• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Company · Blog · Newsletter · Events · Partner Program

Downloads      Support      Security     Admin Login
Rublon

Rublon

Secure Remote Access

  • Product
    • Regulatory Compliance
    • Use Cases
    • Rublon Reviews
    • Authentication Basics
    • What is MFA?
    • Importance of MFA
    • User Experience
    • Authentication Methods
    • Rublon Authenticator
    • Remembered Devices
    • Logs
    • Single Sign-On
    • Access Policies
    • Directory Sync
  • Solutions
    • MFA for Remote Desktop
    • MFA for Remote Access Software
    • MFA for Windows Logon
    • MFA for Linux
    • MFA for Active Directory
    • MFA for LDAP
    • MFA for RADIUS
    • MFA for SAML
    • MFA for RemoteApp
    • MFA for Workgroup Accounts
    • MFA for Entra ID
  • Customers
  • Industries
    • Financial Services
    • Investment Funds
    • Retail
    • Technology
    • Healthcare
    • Legal
    • Education
    • Government
  • Pricing
  • Docs
Contact Sales Free Trial

Multi-Factor Authentication (2FA/MFA) for Sophos XG Firewall VPN

MFA for Sophos Firewall VPN (SSL, IPsec, PPTP) on Sophos XG and XGS Firewall Appliances

November 7, 2022 By Rublon Authors

Last updated on July 8, 2025

MFA for Sophos XG Firewall VPN is a multi-layered approach to user authentication that adds an extra authentication step. After entering their password, a user must accept a Mobile Push authentication request sent to their phone or click an Email Link sent to their email address. If the user fails to perform the secondary authentication method, they are denied access. Thanks to Sophos Firewall MFA, a hacker who has a user’s password still cannot access the user’s account.

Overview of Sophos XG Firewall VPN MFA

Rublon Multi-Factor Authentication for Sophos Firewall VPN allows you to add an extra layer of security to your Sophos XG VPN and Sophos XGS VPN logins. Rublon integrates with Sophos Firewall using the Rublon Authentication Proxy.

This document explains how to enable Rublon Multi-Factor Authentication (MFA) by creating an authentication server in the Sophos web admin console, pointing it to the Rublon Authentication Proxy, and assigning it to one or more Sophos Firewall services. Thanks to this way of configuration, you can enable MFA for one or more of the following services:

  • MFA for Sophos SSL VPN
  • MFA for Sophos IPsec VPN
  • MFA for Sophos PPTP VPN
  • MFA for Sophos Firewall User Portal
  • MFA for Sophos Firewall web admin console

Supported Authentication Methods

Authentication Method Supported Comments
Mobile Push ✔ N/A
WebAuthn/U2F Security Key – N/A
Passcode ✔ N/A
SMS Passcode – N/A
SMS Link ✔ N/A
Phone Call ✔ N/A
QR Code – N/A
Email Link ✔ N/A
YubiKey OTP Security Key ✔ N/A

Before You Start

Before configuring Rublon MFA for Sophos Firewall VPN:

  1. Ensure you have prepared all required components.
  2. Create an application in the Rublon Admin Console.
  3. Install the Rublon Authenticator mobile app.

Required Components

1. User Identity Provider (IdP) – You need an external Identity Provider, such as Microsoft Active Directory, OpenLDAP, or FreeRADIUS.

2. Rublon Authentication Proxy – Install the Rublon Authentication Proxy if you have not already.

3. Sophos Firewall – Ensure you have correctly configured your Sophos Firewall, especially that user logins work properly before deploying MFA for Sophos XG or Sophos XGS.

Create an Application in the Rublon Admin Console

1. Sign up for the Rublon Admin Console. Here’s how.

2. In the Rublon Admin Console, go to the Applications tab and click Add Application. 

3. Enter a name for your application (e.g., Sophos XG Firewall VPN) and then set the type to Rublon Authentication Proxy.

4. Click Save to add the new application in the Rublon Admin Console.

5. Copy and save the values of the System Token and Secret Key. You are going to need these values later.

Install Rublon Authenticator

For increased security of Multi-Factor Authentication (MFA), end-users may install the Rublon Authenticator mobile app. So, as a person configuring MFA for Sophos Firewall, we highly recommend you install the Rublon Authenticator mobile app, too. Thanks to that, you will be able to test MFA for Sophos via Mobile Push.

