Настройка сервера radius в windows server 2012

Anytime there’s a discussion about a wired or wireless authentication, it’s probable that the word “RADIUS server” will come up sooner or later. RADIUS, also known as a “AAA server,” carries out the essential functions of Authentication, Accounting, and Authorization within a WPA-2 Enterprise network. As you might expect, Microsoft has improved its RADIUS server over time to meet the authentication needs of its vast customer base.

Just like Windows 2008 server, the 2012 edition has long been used by organizations across the globe until the latest versions in the form of 2016/2019/22 came into existence. Unlike its latest cloud counterparts, Windows 2012 servers are on-premise in nature and catch a great deal of attention from hackers.

Here’s a recent incident of an update causing authentication to fail, affecting primarily the on-premise setups. On-premise servers, however, are not the subject of our attention here; let’s get back to configuring the Windows 2012 server.

Before configuring the Windows Server 2012, ensure that you met the following requirements for successfully configuring the Windows 2012 server.

Prerequisites for Windows RADIUS Server 2012:

❖   System Requirements:

  • Processor: You need a processor with at least 1.4 GHz for x64 processors. But Microsoft recommends using 2GHz for smooth functioning.
  • RAM: The minimum requirement for RAM is 512 MB, but Microsoft recommends having at least 2GB of RAM.
  • Disk space: You need a minimum disk space of 32 GB or more, but Microsoft usually recommends using 40 GB or more disk space. Also, the disk space requirements vary with the processor and RAM used in the system.

❖   Active Directory Setup:

You must update the Active Directory environment before adding the domain controller.

❖   Server Core Installation:

Unlike Windows Server 2008 version, the admin need not select the Full Installation or Server Core Installation option beforehand in Windows Server 2012.

These features are merged in the 2012 version to give three optional features which the admin can install or uninstall at his will.

❖   Miscellaneous Requirements:

  • Ensure that your Windows Server 2012 kernel-mode drivers are up to date and digitally signed for x64-based operating systems.
  • Turn off your antivirus software as the installation process can be hampered by virus protection software. For instance, checking each file that is copied locally to your computer might significantly slow down the installation.
  • Ensure that the Windows Firewall is enabled by default.
  • Ensure that all the relevant data and information are appropriately backed up before the configuration.

Overview of Windows RADIUS Server 2012 Configuration:

  • Install and set up Windows Server 2012/Windows Server 2012 R2.
  • Install Active Directory Domain Services (ADDS) to configure the new domain.
  • Install Certificate Authorities (CA) with Active Directory Certificate Services (ADCS).
  • Install NPS ( Network Policy Server).
  • Configure Certificate Authorities (CA), i.e., Active Directory Certificate Services (ADCS) for Certificates.
  • Configure NPS ( Network Policy Server) for the authentication protocol.
  • Configure RADIUS.
  • Define Network policies for users/devices.
  • Configure Access Point.
  • Set up zero clients, and select 802.1x authentication.
  • Configure Wireless Connection Request.

Configure Windows 2012 RADIUS Server:

Now we will see each step involved in configuring Windows 2012 server in detail:

Install and Configure AD DS:

For configuring ADDS, follow the given instructions:

  • Navigate to Windows Server 2012.
  • Click Start.
  • Click Server Manager.
  • Navigate to Role Summary.
  • Click Add Roles and Features.
  • Select Role-based or Feature-based installation.
  • Navigate to the Before You Begin page and click Next.
  • Navigate to the Select Server Roles page.
  • Select the Active Directory Domain Services.
  • Click Next.
  • Click Install on the Confirm Installation Selections
  • Navigate to the Installation Results page and click Close.
  • ADDS is installed.

Install AD CS and NPS :

  • Navigate to Server Manager.
  • Select Roles and Click Add Roles.
  • Click Next on the Before you Begin page.
  • Select Active Directory Certificate Services (AD CS) and Network Policy and Access Services.
  • Click Next.
  • Click Next on Network Policy and Access Services
  • Navigate to Role Services and select Network Policy Server.
  • Click Next.
  • Select Create a self-signed certificate for SSL encryption and click Next.
  • Click Next on the Introduction to Active Directory Certificate Services
  • Select Certification Authority on the Select Role Services page and click Next.
  • Select Enterprise on Specify Setup Page and Click Next.
  • Select Root CA on Specify CA Type Page and Click Next.
  • Select Create a new private key on the Set Up Private Key Page and Click Next.
  • Click Next on Configure Cryptography for CA.
  • Enter details on Configure CA Name page and click Next.
  • Enter the validity period on the Set Validity Period page and click Next.
  • Click Next on Configure Certificate Database
  • Click Next on the Web Server (IIS).
  • Click Next on the Select Role Services.
  • Click Install on the Confirm Installation Selection
  • Click Close.

