Programmable TOTP token that fits any authentication system
Classic SHA-1 TOTP hardware token: high-strength and water-resistant
Programmable hardware TOTP token in a key fob format
Classic hardware TOTP token with SHA-256 algorithm support
Free 2FA app for iOS and Android with encrypted cloud backup, PIN, and biometric protection
OTP delivery via messenger — easy, secure, convenient. The service is available on Telegram, Viber and Facebook Messenger
Delivery of one-time passwords via SMS messages
Free delivery of one-time passwords via email
Free one-time password delivery through push notifications in the Protectimus Smart 2FA app - simply press a button to confirm your login
You can set up multi-factor authentication (2FA) for Forcepoint VPN with Protectimus using the RADIUS protocol:
- Get registered with Protectimus SAAS Service or install the On-Premise 2FA Platform and configure basic settings.
- Install and configure Protectimus RADIUS Server.
- Add Protectimus as RADIUS Server for Forcepoint VPN.
Name | Come up with a name for your RADIUS server, e.g. Protectimus RADIUS Server. |
IP Address | Enter the IP of server where the Protectimus RADIUS Server component is installed. |
Resolve | The IP address of the server will be automatically resolved from a domain name entered into the Name field. |
Location | If there is a NAT device between the server and other SMC components, this field specifies the location of the server. |
Contact Addresses | 1. Default — This option is used by default when a component belonging to another location connects to the server. 2. Exceptions — Selecting this option will open the Exceptions dialog box. |
Port | Indicate 1812 (or whichever port you configured in the Protectimus radius.yml file when configuring Protectimus RADIUS Server). |
Shared Secret | Indicate the shared secret you created in the Protectimus radius.yml file (radius.secret property) when configuring Protectimus RADIUS Server |
Number of Retries | This setting specifies the number of times that Firewalls attempt to connect to the RADIUS authentication server in the event of a failed connection. |
Timeout | This setting specifies the time (in seconds) that Firewalls will wait for a reply from the RADIUS authentication server. Set to 60 seconds. |
Tools Profile | You can add custom commands to the server’s right-click menu. Click Select and select a Tools Profile element. |
Name | This field displays the name of the Authentication Method. |
Type | This field displays the authentication type. In this case: RADIUS — The RADIUS protocol is used. |
Comment | To enter a comment, double-click on the cell. |
Add | Clicking this option opens the Select Element dialog box, which allows you to add the selected authentication method to the Authentication Methods list. |
Edit | Selecting this option opens the Properties dialog box for the chosen authentication method. |
Remove | Selecting this option removes the chosen authentication method. |
Please note! The IP address used as the identity is merely a name, and the interface and IP address used for authentication-related connections are selected based on the Firewall’s routing information, like any other connection.
Protectimus Ltd
Carrick house, 49 Fitzwilliam Square,
Dublin D02 N578, Ireland
USA: +1 786 796 66 64
Ireland: +353 19 014 565
Protectimus Ltd
Carrick house, 49 Fitzwilliam Square,
Dublin D02 N578, Ireland
USA: +1 786 796 66 64
Ireland: +353 19 014 565