Using WIN2008R2 as a RADIUS server-Cisco device Chapter

Source: Internet
Author: User
Tags configuration settings

win2008r2 do Radius Server Cisco Device Article

recently the company is ready to use Radius acts as an authentication server for Cisco devices, and, out of curiosity, first tests with a radius server. The first I used is Tekradius This server, do certification is no problem, but in the authorization, how can not get privilege15 permission, study for a long time have no success, temporarily put aside. Then I switched to win2008r2 NPS as the Radius server, and both authentication and authorization were successful.

install it first. Win2008r2, in Server Manager , Add a new role, select Network Policy and Access Service, choose only Network Policy Server ( Networkpolicy Server) " is OK.

Then Set NPS, because I am testing the environment is not built domain, so in the right-click NPS "registered server in AD " is gray, if used in a domain environment, you need to register first, the default is not automatically registered.

650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M00/85/FA/wKioL1exac-jCI3OAAC3IzoaJU8205.jpg-wh_500x0-wm_3 -wmp_4-s_2902094292.jpg "title=" 1.jpg "alt=" Wkiol1exac-jci3oaac3izoaju8205.jpg-wh_50 "/>

The first step is to join us first . Raidus 's customer service side, Cisco devices. Tap radius Customer Service and server , select radius customer service , click New on theright menu bar ,and then enter the following information A shared secret is a password that is connected to a Cisco device and can be set up casually.

650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M00/85/FA/wKioL1exae2hrh8hAADroxDclO4104.jpg-wh_500x0-wm_3 -wmp_4-s_1264995618.jpg "title=" 2.jpg "alt=" Wkiol1exae2hrh8haadroxdclo4104.jpg-wh_50 "/>

The second step is to establish the authentication and authorization strategy, click "Policy", right click "Network Policy", select "New", although enter a name, click Next,

650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M02/85/FA/wKiom1exagfCMe-MAAGnvPU7oUQ439.jpg-wh_500x0-wm_3 -wmp_4-s_992743193.jpg "title=" 3.jpg "alt=" Wkiom1exagfcme-maagnvpu7ouq439.jpg-wh_50 "/>

in the "Specify criteria" here, I am using the local user group as a condition, click " Add ", Select " user group ", here is the input local administrators, After determining the next step

650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M01/85/FA/wKiom1exaiShiNKcAAC17J0__nA026.jpg-wh_500x0-wm_3 -wmp_4-s_2929663114.jpg "title=" 4.jpg "alt=" Wkiom1exaishinkcaac17j0__na026.jpg-wh_50 "/>

Under "Specify access rights", go directly to the next step,

650) this.width=650; "Src=" Http://s2.51cto.com/wyfs02/M00/85/FA/wKiom1exak7BZgWNAADBTgF5jWk851.jpg-wh_500x0-wm_3 -wmp_4-s_2797970703.jpg "title=" 5.jpg "alt=" Wkiom1exak7bzgwnaadbtgf5jwk851.jpg-wh_50 "/>

" Configure authentication Method ", to tick "Unencrypted Authentication", click Next

650) this.width=650; "Src=" Http://s2.51cto.com/wyfs02/M02/85/FA/wKiom1examGDVN05AAEigUhddpo025.jpg-wh_500x0-wm_3 -wmp_4-s_1929248207.jpg "title=" 6.jpg "alt=" Wkiom1examgdvn05aaeiguhddpo025.jpg-wh_50 "/>

Configure constraints, continue to lazy, next

650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M02/85/FA/wKioL1exanbwATQ4AADsdCpOQkg662.jpg-wh_500x0-wm_3 -wmp_4-s_1630385093.jpg "title=" 7.jpg "alt=" Wkiol1exanbwatq4aadsdcpoqkg662.jpg-wh_50 "/>

" configuration Settings ", the RADIUS attribute settingin this page is the key, click " Standard ", the default 2 attributes are deleted,

650) this.width=650; "Src=" Http://s2.51cto.com/wyfs02/M02/85/FA/wKioL1exao_y27WgAAEqv1HYoBA316.jpg-wh_500x0-wm_3 -wmp_4-s_31055306.jpg "title=" 8.jpg "alt=" Wkiol1exao_y27wgaaeqv1hyoba316.jpg-wh_50 "/>

then add service-type, and in " other " then choose Login

650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M01/85/FA/wKiom1exaqfSn5JjAAEnpWKp8ug707.jpg-wh_500x0-wm_3 -wmp_4-s_265234791.jpg "title=" 9.jpg "alt=" Wkiom1exaqfsn5jjaaenpwkp8ug707.jpg-wh_50 "/>

Click on " Vendor specific " settings Authorization, click "Add", select vendors-specific point to add

650) this.width=650; "Src=" Http://s2.51cto.com/wyfs02/M00/85/FA/wKiom1exar_jn9ImAAJLUIvQWJ0340.jpg-wh_500x0-wm_3 -wmp_4-s_2891139302.jpg "title=" 10.jpg "alt=" Wkiom1exar_jn9imaajluivqwj0340.jpg-wh_50 "/>

Pop-up attribute information for the interface, select Cisco, and then tap Configure Properties

650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M00/85/FA/wKioL1exatqS-ZvTAABqRBpqDk0810.jpg-wh_500x0-wm_3 -wmp_4-s_2815017029.jpg "title=" 11.jpg "alt=" Wkiol1exatqs-zvtaabqrbpqdk0810.jpg-wh_50 "/>

Configuration VSA, property number : 1, attribute format : string, set value:shell:priv-lvl=15

650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M00/85/FA/wKiom1exau2iA_coAABEegij3Ic866.jpg-wh_500x0-wm_3 -wmp_4-s_912675711.jpg "title=" 12.jpg "alt=" Wkiom1exau2ia_coaabeegij3ic866.jpg-wh_50 "/>

when you're done, click Next and the summary will appear, then click Done. NPS Setup is complete.

650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M02/85/FA/wKioL1exawCCqjCHAAD9tSqg3go982.jpg-wh_500x0-wm_3 -wmp_4-s_4121785288.jpg "title=" 13.jpg "alt=" Wkiol1exawccqjchaad9tsqg3go982.jpg-wh_50 "/>

Finally, the AAA command is configured on The Cisco device ,

AAA New-model turn on AAA mode

The following command is for local protection, it is strongly recommended to do the line protection of the console port

AAA Authentication Login Noauthen None protection - not certified

AAA authorization exec Noauthor None protection - not authorized

AAA Authorization Console

Line Console 0 protection for local lines

Login Authenticationnoauthen Set No authentication to CON port, keep last entry method , just in case

Authorization Execnoauthor recommended configuration, but preferably configured on

AAA Authentication Login Default Group RADIUS local//Login authentication, first through radius server, followed by local

AAA Authorization Exec Default Group RADIUS local// authorization authentication, first through radius server, followed by local

Line vty 0 4//Telnet authentication Authorization

Login Authenticationdefault

Authorization Execdefault

Radius-server host 192.168.11.10 auth-port 1812 Acct-port 1813 Keycisco// Configure radius server,key is just set Shared secret.


This article is from the "Kmzone" blog, make sure to keep this source http://337962.blog.51cto.com/327962/1838395

Using WIN2008R2 as a RADIUS server-Cisco device Chapter

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.