Now the AD CS (Active Directory Certificate Services), Web Server (IIS), and NPS are installed successfully.

Configure NPS ( Network Policy Server) and RADIUS authentication.

  • Click on the Start button and select Administrative tools.
  • Click NPS on the Network Policy Server.
  • Select Register Server in Active Directory and click OK.
  • Click OK.
  • On the NPS (Local) page, select RADIUS server for 802.1x Wireless or Wired Connections.
  • Click Configure 802.1x.
  • Select Secure Wireless connections on the Configure 802.1x page.
  • Type Name and click Next.
  • Add RADIUS clients on the Configure 802.1x page and click Next.
  • Type the following details on the New RADIUS Client page.
    • Name
    • IP Address
    • Shared Secret (Manual)
  • Click OK and click Next.
  • Select Microsoft Protected EAP (PEAP) on the Configure 802.1x
  • Click Configure.
  • Select Secured password on the Edit Protected EAP Properties page and click Edit.
  • Enter the Number of authentication retries and click OK and click Next.
  • Select Groups and click Next.
  • Click Next again and click Finish.
  • Restart NPS again.

Define Network Policies for users/devices.

You can follow the given steps for Defining the network policies.

  • Navigate to the NPS console and click NPS (local).
  • Click and expand Policies.
  • Select Network Policies.
  • Click New.
  • Enter a Policy Name.
  • Select the Type of Network Access Server to Unspecified while using Netscaler or RCdevs OpenLDAP while using OTP.
  • Click Add in Specify Conditions
  • Select Windows Groups and click Add.
  • Click Add Groups and click OK.
  • Select NAS Identifier in the Select Conditions
  • Enter a Name and select Next to continue.
  • Select Access Granted in Specify Access Permission
  • Under Configure Authentication Method, select MS-CHAP v2 for maximum security.
  • Click Next.
  • Select RADIUS attributes as Standard in Configure Settings.
  • Click Add.
  • Enter the attribute value in String and click OK.
  • Click Next and click Finish.

You can use the Network Policy Wizard to create and add new conditions, constraints, and setting to the network policies.

radius authentication serverAdministrators can define and implement a wide range of policies using our Cloud RADIUS, including lookup policies applied at the moment of authentication. For instance, depending on the time of day, you can decide whether to accept or reject people and devices. You may also restrict access to devices running a specific operating system.

Set up Zero Clients, and Select 802.1x Authentication

  • Navigate to the Control panel and open the Network and Sharing center.
  • Click Change adapter settings.
  • Select Local Area Connection and click Properties.
  • Select Authentication and click Enable IEEE 802.1x authentication.
  • Select the desired protocol in the dropdown button.

Configure Wireless Connection Request

  • Navigate to the Control panel and open the Network and Sharing center.
  • Click Manage Wireless Networks.
  • Select Manually Create a network profile.
  • Enter your SSID in Network Name and click Next.
  • Click Change Connection settings.
  • Select Security and click Settings.
  • Select the Trusted Root CA and click OK.
  • Navigate to Advanced Settings.
  • Select Specify Authentication Mode and click OK.

Is On-Premise Windows RADIUS a Good Idea?

Traditional RADIUS servers located on a company’s premises are prone to many security issues. Windows RADIUS servers—which are extensively used in on-premise infrastructure—are typically built around NPS and have a number of vulnerabilities that hackers routinely employ in zero-day attacks.

Also, because of its physical accessibility, an NPS server’s on-premise presence makes it vulnerable to various physical security threats, from intruders to disasters – or just power outages. Given the costs of maintaining highly-secure physical locations, there’s rarely a circumstance in which on-prem works out to be cheaper than cloud RADIUS.

Cloud integration of NPS, designed primarily for on-premise AD setups, has significant downsides even with other Microsoft-owned cloud-based solutions like Azure AD. If you want to use Azure with NPS, you will require a separate authentication server or proxy to simplify the process. These operations are not only challenging and time-consuming but also relatively expensive.

Cloud RADIUS: The Most Reliable RADIUS Server for Windows

Network administrators have relied on Windows Server 2012 edition for years, but it has seen most of the Microsoft ecosystem change since that time. It is difficult to overlook its flaws, which are more of a security liability than a strength in the present era.

The move to the cloud offers several benefits over remaining in an on-premises environment, and what could be better than utilizing our ground-breaking Cloud RADIUS? You can nearly wholly avoid these limitations by using a cloud-based server like Cloud RADIUS supported by SecureW2.

With our Cloud RADIUS’ advanced Policy Engine feature, you may restrict or enable user access depending on any number of attributes, including user/device characteristics, date/time of day, and more. Additionally, you may use our Cloud RADIUS with any IDP because it is built for vendor neutrality.

RADIUS server

Using its servers, you may also enforce policies using real-time user lookups against Azure, Okta, and Google Workspace. You can also onboard users to Cloud RADIUS using their existing AD identities without the need to create an LDAP proxy.

Also, integrating with Securew2 gives you more customization for many innovative features like Azure MFA auth, Intune auto revocation, windows hello for business login, and many more. Our RADIUS services can be set up quickly, cost a fraction of what on-prem solutions do, and has no infrastructure costs because it is all in the cloud.

If you are interested in taking that first step towards security for your organization, look no further and click here to inquire about pricing.

Содержание статьи:

  • 1 Добавление роли, настройка Active Directory
  • 2 Настройка Network Policy Server
  • 3 Настройка Cisco IOS AAA
    • 3.1 Пример настройки на Cisco 2911/K9 15.0(1r)M12
    • 3.2 Пример настройки на Cisco WS-C3750V2-48TS 12.2(55)SE5

Рассмотрим настройку Radius аутентификации на Cisco устройствах, посредством службы Политики сети и доступа (Network Policy Server) на Windows Server 2012 R2.

Добавление роли, настройка Active Directory

Добавляем роль , переходим в Диспетчер серверовУправлениеДобавить роли и компоненты.

Выбираем роль (Службы политики сети и доступа):

Выбираем службу ролей (Сервер политики сети):

Для завершения установки роли, нажимаем Установить и дожидаемся установки компонента, после чего нажимаем Завершить.

В  Active Directory необходимо создать группу безопасности (прим. NPS_Cisco) и включить в нее пользователей кому будет разрешена аутентификации на маршрутизаторах и коммутаторах Cisco.

Настройка Network Policy Server

Открываем оснастку Сервер политики сети (Network Policy Server).

Для полноценного использования функций NPS-сервера в домене, выполним регистрацию его в Active Directory. В оснастке на NPS (Локально), нажимаем правой кнопкой мыши и выбираем Зарегистрировать сервер в Active Directory (Register server in Active Directory):

Подтверждаем регистрацию сервера в Active Directory:

После регистрации NPS в Active Directory, добавим клиента RADIUS. На строке RADIUS-клиенты и серверы (RADIUS Clients and Servers) щелкаем правой кнопкой мыши и выбираем Новый документ (NEW):

Во вкладке «Параметры» вводим Понятное имя (Friendly name), IP-адрес (Address) и Общий секрет (Shared Secret). Во вкладке «Дополнительно» указываем Имя поставщика (Vendor name) — Cisco

Значение в поле Понятное имя (Friendly name) может отличаться от DNS имени. Оно потребуется нам в дальнейшем для идентификации конкретного сетевого устройства при создании политик доступа. Опираясь на это имя мы сможем задавать например маску по которой будут обрабатываться определённой политикой доступа несколько разных RADIUS клиентов.

Раскрываем ветку Политики (Policies) — Сетевые политики (Network Policies) и щелкаем правой кнопкой мыши и выбираем Новый документ (NEW):

Задаем Имя политики (Policy name), Тип сервера доступа к сети (Type of network access server) оставляем без изменения:

Задаем условия, которые должны соответствовать для успешной аутентификации. Создадим два условия:

  • Группы пользователей (указываем ранее созданную в Active Directory группу безопастности)
  • Понятное имя клиента (указываем дружественные имена, начинающиеся с префикса CISCO_)

Результат добавления условий:

Указываем разрешение доступа, оставляем значение Доступ разрешен (Access Granted).

Cisco поддерживает только методы Проверка открытым текстом (PAP, SPAP) (Unencrypted authentication (PAP, SPAP)). Снимите все флажки и отмечаем только Проверка открытым текстом (PAP, SPAP):

После настройки методов проверки подлинности вам будет предложено настроить Ограничения (Constraints), пропускаем этот раздел и переходим к следующему шагу.

