F5 VPN RADIUS integration
Multi-Factor Authentication (MFA) is an extra layer of security used when logging into websites or apps. Individuals are authenticated through more than one required security and validation procedure that only they know or have access to.
Remote Authentication Dial-In User Service (RADIUS) is a protocol commonly used to authenticate, authorize, and account for user access and actions.
Arculix by SecureAuth offers a simple solution for adding MFA to F5 VPN via its RADIUS solution. Use this guide to configure VPN on F5 with the Arculix RADIUS MFA authentication solution.
Prerequisites
- Arculix RADIUS Agent that is configured and connected to your user directory. For example, Microsoft Active Directory (AD). - For more information, see the Arculix RADIUS Agent deployment guide. 
- F5 VPN user account with administrative access. 
Arculix RADIUS Agent configuration
Follow these steps to configure the Arculix RADIUS Agent.
- Log in to the Arculix RADIUS Agent as an administrator. 
- Open the radius-agent-config.env file with an editor. - The file is located in the installed directory of RADIUS Agent. RADIUS clients are configured in this setting.  
- At the end of the radius-agent-config.env file, set the following configuration for the ARA_CLIENTS attribute: - Note- The values should be separated by semicolons (;). - ARA_CLIENTS=<An optional name for your F5 VPN>;<Internal IP address of your F5 VPN>;<a shared secret> - For example, set: - ARA_CLIENTS=F5 VPN;192.168.1.50/32;testing12345  
- Save the file. 
- Run the following command to apply the changes: - docker-compose down && docker-compose up -d 
F5 VPN configuration
In this section, you will configure F5 VPN as a RADIUS client. See the following tasks.
Task A: Add Arculix as a RADIUS Server
- Log in to the F5 VPN admin portal with an administrative account. Go to Access > Authentication > RADIUS and click Create.  
- To create this new RADIUS server, set the following configurations. - Name - Enter the name of the RADIUS server. - For example, Arculix-RADIUS. - Mode - Set to Authentication. - Server Connection - Set to Direct. - Server Address - Enter the IP or name of the Arculix RADIUS Server Agent. - Authentication Service Port - Set to 1812. - Secret - Enter the RADIUS shared secret key for the Arculix RADIUS Agent. - Confirm Secret - Confirm the RADIUS shared secret key for the Arculix RADIUS Agent. - Timeout - Set to 60. - Retries - Set to 3.  
- Optional. If you require and have a backup server, set the Server Connection to Use Pool. 
- Click Finished. 
Task B: Set VPN authentication on RADIUS
- On the F5 VPN admin portal, go to Access > Profiles / Polices > Access Profiles (Per Session Policies).  
- Click Edit for the Per-Session Policy for your required VPN configuration.  
- From the Policy Definition page, select + after the Logon page to add RADIUS authentication.  
- Go to the Authentication tab, choose RADIUS Auth, and click Add Item.  
- Set the AAA Server to the Arculix RADIUS server that you just defined and click Save.  
- Remove the previous authentication methods and select Apply Access Policy.  
Test your application integration
- Go to your F5 VPN URL, enter your login credentials and click Logon.  
- The Arculix Mobile app receives a push notification for your approval to log in.  
- Tap approve and you are authenticated in.