kjentech.github.io

ADC Gateway Configuration

This ADC config will give you:

Internal IP 10.10.10.10 is NATed to external IP x.x.x.x If these configuration steps are done from top to bottom, you have the complete setup. replace “domain.com” with your domain.

Visual customizations: See ADC Customizations.

RDP Client profiles

RDP Client Profile: rd_client_noextras

RDP Client Profile: rd_client_noextras_multimon

RDP Client Profile: rd_client_copyclipboard

Common:

RDP Server profiles

RDP Server Profile: rdp_serverprof_3389_1

Session Profile: vpn_rd_noextras

Session Profile: vpn_rd_noextras_multimon

Session Profile: vpn_rd_copyclipboard

Common:

Session policies

Session Policy: vpn_rd_noextras_pol

Session Policy: vpn_rd_noextras-multimon_pol

Session Policy: vpn_rd_copyclipboard_pol

Session Policy: vpn_rd_copyclipboard_pol2

Traffic profiles

Traffic Profile: trafficAct_SSO

Traffic Profile: trafficAct_noSSO

Traffic Policy: trafficPol_SSO (will be applied to all objects with low priority)

Traffic Policy: trafficPol_noSSO

Traffic Policy: trafficPol_noSSO_exception (will only be applied to this one server with high priority)

LDAP server

LDAP Server: ldap_dc01

RADIUS server

RADIUS Server: radius_mfa01

Authentication Policies

Authentication Policy: authpol_ldap_dc01

Authentication Policy: authpol_radius_mfa01

Login Schema Profile: loginSchema_custom

nFactor flows

nFactor Flow: nFactorFlow_LDAP-MFA

nfactor

AAA vServers

AAA vServer: authserv_radius-mfa

Authentication Profile

Authentication Profile: AuthProf_gateway_LDAP-MFA

Gateway vServers

Gateway vServer: vserver_gateway

Content Switching

Content Switching Action: csact_gateway

Content Switching Policy: cspol_gateway

Content Switching vServer: cs_gateway

Responder Action: http_to_https_actn

Responder Policy: http_to_https_pol

Content Switching vServer: http-https_redirector

Bookmarks

Add bookmarks as needed.

Customizations

Portal Theme: CUSTOM-RfWebUI

Customizations: See ADC Customizations.

Examples include:

Flow

  1. User browses to http://gateway.domain.com with HTTP
  2. Request hits Content Switching vServer “http-https_redirector” -> HTTP 302 -> https://gateway.domain.com (port 443)
  3. Request hits Content Switching vServer “cs_gateway” -> Gateway vServer “vserver_gateway”
  4. Gateway vServer “vserver_gateway” has Authentication Profile “AuthProf_gateway_LDAP-MFA” -> AAA vServer “authserv_radius-mfa”
  5. AAA vServer “authserv_radius-mfa” has Portal Theme “CUSTOM-RfWebUI” and nFactor Flow “nFactorFlow_LDAP-MFA” with first factor “nFactorFlow_ldap”, has Login Schema “loginSchema_custom.xml”
  6. User is shown webside with organization logo (via Portal Theme) and Email Address/Password fields (via Login Schema)
  7. Second factor in nFactor “azuremfa” has no Login Schema, user is shown spinner with message about Authenticator or is shown text field for SMS.
  8. User is shown Gateway portal with Desktops chosen.