Настройка параметров (Configure Settings), переходим в Атрибуты RADIUS (RADIUS Attributes) — Стандарт (Standard). Удаляем имеющиеся там атрибуты и нажимаем Добавить… (Add…)

Тип доступа выбираем Service-Type, нажимаем Добавить, выставляем значение атрибута Login 

переходим в Атрибуты RADIUS (RADIUS Attributes) — Зависящие от поставщика (Vendor Specific), добавляем новый атрибут, и нажимаем Добавить… (Add…)

В пункте Поставщик (Vendor), указываем Cisco и нажимаем Добавить… (Add…). Будет предложено добавить сведения об атрибуте, нажимаем Добавить… (Add…) и устанавливаем значение атрибута:

shell: priv-lvl = 15


В итоге должно получится как изображено ниже. Нажимаем Далее (Next).

Представление сводки новой политики, которая была сформирована. Нажимаем Готово (Finish):

После создания политики, можно переходить к настройке маршрутизаторов и коммутаторов Cisco для аутентификации на сервере Radius NPS.

Настройка Cisco IOS AAA

Сперва настроим локальную учетную запись (прим. admin), на случай выхода из строя RADIUS-сервера, выполняем команды:

cisco>enable
cisco#config terminal

cisco(config)#username admin priv 15 secret Aa1234567

Выполняем последовательность действий по добавлению RADIUS-сервера:

  • Включаем режим AAA
  • Добавляем RADIUS-сервер
  • Настраиваем профиль аутентификации (сперва RADIUS-сервер, если он не доступен, то тогда локальные учетные записи)
  • Настраиваем профиль авторизации (сперва RADIUS-сервер, если он не доступен, то тогда локальные учетные записи)
  • Включаем аутентификацию на интерфейсах
Пример настройки на Cisco 2911/K9 15.0(1r)M12
cisco(config)#aaa new-model

cisco(config)#radius server NPS
cisco(config-radius-server)#address ipv4 10.10.10.1 auth-port 1645 acct-port 1646
cisco(config-radius-server)#key CISCO
cisco(config-radius-server)#exit

cisco(config)#aaa group server radius NPS
cisco(config-sg-radius)#server name NPS
cisco(config-sg-radius)#exit

cisco(config)#aaa authentication login NPS group NPS local
cisco(config)#aaa authorization exec NPS group NPS local
cisco(config)#aaa authorization console

cisco(config)#line console 0
cisco(config-line)#authorization exec NPS
cisco(config-line)#login authentication NPS

cisco(config)#line vty 0 4
cisco(config-line)#session-timeout 30
cisco(config-line)#authorization exec NPS
cisco(config-line)#login authentication NPS
cisco(config-line)#transport input ssh

cisco(config)#line vty 5 15
cisco(config-line)#session-timeout 30
cisco(config-line)#authorization exec NPS
cisco(config-line)#login authentication NPS
cisco(config-line)#transport input none
Пример настройки на Cisco WS-C3750V2-48TS 12.2(55)SE5
cisco(config)#aaa new-model

cisco(config)#radius-server host 192.168.0.1 key Aa1234567

cisco(config)#aaa authentication login NPS group radius local
cisco(config)#aaa authorization exec NPS group radius local
cisco(config)#aaa authorization console

cisco(config)#line console 0 
cisco(config-line)#authorization exec NPS 
cisco(config-line)#login authentication NPS
 
cisco(config)#line vty 0 4
cisco(config-line)#session-timeout 30 
cisco(config-line)#authorization exec NPS 
cisco(config-line)#login authentication NPS
cisco(config-line)#transport input ssh 

cisco(config)#line vty 5 15
cisco(config-line)#session-timeout 30 
cisco(config-line)#authorization exec NPS 
cisco(config-line)#login authentication NPS
cisco(config-line)#transport input none

Это минимальная настройка аутентификации/авторизации на маршрутизаторах/коммутаторов Cisco.

Понравилась или оказалась полезной статья, поблагодари автора

 

ПОНРАВИЛАСЬ ИЛИ ОКАЗАЛАСЬ ПОЛЕЗНОЙ СТАТЬЯ, ПОБЛАГОДАРИ АВТОРА

Загрузка…

Table of Contents

1

Configuring a RADIUS (Remote Authentication Dial-In User Service) server on Windows Server 2012 is an important task that network administrators need to do. This service is commonly used for network security, where it is responsible for authenticating and authorizing users who want to access network resources.

A RADIUS server is typically used in environments where there is a large number of users who require network access. By implementing a RADIUS server, network administrators can allow or deny access to specific resources based on certain criteria, such as user identity, time of day, and location.

