04-05-2025 04:10 AM - edited 04-05-2025 04:11 AM
Does Duo MFA support integration with other brand network management such as Fortigate mgmt, juniper switch mgmt, and ruckus switch mgmt? Is there a guide for that?
04-05-2025 04:45 PM
04-08-2025 04:44 AM
But what if the network devices don't have RADIUS or a RADIUS server? As we only use local account?
Also, what could be the guide and requirements needed if we are going to protect the SSH access of the network device management aside from the GUI? When it comes to GUI, is there a requirement for that?
04-08-2025 04:59 AM
04-09-2025 03:20 AM
We have on-prem AD, and we have already set up the auth proxy in my environment.
04-09-2025 03:43 AM
If you think about how the authentication flow works, you'll come down to a few different options:
If you're logging into network equipment using local users on this equipment, then that equipment needs to have built-in support for additional 2FA/MFA in order to attach any kind of MFA to the authentication process.
This is almost never the case, rare exceptions apply.
In order to involve external MFA solution like DUO, you need to be able to ask an external source.
While technically speaking, you could get creative with local users and external authorization flow, but the most common setup is to have a centralized identity store (for example, AD), and you authenticate to that via RADIUS or LDAP(s).
For GUI authentications only, you could also use SAML and DUO SSO.
So typically you would be using RADIUS or LDAP from the switch or firewall to the DUO auth proxy, authenticate against something (AD), and if that authentication succeeds, an additional factor (DUO PUSH) is applied.
One thing to keep in mind is to extend the authentication timeout to allow the end-user/admin to go through the MFA process.
So to answer your initial question, you can use DUO for practically anything and any vendor, as long as your authentication process involves RADIUS, LDAP, or SAML.
On a practical note, however, you could also base your design on a trusted bastion/jump host, have MFA towards that host, but not from the host to the network equipment.
In the environments that I've seen implementing MFA directly towards management on network equipment, it often ends up with multiple exceptions because of automation, script usage, or other use-cases, creating a false sense of security around MFA usage on network management.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide