Need MS_CHAPv2 Across user clients and portal
Trying to bring a client up to NIST standards. While MS_CHAPv2 is provided with a Radius Authentication server, and a command is available to set allowed authentication methods for VPN clients. The same cannot be said about authenticating the user portal/ firewall and admin access. XG firewall defaults to PAP with no command or capability to set allowed authentication methods. So we've just lost a nice XG feature set because of this issue. :-(
There are various requests to get MS_CHAPv2 working with AD authentication servers. Just bumping that feature request with this one as well.
I think this is Critical Security breach (bug by design) in Sophos SSL VPN solution, which must be fixed