So after some trial and error I finally have this working, and I have a full write up to share with y’all to save the headache for the next guy. Note: This is tested and confirmed functional on latest 5.9.29 controller and 4.4.29 and higher USG firmware. This has been deployed in production on Windows Server 2012R2 and 2016. Once I can get a trial set up for WS 2019 I will verify but 99.999% sure it will work as that’s basically WS v1803 wrapped up for LTSB. This is the most basic config necessary to get everything running, you can customize the accounting section and other settings based on your environment. Anyways, on to the meat and potatoes…
EDIT: Google Doc link to fix formatting
(Also I apologize for formatting… Converted from a OneNote doc didn’t go so well…)
On Primary Domain
Controller:
- Add Roles and Features
A. Network Policy
and Access Services
B. Accept all RSAT tools
- In AD Users and Computers
A. Create Security
Group called “VPN Users”
B. Add users to this group to
approve remote access
- In Network Policy Server:
A. Radius Clients
and Servers
i. New Radius
Client
a. Friendly Name:
USG
b. IP Address: Router IPv4
address
c. Shared Secret, set
Manually (save this!!!)
B. Policies
i. Connection
Request Policies
a. Name: UniFi VPN
b. RAS Type: Unspecified
c. Conditions:
i. NAS IPv4
Address: USG Address
ii. Network Policies
a. Name: UniFi VPN
b. Access Permission: Grant
Access
c. NAS Type: Unspecified
d. Conditions:
i. Windows
Groups: DOMAIN\VPN Users
e. Constraints:
i. Authentication
Methods: MS-CHAP v2
(uncheck
all others)
f. Settings:
i. Encryption
- Only check
Strongest (128-bit)
C. Accounting (Optional)
i. Configure
Accounting
a. Write to log
file (txt) or SQL
- In UniFi Controller:
A. Settings
i. Profiles:
a. RADIUS - Add
New RADIUS Profile
- Name: (Name of
Primary Domain Controller)
- RADIUS Auth Server: PDC
IPv4 Address
a. Use Shared
Secret from 3a.
-
Check Enable Accounting
-
RADIUS Accounting Server:
PDC IPv4 Address
a. Use Shared
Secret from 3a.
i. Networks
a. Create New
Network
- Name: Remote
User VPN
-
Purpose: Remote User VPN
-
VPN Type: L2TP Server
-
PSK: Shared Secret (save
this!!!)
- GW/SN: Subnet not
currently in use, space large enough for all concurrent users
- Name Server: Manual - PDC
IPv4 address
- RADIUS Profile: Profile
from 4a.
- Check "Require
MS-CHAP v2"
- Save and Apply
- Client-Side Setup Steps:
A. Verify user is a part of “VPN Users” in AD
B. On client machine, add VPN
Profile
i. VPN Provider:
Windows (built-in)
ii. Connection Name: COMPANY
NAME ABBREVIATION
iii. Server Address: Public IPv4
Address
iv. VPN Type: L2TP with
Pre-Shared Key
v. PSK: From 4a.
vi. Sign In Type: Username and
Password
vii. Use DOMAIN\(username) and AD Login
viii. Check "Remember
password"
C. Open Network & Sharing
Center
i. Change adapter
settings - COMPANY NAME ABBREVIATION
ii. Security Tab
a. Click
“Allow these protocols”
b. Only check MS-CHAP v2
c. Networking Tab
i. IPv4
- Use the following DNS Server
a. Primary Domain Controller IPv4 Address
- Advanced - DNS
Tab
a. DNS Suffix for
this connection:
i. Domain.local
- Connect to VPN and verify domain.local is pingable
That’s it! Feel free to message me for more specifics or with any questions regarding the configuration.