Download the Rublon Authenticator for:

  • Android
  • iOS
  • HarmonyOS

Configuring MFA for Sophos XG Firewall VPN

This section describes how to configure MFA for Sophos SSL VPN, Sophos PPTP VPN, Sophos IPsec VPN, Sophos Firewall User Portal, and Sophos Firewall web admin console on Sophos XG and Sophos XGS Firewall Appliances.

Configuring Sophos XG Firewall MFA consists of the two following parts:

  1. Add Rublon Authentication Proxy as RADIUS server
  2. Use Rublon Authentication Proxy as authentication method in selected Sophos services

MFA for Sophos XG Firewall VPN Configuration Part 1: Adding Rublon Authentication Proxy as RADIUS server

1. In the Sophos Firewall web admin console, go to Authentication → Servers and click Add to add a new server.

Image showing Authentication → Servers in the Sophos Firewall web admin console

2. Fill in the form. Refer to the following image and table.

Image showing adding external server in the Sophos web admin console
Server typeSelect RADIUS server.
Server nameEnter a name for your server, e.g., Rublon Authentication Proxy.
Server IPEnter the IP address of your Rublon Authentication Proxy.
Authentication PortEnter the port number of your Rublon Authentication Proxy (1812 by default).
Time-outChange to at least 60.
Enable accountingCheck.

Rublon Authentication Proxy does not support accounting. However, Sophos Firewall requires this option to work correctly.
Accounting PortEnter the RADIUS accounting port number (1813 by default).
Shared secretEnter the RADIUS_SECRET you set in the Rublon Auth Proxy’s config file.
Domain NameEnter your domain name (Optional).
Group name attributeEnter the alias for the configured group name, which is displayed to the user, e.g., Rublon.

3. Click Save to save the changes you made.

4. Click Test connection and provide your user credentials to test your configuration. If your configuration is correct, you should receive a Mobile Push or an Email Link from Rublon. If you have not been prompted for MFA by Rublon, double-check your configuration.

MFA for Sophos XG Firewall VPN Configuration Part 2: Using Rublon Authentication Proxy in selected Sophos services

Sophos Firewall allows you to easily assign a new authentication method to the different services it offers, including VPNs. This way, you can assign the newly-created Rublon Authentication Proxy server to whichever part of Sophos Firewall you want.

1. Go to Authentication → Services.

2. Select the newly-created Rublon Authentication Proxy authentication server as the authentication method for each service you want to be protected with MFA.

After selecting the authentication sources for each service, confirm your choices by clicking the Apply button under each service. Note that you must click Apply under every service you change. There is no single button that saves changes to all services.

Firewall authentication methods

Image showing Firewall authentication methods

Source of user authentication for logging into the firewall. We recommend you set it to a local user base only during the testing phase so that you have a fallback method of access to Sophos Firewall should Rublon login be impossible, e.g., due to a configuration mistake.

User portal authentication methods

Image showing User portal authentication methods

Source of user authentication for users logging in to the User Portal. Users can log in to the User Portal to download the VPN client and a VPN profile configuration. We recommend you select Rublon Authentication Proxy so that users must complete MFA before accessing the portal.

VPN (IPsec/dial-in/L2TP/PPTP) authentication methods

Image showing VPN (IPsec/dial-in/L2TP/PPTP) authentication methods

Source of user authentication for most VPN types. Select Rublon Authentication Proxy so that users must complete MFA when connecting via IPsec, dial-in, L2TP, or PPTP VPN.

Administrator authentication methods

Image showing Administrator authentication methods

Source of user authentication for Sophos Firewall web admin console. This setting only applies to administrators. We recommend you select Local only for the testing phase unless you have access to the Super Administrator account.

SSL VPN authentication methods

Image showing SSL VPN authentication methods

Source of user authentication for SSL VPN service. We recommend you select Rublon Authentication Proxy so that users must complete MFA when connecting via SSL VPN.

Testing MFA for Sophos Firewall

After configuring MFA for Sophos XG Firewall, test your setup by connecting to a selected VPN, User Portal, or web admin console. In all the following examples, Mobile Push has been set as the second factor in the Rublon Authentication Proxy configuration (AUTH_METHOD was set to push).

