This document provides guidance for VIP customers who are currently using VIP Enterprise Gateway (EG) for RADIUS-based authentication but face limitations when their client applications (such as VPN clients, 802.1X wireless, or network access controllers) that require EAP (Extensible Authentication Protocol) support. It outlines two viable approaches to address this requirement.
Enterprise Gateway 9.11.x
VPN client (FortiGate, Cisco, Palo Alto, etc.) or 802.1X wireless deployment mandates EAP over Radius.
Current state (VIP EG without EAP)
VIP Enterprise Gateway currently provides robust RADIUS-based authentication supporting PAP (Password Authentication Protocol). This works well for many authentication scenarios including VPN access, network devices, and web portals that support standard RADIUS PAP authentication.
Customer requirement (VPN/802.1X clients requiring RADIUS-EAP)
Modern authentication clients increasingly require EAP (Extensible Authentication Protocol) support, particularly:
These clients cannot authenticate using standard PAP and specifically require EAP methods tunneled through RADIUS.
Business impact
Without EAP support, customers face:
Authentication Protocol | RADIUS with EAP-TTLS (inner PAP) | SAML 2.0 |
Infrastructure | VIP Enterprise Gateway + VIP Cloud | Azure Active Directory + VIP Cloud |
Availability | May/June 2026 (under development) | Available now |
Client Requirements | EAP-TTLS capable RADIUS client (VPN, 802.1X) | SAML-capable client (browser-based, some VPN) |
Use Cases | VPN (IKEv2), 802.1X wireless, NAC | Web apps, modern VPN with SAML support |
RADIUS Dependency | Yes (continues using RADIUS) | No (bypasses RADIUS entirely) |
Supported MFAs | OTP, PUSH, PUSH + Number Challenge (NC) | FIDO, OTP, PUSH, PUSH + NC |
Testing with common VPN clients (FortiClient, Palo Alto GlobalProtect, FreeRADIUS) has revealed that Access-Challenge prompts for MFA are not supported within the EAP-TTLS/PAP framework. While VIP EG supports challenge flows, these clients cannot prompt users for additional input after the initial authentication. Therefore, only inline MFA methods are supported: Username + Password + OTP (e.g., Password123456) or Username + Password for PUSH authentication.
VIP Enterprise Gateway is being enhanced to support EAP-TTLS authentication with inner authentication methods as PAP. This extends the existing RADIUS infrastructure to support modern authentication clients that require EAP.
The below diagram provides a brief overview on the architecture and flow for EAP enabled VPN clients using the enhanced VIP Enterprise Gateway for authentication.
For customers with an active Azure AD tenant and VIP licensing, SAML-based authentication provides an alternative path that completely bypasses RADIUS infrastructure. This solution leverages Azure AD as an identity provider, enabling modern authentication protocols for supported clients.
The following diagram depicts architectural flow using Microsoft Entra ID over SAML.