Dear PJ_Wong and CheckMates
Could you please elaborate on your solution for 2FA for internal users (certificate + username/password)? We also want to setup this feature in our environment but quite not sure about setting needed.
- Our environment is quite small with about 60 internal users, we are running 81.20. Currently for Remote Access VPN we use single factor (legacy) with username/password.
- Our Gateway Cluster property for VPN Client/Authentication setting is as below, and all users need only username and password to login for both older and newer version of Endpoint Security VPN clients.

Our intention is generate p12 certificate and distribute certificates to users. But since we wanted to test 2FA (certificate and username/password) first for some test users and at the same time let the rest of users to continue with only username and password.
My question are:
1. What we need to change in this VPN Client/Authentication settings to facilitate 2FA? We understand that we may need to add some method(s) under "Multiple Authentication Clients Settings" (3 options available: Cert_Username_Password, Personal_Certificate, Username_Password).
2. If we add options above then would it affect users which still need to use only username and password to login? We dont have test environment so we need to make sure the system still works for normal users during test.
3. What settings do we need to do at user property setting for each user in 2FA test group (like setting Encryption)?
We already went through "R81.20 Remote Access VPN Administration Guide" but the info is quite confusing for us (we are not Checkpoint specialists and our IT team is small). Since you were successfully configured similar 2FA system it would be great if you can show us some direction.
Thank you CheckMates,
Hien