<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows Server 2008 R2 RADIUS Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743844#M213724</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This is all over the Cisco forums and no real clear answers. I am also having this conundrum. The only way I was able to get this to work is having 2 separate NPS servers, not ideal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Sep 2012 17:18:07 GMT</pubDate>
    <dc:creator>IT Services</dc:creator>
    <dc:date>2012-09-04T17:18:07Z</dc:date>
    <item>
      <title>Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743843#M213723</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have implemented RADIUS so that users in a windows group are able to login to a Cisco device using their windows login. The issue I have is that users in this group are also able to authenticate through radius for the remote access vpn (on a ASA5510). I have setup a seperate windows group for VPN users. When I created a policy for the VPN, the VPN users were also able to authenticate and login to the cisco network devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My aim is to have two seperate groups - one for administrating the cisco devices and one for VPN access only. This is so that a regular user is not able to login to a cisco device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The setup - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Windows Server 2008 R2 Enterprise x64&lt;/P&gt;&lt;P&gt;NPS Policy - service-type - login (have also used administrative), vendor-specific - Cisco-AV-pair - shell:priv-lvl=15 (have used RADIUS also), encryption setting - basic, strong and strongest, authentication method - PAP + SPAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication works fine (VPN + Login) and has worked with the various other settings (above) I have tried.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone has been able to lock the RADIUS down so that it only does what it says on the tin, I would greatly appreciate your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ash&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743843#M213723</guid>
      <dc:creator>Ashley Sahonta</dc:creator>
      <dc:date>2019-03-11T01:32:11Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743844#M213724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This is all over the Cisco forums and no real clear answers. I am also having this conundrum. The only way I was able to get this to work is having 2 separate NPS servers, not ideal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2012 17:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743844#M213724</guid>
      <dc:creator>IT Services</dc:creator>
      <dc:date>2012-09-04T17:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743845#M213725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM style="color: #0000ff; font-family: verdana,geneva; "&gt;Hi ,&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #0000ff; font-family: verdana,geneva; "&gt;You need to add the Windows_Group condition in the network policies of NPS. See attachment&lt;IMG __jive_id="102222" __jive_id="102222" alt="NPS_Windows Group.JPG" class="jive-image-thumbnail jive-image" src="https://community.cisco.com/NPS_Windows+Group.JPG" width="450" /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #3366ff; font-family: verdana,geneva; "&gt;No need to have two NPS.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #0000ff; font-family: verdana,geneva; "&gt;Regards,&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #0000ff; font-family: verdana,geneva; "&gt;~JG&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #0000ff; font-family: verdana,geneva; "&gt;Do rate helpful posts&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2012 18:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743845#M213725</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2012-09-04T18:30:35Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743846#M213726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; That does not resolve the issue. You cannot have a policy that points to 2 different AD Groups because the Device managment authentication and VPN authencation use the same NPS server, which would then give the VPN authenticated users access to the device managment. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2012 20:22:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743846#M213726</guid>
      <dc:creator>IT Services</dc:creator>
      <dc:date>2012-09-04T20:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743847#M213727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;You need to setup TWO policies with the Condition of Windows group. NPS will check all the policies and access will be granted as per the policy it matched. If none matched, access would be denied. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;Eg,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;If requested comes from&amp;nbsp; &amp;gt; Admin Device (Router &amp;amp; Switches) and user does NOT belong to Admin AD group -----&amp;gt; Deny Access&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;If requested comes from &amp;gt; VPN server and User have successfully authenticated -----&amp;gt; Permit Access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;With this, only Specific AD group will be able to login to Admin Devices and all AD user's would get VPN access. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;Hope that helps, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt; -JG &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;Do rate helpful posts&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: verdana,geneva; color: #3366ff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2012 23:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743847#M213727</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2012-09-04T23:18:54Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743848#M213729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I have tried this and still does not have the desired results. The Policy setup with the VPN users group allows them to authenticate and manage the Cisco ASA. Please test your configuration and let me know your results. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 12:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743848#M213729</guid>
