Skip to main content
Skip table of contents

Stormshield (NetASQ) - RADIUS integration

This is the procedure to integrate inWebo multi factor authentication service with "Stormshield" RADIUS authentication.

TrustBuilder strong authentication service supports many built-in interfaces such as RADIUS, SAML 2.0, Web Services API, Google Apps and many more. When working with a network device (firewall, reverse proxy,…) the preferred method is RADIUS. This is what we will explain further in this document.

Configure authentication portal on Stormshield

In this example, we will take for granted that you already have a Stormshield firewall up and running.

You will need to:

  1. Create RADIUS Servers objects

    1. Connect to your Stormshield Administration interface.

    2. Go to Objects > Network

    3. Click on +Add

    4. Create 2 new objects called radius-a.myinwebo.com and radius-b.myinwebo.com:

      1-20250102-135624.png

inWebo Radius server addresses :

(See RADIUS integration and redundancy for additional details and configuration)

  1. Configure VPN SSL

    1. Go to VPN > SSL VPN.

    2. Set VPN / SSL VPN to ON to enable SSL VPN.

      2-20250102-135624.png
    3. Configure Web Servers, Application Servers and User profiles according to your needs.

      2-20250102-135624.png
  2. Configure Users and Groups to use RADIUS Authentication

    1. Go to Users > Authentication.

    2. In Available Methods tab:

      • Click on + Enable a method.

      • Choose RADIUS.

      • Configure this authentication method with the 2 RADIUS server objects you created earlier.
        Choose the RADIUS secret which will be shared with TrustBuilder MFA servers (this is a string that will be used to cipher the RADIUS requests).

        3-20250102-135624.png

        4-20250102-135624.png

        5-20250102-135624.png

    3. Create a group:

      • Go to Users > Users and Group.

      • Add a group. Give it a name (example: inwebo-users).

      • Insert the users you want.

      • Click on Apply.

    4. Go to Users > Access Privileges.

    5. In Default access tab, allow the SSL VPN policy for the group you created to access SSL VPN with RADIUS authentication

      6-20250102-135624.png
    6. Click on Apply.

Set the RADIUS timeout

To set the RADIUS timeout, enter the following command lines:

CODE
CONFIG AUTH RADIUS timeout=30000 retry=0 btimeout=30000 bretry=0
CONFIG AUTH ACTIVATE
7-20250102-135624.png
7bis-20250102-135624.png

See Stormshield documentation

Configure TrustBuilder MFA RADIUS connector

  1. Login to TrustBuilder MFA administration console.

  2. Go to Secure Sites" tab

  3. Select “Add a connector of type…”, and choose “Radius Push”.

  4. Enter the public IP addresses of your Stormshield servers, along with the RADIUS secret you have defined earlier:

Test Authentication

Launch your Stormshield client (or SSL portail), enter your login and one random character into the password field then you can connect.

Your user will receive a notification on their TrustBuilder authenticator app (mobile or desktop).

8-20250102-135625.png

See Stormshield documentation

Troubleshooting

Sometimes authentication via Radius may fail despite receiving an Access-Accept packet from the radius. The problem occurs during the first authentication attempt or after 30 minutes without any request to the radius.

The following xvpn log message will be found:

CODE
msg="Error during authentication : External authentication server did not reply"

(info) This has been encountered for SNS appliances from 4.3.0 to 4.3.12 and SNS appliances from 4.4.0 to 4.5.4.

To solve this problem we suggest a workaround (which has been tested on SNS version 4.5.3).

  • Connect via SSH and edit the /usr/Firewall/ConfigFiles/Event/rules file

  • Add the following content:

    CODE
    [ping_radius1]
    State=1
    Start=*
    Period="5m"
    Exec="ping -c 1 -t 10 ip_radius1"   #ip_radius1 must be replaced by the main radius object name
    
    [ping_radius2]
    State=1
    Start=*
    Period="5m"
    Exec="ping -c 1 -t 10 ip_radius2"   #ip_radius2 must be replaced by the backup radius object name
  • Enable both tasks by executing the following command:

    CODE
    enevent
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.