Testing MFA for Sophos User Portal

To test MFA for Sophos Firewall User Portal:

1. Open the Sophos User Portal by opening https://<Sophos Device IP Address> in your web browser.

2. Enter your Username and Password and enter the CAPTCHA code.

Image showing the Sophos User Portal login page

3. Rublon will send a Mobile Push authentication request to your phone. Tap APPROVE.

Image showing a Mobile Push received when logging in to the Sophos XG Firewall User Portal

4. You will gain access to the User Portal.

Testing MFA for Sophos Firewall SSL VPN

To test MFA for Sophos Firewall SSL VPN, use the dedicated Sophos Connect client. You can download Sophos Connect from the Sophos User Portal (under the VPN tab).

1. To import the VPN profile into your Sophos Connect client, click Import connection, and select your .ovpn VPN profile file.

2. After importing your VPN profile, select it and click Connect.

3. Enter your username and password and click Sign in.

Image showing the Sophos Connect client login page when connecting to the Sophos Firewall SSL VPN

4. Rublon will send a Mobile Push authentication request to your phone. Tap APPROVE.

Image showing a Mobile Push received when logging in to the Sophos XG Firewall SSL VPN

5. You will connect to the VPN.

Testing MFA for Sophos Firewall IPsec VPN

To test MFA for Sophos Firewall IPsec VPN, use the dedicated Sophos Connect client. You can download Sophos Connect from the Sophos User Portal (under the VPN tab).

1. To import the VPN profile into your Sophos Connect client, click Import connection, and select your .scx VPN profile file.

2. After importing your VPN profile, select it and click Connect.

3. Enter your username and password and click Sign in.

Image showing the Sophos Connect client login page when connecting to the Sophos Firewall IPsec VPN

4. Rublon will send a Mobile Push authentication request to your phone. Tap APPROVE.

Image showing a Mobile Push received when logging in to the Sophos XG Firewall IPsec VPN

5. You will connect to the VPN.

Testing MFA for Sophos Firewall PPTP VPN

To test MFA for Sophos Firewall PPTP VPN, use the Windows VPN client or any other client that supports PPTP. Note that you have to select the PAP protocol in the settings of the VPN profile if you are using the Windows VPN client.

How to Add and Configure a Sophos Firewall PPTP VPN connection in Windows VPN

1. Go to Settings → Network & Internet → VPN → Add a VPN Connection and fill in the form. Refer to the following image and table.

Image showing how to add a VPN connection in Windows VPN
Connection nameSet a name for your VPN connection, e.g., Sophos PPTP VPN.
Server name or addressEnter the IP address or hostname of your Sophos server.
VPN TypeSet to PPTP.
Type of sign-in infoSet to User name and password.
User name (optional)We recommend you enter your user name.
If you do not specify the optional User name and Password when adding a new connection, you will be asked to provide the credentials every time you connect to the VPN. 
Password (optional)We recommend you enter your password.
If you do not specify the optional User name and Password when adding a new connection, you will be asked to provide the credentials every time you connect to the VPN.
Remember my sign-in infoOptional.
Check to save your user credentials.

2. Click Save to save your new VPN connection profile.

3. Edit the VPN connection and specify the authentication protocol.

Go to Control Panel → Network and Sharing Center and select Change adapter settings from the menu on the left.

4. Right-click the newly created VPN profile and select Properties.

5. A new window with properties for this connection will open.

6. Go to the Security tab and change Authentication to Allow these protocols. Then, check Unencrypted password (PAP).

Image showing how to set PAP in the properties of the Sophos PPTP VPN connection

7. Click OK to save and confirm the changes.

Connecting to Sophos Firewall PPTP VPN

1. Select your VPN connection and click Connect.

Image showing how to connect to the Sophos PPTP VPN

2. If you have not set your user name and password while adding your VPN connection, a window will appear for you to provide your credentials. Provide your user name and password and click OK.

