Windowws 2008 Network Policy Manager and Cisco Device Radius authentication


hi,

we looking migrate of our cisco devices authenticate via network policy manager radius authentication.

currently have setup npm follows:

radius client :

cisco switch friendly name, ip address , manual shared secret. advanced, vendor name cisco , saved client.

connection request policy:

overview - policy name = use windows authentication users , policy enabled, type of network access server  = unspecified

conditions = day , time restrictions-24 hour permitted -

settings = blank/default

network policies

(disabled default 1 , 2)

overview  - policy name = telecoms, policy enabled, grant access if connection request matches policy, network access server =unspecified

conditions =  usergroup, dc01/telecoms

constraints = none

settings = radius attributes => standard = service-type = framed

cisco configuration =

aaa authentication login default group radius local
aaa authentication enable default group radius enable
aaa authorization exec default group radius local

entering username , password access rdius client configured above works.  when try enter enable mode fails authenticate nps server.

i debugs router stating:

au-ho1-telecoms-3560#
aug  6 10:16:11 aest: aaa: parse name=tty2 idb type=-1 tty=-1
aug  6 10:16:11 aest: aaa: name=tty2 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=2 channel=0
aug  6 10:16:11 aest: aaa/memory: create_user (0x3672828) user='null' ruser='null' ds0=0 port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=login priv=1 initial_task_id='0', vrf= (id=0)
aug  6 10:16:11 aest: aaa/authen/start (3352917067): port='tty2' list='' action=login service=login
aug  6 10:16:11 aest: aaa/authen/start (3352917067): using "default" list
aug  6 10:16:11 aest: aaa/authen/start (3352917067): method=radius (radius)
aug  6 10:16:11 aest: aaa/authen (3352917067): status = getuser
au-ho1-telecoms-3560#
aug  6 10:16:16 aest: aaa/authen/cont (3352917067): continue_login (user='(undef)')
aug  6 10:16:16 aest: aaa/authen (3352917067): status = getuser
aug  6 10:16:16 aest: aaa/authen (3352917067): method=radius (radius)
aug  6 10:16:16 aest: aaa/authen (3352917067): status = getpass
au-ho1-telecoms-3560#
aug  6 10:16:22 aest: aaa/authen/cont (3352917067): continue_login (user='au012055')
aug  6 10:16:22 aest: aaa/authen (3352917067): status = getpass
aug  6 10:16:22 aest: aaa/authen (3352917067): method=radius (radius)
aug  6 10:16:22 aest: aaa/authen (3352917067): status = pass
au-ho1-telecoms-3560#
aug  6 10:16:24 aest: aaa/memory: dup_user (0x371e220) user='au012055' ruser='null' ds0=0 port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=enable priv=15 source='aaa dup enable'
aug  6 10:16:24 aest: aaa/authen/start (1584192312): port='tty2' list='' action=login service=enable
aug  6 10:16:24 aest: aaa/authen/start (1584192312): using "default" list
aug  6 10:16:24 aest: aaa/authen/start (1584192312): method=radius (radius)
aug  6 10:16:24 aest: aaa/authen (1584192312): status = getpass
au-ho1-telecoms-3560#
aug  6 10:16:30 aest: aaa/authen/cont (1584192312): continue_login (user='au012055')
aug  6 10:16:30 aest: aaa/authen (1584192312): status = getpass
aug  6 10:16:30 aest: aaa/authen (1584192312): method=radius (radius)
aug  6 10:16:30 aest: aaa/authen (1584192312): status = fail
aug  6 10:16:30 aest: aaa/memory: free_user (0x371e220) user='au012055' ruser='null' port='tty2' rem_addr='13.199.190.209' authen_type=ascii service=enable priv=15

has got instructions on how works. have been searching cisco , microsoft instructions.

 

thanks

 

 

 

 



Windows Server  >  Security



Comments

Popular posts from this blog

Azure MFA with Azure AD and RDS

WIMMount (HSM) causing cluster storage to go redirected (2012r2 DC)

Failed to delete the test record dcdiag-test-record in zone test.com