Windowws 2008 Network Policy Manager and Cisco Device Radius authentication
hi,
we looking migrate of our cisco devices authenticate via network policy manager radius authentication.
currently have setup npm follows:
radius client :
cisco switch friendly name, ip address , manual shared secret. advanced, vendor name cisco , saved client.
connection request policy:
overview - policy name = use windows authentication users , policy enabled, type of network access server = unspecified
conditions = day , time restrictions-24 hour permitted -
settings = blank/default
network policies
(disabled default 1 , 2)
overview - policy name = telecoms, policy enabled, grant access if connection request matches policy, network access server =unspecified
conditions = usergroup, dc01/telecoms
constraints = none
settings = radius attributes => standard = service-type = framed
cisco configuration =
aaa authentication login default group radius local
aaa authentication enable default group radius enable
aaa authorization exec default group radius local
entering username , password access rdius client configured above works. when try enter enable mode fails authenticate nps server.
i debugs router stating:
au-ho1-telecoms-3560#
aug 6 10:16:11 aest: aaa: parse name=tty2 idb type=-1 tty=-1
aug 6 10:16:11 aest: aaa: name=tty2 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=2 channel=0
aug 6 10:16:11 aest: aaa/memory: create_user (0x3672828) user='null' ruser='null' ds0=0 port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=login priv=1 initial_task_id='0', vrf= (id=0)
aug 6 10:16:11 aest: aaa/authen/start (3352917067): port='tty2' list='' action=login service=login
aug 6 10:16:11 aest: aaa/authen/start (3352917067): using "default" list
aug 6 10:16:11 aest: aaa/authen/start (3352917067): method=radius (radius)
aug 6 10:16:11 aest: aaa/authen (3352917067): status = getuser
au-ho1-telecoms-3560#
aug 6 10:16:16 aest: aaa/authen/cont (3352917067): continue_login (user='(undef)')
aug 6 10:16:16 aest: aaa/authen (3352917067): status = getuser
aug 6 10:16:16 aest: aaa/authen (3352917067): method=radius (radius)
aug 6 10:16:16 aest: aaa/authen (3352917067): status = getpass
au-ho1-telecoms-3560#
aug 6 10:16:22 aest: aaa/authen/cont (3352917067): continue_login (user='au012055')
aug 6 10:16:22 aest: aaa/authen (3352917067): status = getpass
aug 6 10:16:22 aest: aaa/authen (3352917067): method=radius (radius)
aug 6 10:16:22 aest: aaa/authen (3352917067): status = pass
au-ho1-telecoms-3560#
aug 6 10:16:24 aest: aaa/memory: dup_user (0x371e220) user='au012055' ruser='null' ds0=0 port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=enable priv=15 source='aaa dup enable'
aug 6 10:16:24 aest: aaa/authen/start (1584192312): port='tty2' list='' action=login service=enable
aug 6 10:16:24 aest: aaa/authen/start (1584192312): using "default" list
aug 6 10:16:24 aest: aaa/authen/start (1584192312): method=radius (radius)
aug 6 10:16:24 aest: aaa/authen (1584192312): status = getpass
au-ho1-telecoms-3560#
aug 6 10:16:30 aest: aaa/authen/cont (1584192312): continue_login (user='au012055')
aug 6 10:16:30 aest: aaa/authen (1584192312): status = getpass
aug 6 10:16:30 aest: aaa/authen (1584192312): method=radius (radius)
aug 6 10:16:30 aest: aaa/authen (1584192312): status = fail
aug 6 10:16:30 aest: aaa/memory: free_user (0x371e220) user='au012055' ruser='null' port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=enable priv=15
has got instructions on how works. have been searching cisco , microsoft instructions.
thanks
Windows Server > Security
Comments
Post a Comment