Windowws 2008 Network Policy Manager and Cisco Device Radius authentication


hi,

we looking migrate of our cisco devices authenticate via network policy manager radius authentication.

currently have setup npm follows:

radius client :

cisco switch friendly name, ip address , manual shared secret. advanced, vendor name cisco , saved client.

connection request policy:

overview - policy name = use windows authentication users , policy enabled, type of network access server  = unspecified

conditions = day , time restrictions-24 hour permitted -

settings = blank/default

network policies

(disabled default 1 , 2)

overview  - policy name = telecoms, policy enabled, grant access if connection request matches policy, network access server =unspecified

conditions =  usergroup, dc01/telecoms

constraints = none

settings = radius attributes => standard = service-type = framed

cisco configuration =

aaa authentication login default group radius local
aaa authentication enable default group radius enable
aaa authorization exec default group radius local

entering username , password access rdius client configured above works.  when try enter enable mode fails authenticate nps server.

i debugs router stating:

au-ho1-telecoms-3560#
aug  6 10:16:11 aest: aaa: parse name=tty2 idb type=-1 tty=-1
aug  6 10:16:11 aest: aaa: name=tty2 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=2 channel=0
aug  6 10:16:11 aest: aaa/memory: create_user (0x3672828) user='null' ruser='null' ds0=0 port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=login priv=1 initial_task_id='0', vrf= (id=0)
aug  6 10:16:11 aest: aaa/authen/start (3352917067): port='tty2' list='' action=login service=login
aug  6 10:16:11 aest: aaa/authen/start (3352917067): using "default" list
aug  6 10:16:11 aest: aaa/authen/start (3352917067): method=radius (radius)
aug  6 10:16:11 aest: aaa/authen (3352917067): status = getuser
au-ho1-telecoms-3560#
aug  6 10:16:16 aest: aaa/authen/cont (3352917067): continue_login (user='(undef)')
aug  6 10:16:16 aest: aaa/authen (3352917067): status = getuser
aug  6 10:16:16 aest: aaa/authen (3352917067): method=radius (radius)
aug  6 10:16:16 aest: aaa/authen (3352917067): status = getpass
au-ho1-telecoms-3560#
aug  6 10:16:22 aest: aaa/authen/cont (3352917067): continue_login (user='au012055')
aug  6 10:16:22 aest: aaa/authen (3352917067): status = getpass
aug  6 10:16:22 aest: aaa/authen (3352917067): method=radius (radius)
aug  6 10:16:22 aest: aaa/authen (3352917067): status = pass
au-ho1-telecoms-3560#
aug  6 10:16:24 aest: aaa/memory: dup_user (0x371e220) user='au012055' ruser='null' ds0=0 port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=enable priv=15 source='aaa dup enable'
aug  6 10:16:24 aest: aaa/authen/start (1584192312): port='tty2' list='' action=login service=enable
aug  6 10:16:24 aest: aaa/authen/start (1584192312): using "default" list
aug  6 10:16:24 aest: aaa/authen/start (1584192312): method=radius (radius)
aug  6 10:16:24 aest: aaa/authen (1584192312): status = getpass
au-ho1-telecoms-3560#
aug  6 10:16:30 aest: aaa/authen/cont (1584192312): continue_login (user='au012055')
aug  6 10:16:30 aest: aaa/authen (1584192312): status = getpass
aug  6 10:16:30 aest: aaa/authen (1584192312): method=radius (radius)
aug  6 10:16:30 aest: aaa/authen (1584192312): status = fail
aug  6 10:16:30 aest: aaa/memory: free_user (0x371e220) user='au012055' ruser='null' port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=enable priv=15

has got instructions on how works. have been searching cisco , microsoft instructions.

 

thanks

 

 

 

 



Windows Server  >  Security



Comments

Popular posts from this blog

WIMMount (HSM) causing cluster storage to go redirected (2012r2 DC)

Failed to delete the test record dcdiag-test-record in zone test.com

Azure MFA with Azure AD and RDS