In this blog post, we will explore the steps required to configure a RADIUS server on Windows Server 2012, the tools and software that we need, and the different methods we can use to achieve this goal.

Video Tutorial:

What’s Needed

Before we begin, we need to make sure we have the following tools and software installed on our Windows Server 2012 machine:

  • Windows Server 2012
  • Active Directory Domain Services
  • Network Policy and Access Services Role
  • Remote Authentication Dial-In User Service (RADIUS) Server Role

What Requires Your Focus?

To configure RADIUS server on Windows Server 2012, the following steps require your focus:

  • Installing Remote Authentication Dial-In User Service (RADIUS) Server Role
  • Configure Network Policy and Access Services Role
  • Configure the RADIUS server

Different Methods to Configure Radius Server on Windows Server 2012

Method 1: Via Server Manager

To configure RADIUS server on Windows Server 2012 via Server Manager, follow the steps below:

  1. Log in to the Windows Server 2012 machine with administrative rights.
  2. Launch Server Manager from the taskbar or Start Menu.
  3. Click on Add Roles and Features in the main dashboard.
  4. Click Next to skip the Before You Begin page.
  5. Select Role-based or feature-based installation and click Next.
  6. Select the target server on which you want to install the RADIUS server and click Next.
  7. Select the Network Policy and Access Services role and click Next.
  8. Select the Remote Authentication Dial-In User Service (RADIUS) Server role and click Next.
  9. Click Install to start the installation process.

Pros:

  • Easier to use than other methods
  • Requires less technical knowledge

Cons:

  • Does not provide a granular level of control
  • May not be suitable for large, complex environments

Method 2: Via PowerShell

To configure RADIUS server on Windows Server 2012 via PowerShell, follow the steps below:

  1. Log in to the Windows Server 2012 machine with administrative rights.
  2. Launch PowerShell as an Administrator.
  3. Type the following command and press Enter:

    Install-WindowsFeature NPAS

  4. Type the following command and press Enter:

    Add-WindowsFeature RemoteAccess

  5. Type the following command and press Enter:

    Add-Role -Name NetworkPolicyAndAccessServices -IncludeManagementTools

  6. Type the following command and press Enter:

    Add-WindowsFeature NPAS-RADIUS

  7. Type the following command and press Enter:

    Install-RemoteAccess

Pros:

  • Gives greater control and flexibility than other methods
  • Allows for detailed configuration options

Cons:

  • Requires a higher level of technical knowledge
  • Potentially more time-consuming

Method 3: Via Remote Server Administration Tools

To configure RADIUS server on Windows Server 2012 via Remote Server Administration Tools, follow the steps below:

  1. Download and install Remote Server Administration Tools on your local machine.
  2. Log in to the Windows Server 2012 machine with administrative rights.
  3. Launch the Remote Server Administration Tools you installed.
  4. Click on Tools and select Remote Access Management.
  5. Click on DirectAccess and VPN.
  6. Click on Run the Getting Started Wizard.
  7. Follow the wizard to configure the RADIUS server.

Pros:

  • Allows for remote configuration of RADIUS server
  • Can be more convenient than other methods

Cons:

  • Requires additional software installation on the client machine
  • May require additional setup for remote access to the server

1. I can’t install the Remote Authentication Dial-In User Service (RADIUS) Server role.

A: This issue may be caused by a conflict with other installed software or a problem with the installation files. Try uninstalling other conflicting software and reinstalling the RADIUS server role.

2. I can’t authenticate users with the RADIUS server.

A: This issue may be caused by incorrect server configurations or issues with the user’s network connection. Check the server settings and network connectivity of the user’s device to troubleshoot the issue.

3. I can’t access the RADIUS server remotely.

A: This issue may be caused by a firewall setting or network configuration issue. Check the firewall settings and network connectivity to ensure that the server is accessible from your device.

Implications and Recommendations

Configuring a RADIUS server on Windows Server 2012 is an important step that network administrators need to take to ensure the security of their network resources. By implementing a RADIUS server, administrators can limit user access based on certain criteria, such as user identity, location, and time of day.

One recommendation for administrators is to use a combination of the methods outlined in this blog post to achieve granular control and flexibility in their RADIUS server configuration. Administrators should also ensure that they keep their RADIUS server up-to-date with the latest security patches and updates to ensure the continued security of their network.

5 FAQs about Configuring RADIUS Server on Windows Server 2012

Q1: Can I use RADIUS server for VPN authentication?

A: Yes, RADIUS server can be used for VPN authentication.

Q2: How do I check if RADIUS server is working?

