To add Duo two-factor authentication to your Citrix Gateway with nFactor you’ll configure the Duo Authentication Proxy as a secondary RADIUS authentication server. Primary authentication happens directly between the Citrix Gateway and your Active Directory, LDAP, or other identity store, which enables additional features such as AD password resets.
Before starting, make sure that Duo is compatible with your Citrix Gateway device. Log on to your Citrix Gateway via the web interface and verify that your Citrix Gateway firmware is version 12.1-51.16 or later and your Citrix Receiver or Citrix Workspace clients support 12.1 or later.
Also verify that your Citrix Gateway is licensed for Advanced Authentication Policy. As of Citrix Gateway release 13.0-67.x, the “Standard” license also includes nFactor for Gateway/VPN, while Citrix ADC requires an “Advanced” or “Premium” license to use nFactor.
Today, I ma going to show you how to configure Cisco DUO two-factor authentication for Outlook Web App of Exchange 2013 and later.
Today, I am going to show you how to configure Cisco DUO two-factor authentication for WordPress.
Duo Authentication for Remote Desktop Gateway adds two-factor authentication to your RemoteApp Access logons, and blocks any connections to your Remote Desktop Gateway server(s) from users who have not completed two-factor authentication when all connection requests are proxied through a Remote Desktop Gateway. Users automatically receive a 2FA prompt in the form of a push request in Duo Mobile or a phone call when logging in.
Duo integrates with Microsoft Windows client and server operating systems to add two-factor authentication to Remote Desktop and local logons and credentialed UAC elevation prompts. Duo Authentication for Windows Logon add Duo two-factor authentication to Windows desktop and server logins, both at the local console and incoming Remote Desktop (RDP) connections.
This document will show you how to step by step to configure Cisco Meraki to azure site to site VPN IPsec tunnel IKEv1.
If the Cisco Meraki Security appliances running firmware less than version 15.12 do not have support for IKEv2. Also, there is a bug at concurrent firmware 14.53 (confirmed by Meraki support engineer), when you build up a VPN non-Meraki peer with Azure, the all auto VPN peers will down and won’t come back on line until you reboot the security appliance. Everything will be fine after reboot it.
This document will show you how to step by step to configure Cisco Meraki to azure site to site VPN tunnels IKEv2.
The Cisco Meraki Security appliances running firmware must be on firmware 15 or greater to take advantage of IKEv2, because the firmware 15.x is still beta version, you need to ask Meraki support to upgrade it for you if you need it.
Today, my customer asked me that is it possible to expand system volume disk space for their Windows Server 2003 virtual machine? The answer is Yes, we can do it without any 3rd party tools. You just need a Windows Server 2008 or up to help this. Let’s follow the step by step to do it.
Today, let’s talking about how to configure DHCP Cluster with Cisco Call manager service (TFTP services). DHCP server failover cluster feature provides the ability to have two DHCP servers provide… Read more »
Veeam backup copy to Azure After build Site-to-site VPN between Cisco Meraki with Azure, let’s continually settings for Veeam backup copy to Azure. Settings in Azure site Logon to Azure… Read more »
Today, a customer asks me to build a Site-to-Site VPN between their Meraki environment with Azure, they also need Veeam backup copy to Azure, they are using other cloud provider… Read more »