Last updated on March 8, 2023
Multi-Factor Authentication (MFA) for Cisco VPN is an extra layer of security added to the traditional username and password credentials during logins. Cisco VPN Two-Factor Authentication provides top-notch security for users who log in to Cisco AnyConnect VPN, Cisco PPTP VPN, Cisco L2TP VPN, and more. Even if hackers steal a user’s password, Cisco VPN 2FA will stop them from connecting to the corporate network.
Overview
Rublon integrates with Cisco VPN to enable Two-Factor Authentication (2FA) for Cisco VPN user logins, including Cisco ASA, Cisco AnyConnect VPN, Cisco SSL VPN, Cisco L2TP VPN, and Cisco PPTP VPN.
Rublon introduces Two-Factor Authentication to Cisco VPN in a number of ways.
Before You Start
- Ensure you have properly configured Cisco VPN.
- Ensure that you have properly set up your authentication source, that is, an external Identity Provider (IdP) like FreeRADIUS, Microsoft Active Directory, or OpenLDAP.
- Ensure your Cisco hardware and software works correctly, especially that users can successfully log in prior to enabling Rublon Two-Factor Authentication.
Configuration
Refer to the following instructions depending on your Cisco version.
Enable 2FA for Cisco AnyConnect VPN with ASA
If you would like to enable Two-Factor Authentication (2FA) for Cisco AnyConnect VPN with ASA, refer to:
MFA for Cisco AnyConnect VPN with ASA
Enable 2FA for Cisco RV Series VPN (SSL, PPTP, L2TP)
If you would like to enable Two-Factor Authentication (2FA) for a Cisco RV Series router with Cisco SSL VPN, Cisco PPTP VPN, or Cisco L2TP VPN, refer to:
MFA for Cisco RV Series VPN
Troubleshooting
If you encounter any issues with your Rublon integration, please contact Rublon Support.