06-06-2018 08:14 AM
Has anyone had problems configuring Authorized Networks in DUO when the RDS Gateway is behind a F5 Loadbalancer?
Because the F5 loadbalancer is proxying the connection between the user and the RDS Gateway. DUO only sees the IP address of the F5 loadbalancer in the DUO logs.
06-06-2018 11:57 PM
I would be interested to know the answer to this as well. Same configuration except we use Kemp LBs.
We have our LBs and gateway in a DMZ. The session hosts are in a different subnet. We are trialling the Duo Remote desktop app install on all session hosts. We have whitelisted the internal LAN but not the DMZ. This means internal users dont get 2FA’d but external users via the gateway do.
Still in trial phase at the moment…
06-08-2018 07:55 AM
Duo for RDG does not utilize the host name or IP from x-forwarded-for
as the client IP. Please contact Duo Support, your CSM, or your AE to open a feature request for this.
06-08-2018 09:09 AM
Thanks for update Kristina.
Would you recommend going around the f5 to get Authorized locations to work?
06-13-2018 06:43 AM
If you want the Authorized Networks feature to work reliably with Duo for RDG then the client IP received at the RDG server needs to be the actual client IP (which would likely be accomplished by bypassing your load balancer).
06-27-2018 07:55 AM
Thanks DUOKristina for your response.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide