional: In the SSL VPN Bookmarks tab:
-
Click Add > New Local User/Users Group/Active Directory Group > SSL VPN Bookmarks tab.
-
In the new window, enter new bookmarks or select existing bookmarks.
Note - If you select the Global bookmark, this bookmark always appears.
-
Click Save.
-
-
Click Save.
Adding Remote Access Permissions to Active Directory Users
|
Note - This feature is available in R81.10.15 and higher. |
-
Near the Add button, click the downward arrow > click Active Directory > click Active Directory User.
-
If no Active Directory was defined, you are prompted to configure one.
For more information on configuring Active Directory see Configuring Authentication Servers for Remote Access.
-
In the Name field, enter the username as configured in Active Directory.
-
In the Email field, enter the user's email as configured in Active Directory.
-
Optional: Select Override global settings to configure policy per individual user instead of applying the settings on the gateway.
Two additional checkboxes appear:
-
Optional: Select Route all traffic for this user through VPN to route the traffic for this user through the VPN tunnel.
-
Optional: Select Enable Two-Factor Authentication (2FA) enforcement to enforce Two-Factor Authentication for this user.
Select the applicable option:
-
Use SMS/email
-
Use an Authenticator app
When this Remote Access VPN user connects to the Quantum Spark Gateway for the first time, the credentials are sent to the Active Directory server. After confirmation from the Active Directory server, the Quantum Spark Gateway sends a one-time code in an SMS or Email, or the user must enter a one-time from an Authenticator app.
-
-
-
Click Save.
In addition, refer to Procedure to add Remote Access permissions to all users defined in an Active Directory.
-
Do one of these:
-
From the toolbar, click Edit Permissions.
-
Near the Add button, click the downward arrow > click Active Directory > click Active Directory Group.
-
-
Near the Add button, click the downward arrow > click Active Directory > click Active Directory Group.
-
If no Active Directory was defined, you are prompted to configure one.
-
When an Active Directory has been defined, you see a list of available user groups defined in the server.
-
Select one of the user groups.
-
Click Save.
-
Near the Add button, click the downward arrow > click Active Directory > click Active Directory Permissions.
-
Select the applicable option:
-
All users in Active Directory
Note - Most Active Directory domains contain a large list of users. Consider limiting the Remote Access VPN permissions only to specific user groups.
-
Selected Active Directory user groups (this is the default)
Note - Requires additional configuration.
-
-
Click Save.
-
If you selected the option Selected Active Directory user groups, then follow Procedure to add Remote Access permissions to an Active Directory specific user.
|
Note - This feature is available in R81.10.15 and higher. |
-
Near the Add button, click the downward arrow > click Active Directory > click Azure AD Group.
-
In the Name field, enter the user group name as configured in Microsoft Entra ID.
Important - On the Quantum Spark Gateway, this name must always start with the prefix "
EXT_ID_
".Example:
If the Azure AD group is called "
VPN_Users
", then you must enter "EXT_ID_VPN_Users
". -
Optional: In the Comments field, enter the applicable description for this Microsoft Entra ID user group.
-
Optional: Select Override global settings to configure policy per individual user instead of applying the settings on the gateway.
Optional: Select Route all traffic for this Azure AD group through VPN to route the traffic for this user group through the VPN tunnel.
For more information, see Configuring SAML Authentication for Remote Access VPN..
Adding Remote Access Permissions to RADIUS Users
-
Near the Add button, click the downward arrow > click RADIUS > click RADIUS Group.
-
Select Enable RADIUS authentication for User Awareness, Remote Access and Hotspot.
-
Optional: Select For Remote Access use specific RADIUS groups only.
In the field RADIUS groups for authentication, enter the applicable RADIUS groups.
-
Click Save.
|
Note - This feature is available in R81.10.15 and higher. |
-
Near the Add button, click the downward arrow > click RADIUS > click RADIUS User (Two-Factor Authentication).
-
In the Name field, enter a username.
-
In the Email field, enter the user's email. This is required for Two-Factor Authentication.
-
In the Phone number field, enter the user's phone number. This is required for Two-Factor Authentication.
-
Optional: Select Override global settings to configure policy per individual user instead of applying the settings on the gateway.
Two additional checkboxes appear:
-
Optional: Select Route all traffic for this user through VPN to route the traffic for this user through the VPN tunnel.
-
Optional: Select Enable Two-Factor Authentication (2FA) enforcement to enforce Two-Factor Authentication for this user.
Select the applicable option:
-
Use SMS/email
-
Use an Authenticator app
-
-
-
Click Save.
Deleting an Existing User or User Group
-
Click the user or user group object.
-
Click Delete.
-
Click OK in the confirmation message.