Image showing a Windows Security prompt asking the user to provider their login credentials

3. Rublon will send a Mobile Push authentication request to your phone. Tap APPROVE.

Image showing a Mobile Push received when logging in to the Sophos XG Firewall PPTP VPN

4. You will connect to the VPN.

Testing MFA for Sophos web admin console

If you enabled Rublon Multi-Factor Authentication for web admin console logins, you can test that feature in the following way:

1. Open the Sophos web admin console by opening https://<Sophos Device IP Address>:4444 in your web browser.

2. Enter your Username and Password and enter the CAPTCHA code.

Image showing the Sophos Firewall web admin console login page

3.  Rublon will send a Mobile Push authentication request to your phone. Tap APPROVE.

Image showing a Mobile Push received when logging in to the Sophos XG Firewall web admin console

4. You will gain access to the web admin console.

Troubleshooting

Blast-RADIUS Vulnerability Protection

RADIUS integrations may enforce the validation of the Message-Authenticator RADIUS attribute as part of their mitigations for the Blast-RADIUS vulnerability.

The Rublon Authentication Proxy supports the Message-Authenticator attribute starting from version 3.5.3. The Rublon Auth Proxy uses the force_message_authenticator option in the configuration file (set to true by default) to safeguard against Blast-RADIUS attacks.

If you are experiencing issues with your RADIUS integration, ensure that the force_message_authenticator is set to true.

If you are using Rublon Authentication Proxy 3.5.2 or older, update to the newest available version.

If you encounter any issues with your Rublon integration, please contact Rublon Support.

Related Posts

Rublon Authentication Proxy

Rublon Authentication Proxy – Integrations

MFA for Sophos UTM

MFA for Sophos VPN

Filed Under: Documentation

Primary Sidebar

Contents

  • Overview of Sophos XG Firewall VPN MFA
  • Supported Authentication Methods
  • Before You Start
    • Required Components
    • Create an Application in the Rublon Admin Console
    • Install Rublon Authenticator
  • Configuring MFA for Sophos XG Firewall VPN
    • MFA for Sophos XG Firewall VPN Configuration Part 1: Adding Rublon Authentication Proxy as RADIUS server
    • MFA for Sophos XG Firewall VPN Configuration Part 2: Using Rublon Authentication Proxy in selected Sophos services
      • Firewall authentication methods
      • User portal authentication methods
      • VPN (IPsec/dial-in/L2TP/PPTP) authentication methods
      • Administrator authentication methods
      • SSL VPN authentication methods
  • Testing MFA for Sophos Firewall
    • Testing MFA for Sophos User Portal
    • Testing MFA for Sophos Firewall SSL VPN
    • Testing MFA for Sophos Firewall IPsec VPN
    • Testing MFA for Sophos Firewall PPTP VPN
      • How to Add and Configure a Sophos Firewall PPTP VPN connection in Windows VPN
      • Connecting to Sophos Firewall PPTP VPN
    • Testing MFA for Sophos web admin console
  • Troubleshooting
  • Related Posts
Try Rublon for Free
Start your 30-day Rublon Trial to secure your employees using multi-factor authentication.
No Credit Card Required


Footer

Product

  • Regulatory Compliance
  • Use Cases
  • Rublon Reviews
  • Authentication Basics
  • What is MFA?
  • Importance of MFA
  • User Experience
  • Authentication Methods
  • Rublon Authenticator
  • Remembered Devices
  • Logs
  • Single Sign-On
  • Access Policies
  • Directory Sync

Solutions

  • MFA for Remote Desktop
  • MFA for Windows Logon
  • MFA for Remote Access Software
  • MFA for Linux
  • MFA for Active Directory
  • MFA for LDAP
  • MFA for RADIUS
  • MFA for SAML
  • MFA for RemoteApp
  • MFA for Workgroup Accounts
  • MFA for Entra ID

Industries

  • Financial Services
  • Investment Funds
  • Retail
  • Technology
  • Healthcare
  • Legal
  • Education
  • Government

Documentation

  • 2FA for Windows & RDP
  • 2FA for RDS
  • 2FA for RD Gateway
  • 2FA for RD Web Access
  • 2FA for SSH
  • 2FA for OpenVPN
  • 2FA for SonicWall VPN
  • 2FA for Cisco VPN
  • 2FA for Office 365

Support

  • Knowledge Base
  • FAQ
  • System Status

About

  • About Us
  • Blog
  • Events
  • Co-funded by the European Union
  • Contact Us

  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

© 2025 Rublon · Imprint · Legal & Privacy · Security

  • English