A: You can check the RADIUS server logs or use a RADIUS client tool to check if the server is responding.

Q3: Can I use RADIUS server for Wi-Fi authentication?

A: Yes, RADIUS server can be used for Wi-Fi authentication.

Q4: Can I configure RADIUS server without Active Directory?

A: No, RADIUS server requires Active Directory for user authentication.

Q5: Is it possible to configure RADIUS server on Windows Server 2019?

A: Yes, RADIUS server can be configured on Windows Server 2019.

In Conclusion

Configuring RADIUS server on Windows Server 2012 is an essential task for network administrators looking to secure their network resources. By using one of the methods outlined in this blog post, administrators can implement granular control and flexibility in their RADIUS server configuration. It’s important to keep in mind the potential issues outlined in this post and to keep the server up-to-date with the latest security patches and updates to ensure network security.

При обслуживании больших сетей системные администраторы часто сталкиваются с проблемами аутентификации на сетевом оборудовании. В частности, довольно сложно организовать нормальную работу нескольких сетевых администраторов под индивидуальными учетными записями на большом количестве оборудования (приходится вести и поддерживать в актуальном состоянии базу локальных учетных записей на каждом устройстве). Логичным решение было бы использовать для авторизации уже существующей базы учетных записей — Active Directory. В этой статье мы разберемся, как настроить доменную (Active Directory) аутентификацию на активном сетевом оборудовании (коммутаторы, маршрутизаторы).

Не все сетевое оборудование популярных вендоров (CISCO, HP, Huawei) поддерживает функционал для непосредственного обращения к каталогу LDAP, и такое решение не будет универсальным. Для решения нашей задачи подойдет протокол AAA (Authentication Authorization and Accounting), фактически ставший стандартом де-факто для сетевого оборудования. Клиент AAA (сетевое устройство) отправляет данные авторизующегося пользователя на сервер RADIUS и на основе его ответа принимает решение о предоставлении / отказе доступа.

Протокол Remote Authentication Dial In User Service (RADIUS) в Windows Server 2012 R2 включен в роль NPS (Network Policy Server). В первой части статьи мы установим и настроим роль Network Policy Server, а во второй покажем типовые конфигурации сетевого устройств с поддержкой RADUIS на примере коммутаторов HP Procurve и оборудования Cisco.

Содержание:

  • Установка и настройка сервера с ролью Network Policy Server
  • Настройка сетевого оборудования для работы с сервером RADUIS

Установка и настройка сервера с ролью Network Policy Server

Как правило, сервер с ролью NPS рекомендуется устанавливать на выделенном сервере (не рекомендуется размещать эту роль на контроллере домена). В данном примере роль NPS мы будем устанавливать на сервере с Windows Server 2012 R2.

Откройте консоль Server Manager и установите роль Network Policy Server (находится в разделе Network Policy and Access Services).

Установка роли Network Policy Server на Windows Server 2012 R2 После окончания установки запустите mmc-консоль управления Network Policy Server. Нас интересуют три следующих раздела консоли:

  1. RADIUS Clients — содержит список устройств, которые могут аутентифицироваться на сервере
  2. Connection Request Policies – определяет типы устройств, которые могут аутентифицироваться
  3. Network Polices – правила аутентификации

mmc консоль управления Network Policy ServerДобавим нового клиента RADIUS (это будет коммутатор HP ProCurve Switch 5400zl), щелкнув ПКМ по разделу RADIUS Clients и выбрав New. Укажем:

  • Friendly Name:sw-HP-5400-1
  • Address (IP or DNS): 10.10.10.2
  • Shared secret (пароль/секретный ключ): пароль можно указать вручную (он должен быть достаточно сложным), либо сгенерировать с помощью специальной кнопки (сгенерированный пароль необходимо скопировать, т.к. в дальнейшем его придется указать на сетевом устройстве).

Новый клиент RADIUS - коммутатор HP ProCurve Отключим стандартную политику (Use Windows authentication for all users) в разделе Connection Request Policies, щелкнув по ней ПКМ и выбрав Disable.

Создадим новую политику с именем Network-Switches-AAA и нажимаем далее. В разделе Сondition создадим новое условие. Ищем раздел RADIUS Client Properites и выбираем Client Friendly Name.

Client Friendly Name - правило NPSВ качестве значения укажем sw-?. Т.е. условие будет применяться для всех клиентов RADIUS, начинающийся с символов :”sw-“. Жмем Next->Next-> Next, соглашаясь со всеми стандартными настройками.