      <dc:creator>IT Services</dc:creator>
      <dc:date>2012-09-05T12:30:37Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743849#M213732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IT serverices. I am not at home but as soon as i get there ill post the answer. I spent about 3 hours trying to get it work. FINALLY. &lt;/P&gt;&lt;P&gt;Off the top of my head you have to set up a value in condistions. Like Login and a service-type. and results on VPN will be service-type-outbound. that is the best i can remember off the top off my head.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 15:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743849#M213732</guid>
      <dc:creator>Rodney Mothersbaugh</dc:creator>
      <dc:date>2012-09-05T15:31:48Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743850#M213733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Great. Thanks for the response Rodney, I look forward to seeing the configuration. I beleive I tried the Service-Type configuration but didn't get it to work. I wonder if I have the wrong combination.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 15:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743850#M213733</guid>
      <dc:creator>IT Services</dc:creator>
      <dc:date>2012-09-05T15:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743851#M213734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Part 1 of 2&lt;/P&gt;&lt;P&gt;This is the first device policy and it is for the management of the network devices. I am leaving work now and will provide part 2 of 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NPS -&amp;gt; Policies -&amp;gt; network Policies&lt;/P&gt;&lt;P&gt;Policy Name  		Devices&lt;/P&gt;&lt;P&gt;	Overview&lt;/P&gt;&lt;P&gt;		policy enabled = True&lt;/P&gt;&lt;P&gt;		Grant access -&lt;/P&gt;&lt;HR originaltext="---" /&gt;&lt;P&gt;blah blah blah&lt;/P&gt;&lt;P&gt;		Ignore dialin stuff &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;	Conditions&lt;/P&gt;&lt;P&gt;		User Groups = NetworkAdmins&lt;/P&gt;&lt;P&gt;	Constraints&lt;/P&gt;&lt;P&gt;		Unencrypted auth (PAP,SPAP)&lt;/P&gt;&lt;P&gt;	Settings&lt;/P&gt;&lt;P&gt;		Standard&lt;/P&gt;&lt;P&gt;			class			shell=Priv-15&lt;/P&gt;&lt;P&gt;			Service-Type		Login&lt;/P&gt;&lt;P&gt;		 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 19:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743851#M213734</guid>
      <dc:creator>Rodney Mothersbaugh</dc:creator>
      <dc:date>2012-09-05T19:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743852#M213735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I have followed exactly this configuration but the VPN users still have access to administrative functions on the ASA. This does not happen on a cisco switch though.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 20:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743852#M213735</guid>
      <dc:creator>IT Services</dc:creator>
      <dc:date>2012-09-05T20:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743853#M213736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;wont be as pretty &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;under conditions i used two things. &lt;/P&gt;&lt;P&gt;usergroup  and Called station id&lt;/P&gt;&lt;P&gt;usergroup was my vpn group&lt;/P&gt;&lt;P&gt;for called station id use the external ip address (i have only tested this with using my ipad so i use ip address this may need to be the hostname)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;last page using service type select outbound  this stops them from accessing the devices for managment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***************&lt;STRONG&gt;CHANGE&lt;/STRONG&gt;FROM****************&lt;/P&gt;&lt;P&gt;i put devices first in my list and vpn auth second&lt;/P&gt;&lt;P&gt;***************&lt;STRONG&gt;CHANGE&lt;/STRONG&gt;TO****************&lt;/P&gt;&lt;P&gt;I changed the list to put VPN auth on top this way i can push them to a VPN profile. With it the other way around the it was hitting the device policy first fro users that are in both VPN_USERS and NetworkAdmins&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 20:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743853#M213736</guid>
      <dc:creator>Rodney Mothersbaugh</dc:creator>
      <dc:date>2012-09-05T20:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743854#M213737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you are still having issues we can set up a webex and you can look at my configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 21:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743854#M213737</guid>
      <dc:creator>Rodney Mothersbaugh</dc:creator>
      <dc:date>2012-09-05T21:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743855#M213738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok last post for the night. IT Services I have loads of screen shots. I will post the link to the setup stuff tomorrow or friday. But if you are having issues from now until then please dont hesitate to ask. Ill be more then happy to let yo take a look around and even test it yourself. I have two accounts one with device admin rights and one without and you can VPN in and test for yourself if you are still having issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2012 04:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743855#M213738</guid>
      <dc:creator>Rodney Mothersbaugh</dc:creator>
      <dc:date>2012-09-06T04:29:55Z</dc:date>
    </item>
    <item>
      <title>Windows Server 2008 R2 RADIUS Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743856#M213739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help your last suggestion did the trick. Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2012 13:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-server-2008-r2-radius-authentication/m-p/1743856#M213739</guid>
      <dc:creator>IT Services</dc:creator>
      <dc:date>2012-09-06T13:08:40Z</dc:date>
    </item>
  </channel>
</rss>