Далее в разделе Network Policies создадим новую политику аутентификации. Укажите ее имя, например Network Switch Auth Policy for Network Admins. Создадим два условия: в первом условии Windows Groups, укажем доменную группу, члены которой могут аутентифицироваться (учетные записи сетевых администраторов в нашем примере включены в группу AD Network Admins) Второе условие Authentication Type, выбрав в качестве протокола аутентификации PAP.

Политика аутентификации на коммутаторе для сетевых администраторовДалее в окне Configure Authentication Methods снимаем галки со всех типов аутентификации, кроме Unencrypted authentication (PAP. SPAP).

В окне Configure Settings изменим значение атрибута Service-Type на Administrative.

Административный доступ к сетевому оборудованию с помощью RADIUSВ остальных случаях соглашаемся со стандартными настройками и завершаем работу с мастером.

И, напоследок, переместим новую политику на первое место в списке политик.

Приоритет сетевых политик NPS

Настройка сетевого оборудования для работы с сервером RADUIS

Осталось настроить наше сетевое оборудование для работы с сервером Radius. Подключимся к нашему коммутатору HP ProCurve Switch 5400 и внесем следующе изменение в его конфигурацию (измените ip адрес сервера Raduis и пароль на свои).

aaa authentication console enable radius local

aaa authentication telnet login radius local

 aaa authentication telnet enable radius local

aaa authentication ssh login radius local

aaa authentication ssh enable radius local

aaa authentication login privilege-mode

radius-server key YOUR-SECRET-KEY

radius-server host 10.10.10.44 YOUR-SECRET-KEY auth-port 1645 acct-port 1646

radius-server host 10.10.10.44 auth-port 1645

radius-server host 10.10.10.44 acct-port 1646

Совет. Если в целях безопасности вы запретили подключаться к сетевому оборудованию через telnet, эти строки нужно удалить из конфига:

aaa authentication telnet login radius local

aaa authentication telnet enable radius local

Не закрывая консольное окно коммутатора (это важно!, иначе, если что-то пойдет не так, вы более не сможете подключиться к своему коммутатору), откройте вторую telnet-сессию. Должно появиться новое окно авторизации, в котором будет предложено указать имя и пароль учетной записи. Попробуйте указать данные своей учетной записи в AD (она должна входить в группу Network Admins ). Если подключение установлено – вы все сделали правильно!

Доменна авторизация на коммутаторе HP ProCurve Для коммутатора Cisco конфигурация, предполагающая использование доменных учетных записей для аутентификации и авторизации, может выглядеть так:

Примечание. В зависимости от модели сетевого оборудования Cisco и версии IOS конфигурация может несколько отличаться.

aaa new-model
radius-server host 10.10.10.44 auth-port 1645 acct-port 1646 key YOUR-SECRET-KEY
aaa authentication login default group radius local
aaa authorization exec default group radius local
ip radius source-interface Vlan421
line con 0
line vty 0 4
line vty 5 15

Примечание. В такой конфигурации для аутентификации сначала используется сервер RADIUS, а если он не доступен – локальная учетная запись.

Для Cisco ASA конфигурация будет выглядеть так:

aaa-server RADIUS protocol radius
aaa-server RADIUS host 10.10.10.44 key YOUR-SECRET-KEY
radius-common-pw YOUR-SECRET-KEY
aaa authentication telnet console RADIUS LOCAL
aaa authentication ssh console RADIUS LOCAL
aaa authentication http console RADIUS LOCAL
aaa authentication http console RADIUS LOCAL

Совет. Если что то-не работает, проверьте:

  • Совпадают ли секретные ключи на сервере NPS и коммутаторе (для теста можно использоваться простой пароль).
  • Указан ли правильный адрес NPS сервера в конфигурации. Пингуется ли он?
  • Не блокируют ли межсетевые экраны порты 1645 и 1646 между коммутатором и сервером?
  • Внимательно изучите логи NPS сервера

Setting up a Radius Server on Windows Server 2012 involves a few steps. Firstly, we need to install the Network Policy and Access Services (NPAS) feature on the server through the Server Manager. After installation, configure the Connection Request Policies and Network Policies to allow access to the server. Then, we need to configure the Radius client, which can be done through the Remote Access Management Console. Finally, we can test the setup by attempting to connect to the network using the credentials configured on the Radius Server. It’s essential to follow the correct steps and configurations to ensure that the Radius Server works correctly. There are several guides available online for in-depth, step-by-step instructions on how to set up a Radius Server on Windows Server 2012.

Video Tutorial:How to setup a RADIUS server in Windows 2012?

Setting up RADIUS on a Windows server involves several steps. First, you need to install the Network Policy Server (NPS) role on the Windows server and configure it to act as a RADIUS server. Next, you must create a RADIUS client on your network device, such as a router or firewall, to communicate with the RADIUS server. Once the RADIUS client is configured, you can create a network policy on the RADIUS server that defines the access rights for users or groups. Finally, you need to configure the RADIUS client to use the RADIUS server for authentication and authorization.

It’s important to note that proper planning and security measures should be in place before implementing RADIUS, as it involves managing user credentials and network access. It’s also recommended to use secure authentication protocols such as MS-CHAPv2 or EAP-TLS to ensure the confidentiality and integrity of user credentials.

Does Windows have a RADIUS server?

Yes, Windows Server includes a built-in RADIUS server called Network Policy Server (NPS). NPS allows for centralized authentication and authorization for network access and is commonly used in enterprise environments. Additionally, there are third-party RADIUS servers available for Windows, such as FreeRADIUS.

How to configure application server in Windows 2012 R2?

To configure an application server in Windows 2012 R2, you need to follow the steps below:

1. Open the Server Manager and click on the Manage menu, select the Add Roles and Features Wizard.
2. On the Before you begin screen, click Next.
3. On the Select installation type screen, select Role-based or feature-based installation, then click Next.
4. On the Select destination server screen, choose a server from the pool, then click Next.
5. On the Select server roles screen, choose the Application Server role, then click Next.
6. On the Select features screen, choose the features you want to include in your application server installation, then click Next.
7. On the Confirm installation selections screen, check the installation summary, and click Install.
8. Once the installation is complete, configure the installed role and feature settings as needed.

After configuring the application server, you can install and configure your desired applications. It is recommended to review the documentation for each application to ensure that all necessary steps are taken to properly configure the application server.

How to configure Radius server in Active Directory?

Configuring a RADIUS server in Active Directory involves a few essential steps. First, the RADIUS server needs to be added as a client in Active Directory, and then a Network Policy Server (NPS) role needs to be installed on the server. After that, the RADIUS server needs to be configured with the appropriate settings to communicate with the NPS server.

To add a RADIUS client, you need to open the NPS console, right-click on «RADIUS Clients,» and then choose «New.» Enter the IP address of the RADIUS server and a shared secret password to be used between the RADIUS server and NPS server. This shared secret password must match exactly on both servers.

Next, install the NPS role on the RADIUS server by following the instructions provided by Microsoft. After the NPS role is installed, configure the server to communicate with the Active Directory domain controller by selecting «Network Policy and Access Services» in the Server Manager console, then choosing «NPS» and «NPS (Local)«.

Finally, configure the RADIUS server to use the NPS server for authentication by selecting «RADIUS Clients» in the NPS console, then right-clicking on the server, and choosing «Properties.» Under the «Authentication/Accounting» tab, select «Use Windows authentication for all users.«

Following these steps will configure the RADIUS server in Active Directory, allowing it to authenticate network users against the Active Directory database.

Does RADIUS talk to Active Directory?

Yes, RADIUS (Remote Authentication Dial-In User Service) can talk to Active Directory. RADIUS is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. Active Directory, on the other hand, is Microsoft’s directory service that provides a centralized database to manage users, computers, and other objects in a network environment. By integrating RADIUS with Active Directory, network administrators can manage user authentication and authorization for network devices and services using the same user accounts stored in Active Directory. This integration also allows for more streamlined management of user accounts, policies, and permissions across the network.

How to configure Active Directory as RADIUS server?

Configuring Active Directory as a RADIUS server involves multiple steps. First, you need to install the Network Policy and Access Services role on the Windows Server that hosts the Active Directory. Next, you need to configure the Remote Authentication Dial-In User Service (RADIUS) client to communicate with the RADIUS server. Then, you need to configure the RADIUS server to use the Active Directory as its authentication source. This involves creating a Network Policy Server (NPS) template, configuring RADIUS clients, and configuring the authentication methods used by the NPS policies. Finally, you need to test the configuration to ensure that everything is working correctly. It’s important to follow best practices and security guidelines when configuring Active Directory as a RADIUS server to ensure the integrity and security of your network.

  • Настройка сервера времени для windows
  • Настройка сервера dhcp windows server 2008 r2
  • Настройка проводного интернета на windows 7 мтс
  • Настройка сенсорной панели ноутбука windows 10 прокрутка двумя пальцами
  • Настройка сервера zabbix на windows