05-24-2011 01:35 AM - edited 03-10-2019 06:06 PM
Hi all,
I would like to authenticate users connecting to VPN (Remote-Access) by RADIUS and EAP-TLS (certificates). Is it possible?
I tried to do it and created lab in GNS and configured FreeRADIUS to use EAP-TLS but it doesn't work...
My router config:
!
hostname R1
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
!
aaa new-model
!
!
aaa authentication login default local
aaa authentication ppp default group radius
aaa authorization network default group radius
!
!
aaa session-id common
ip source-route
ip cef
!
!
!
no ipv6 cef
!
multilink bundle-name authenticated
vpdn enable
!
vpdn-group vpn
! Default L2TP VPDN group
accept-dialin
protocol l2tp
virtual-template 1
no l2tp tunnel authentication
!
!
!
archive
log config
hidekeys
!
!
crypto isakmp policy 10
encr aes 256
hash sha
authentication rsa-sig
group 5
!
!
crypto ipsec transform-set vpn esp-3des esp-sha-hmac
mode transport
!
crypto dynamic-map vpn 10
set nat demux
set transform-set vpn
!
!
crypto map vpn 10 ipsec-isakmp dynamic vpn
!
!
!
interface Loopback0
no ip address
!
interface FastEthernet0/0
no ip address
shutdown
duplex half
!
interface FastEthernet1/0
ip address 192.168.12.1 255.255.255.0
duplex auto
speed auto
crypto map vpn
!
interface FastEthernet1/1
ip address 192.168.2.1 255.255.255.0
duplex auto
speed auto
!
interface Virtual-Template1
ip unnumbered Loopback0
peer default ip address pool vpn-pool
ppp mtu adaptive
ppp authentication eap
!
!
ip local pool vpn-pool 10.1.1.10
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.12.2
no ip http server
no ip http secure-server
!
!
!
radius-server host 192.168.2.100 auth-port 1812 acct-port 1813 retransmit 1 key testing123
!
control-plane
!
!
mgcp fax t38 ecm
mgcp behavior g729-variants static-pt
!
!
gatekeeper
shutdown
!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
!
end
I tried to connect using VPN CLient and in debug was:
*May 20 12:30:35.739: ISAKMP:(0):Encryption algorithm offered does not match policy!
*May 20 12:30:35.739: ISAKMP:(0):atts are not acceptable. Next payload is 0
*May 20 12:30:35.743: ISAKMP:(0):no offers accepted!
*May 20 12:30:35.743: ISAKMP:(0): phase 1 SA policy not acceptable! (local 192.168.12.1 remote 192.168.56.1)
*May 20 12:30:35.743: ISKAMP: growing send buffer from 1024 to 3072
*May 20 12:30:35.747: ISAKMP (0): incrementing error counter on sa, attempt 1 of 5: construct_fail_ag_init
*May 20 12:30:35.747: ISAKMP:(0): Failed to construct AG informational message.
*May 20 12:30:35.747: ISAKMP:(0): sending packet to 192.168.56.1 my_port 500 peer_port 1043 (R) MM_NO_STATE
*May 20 12:30:35.747: ISAKMP:(0):Sending an IKE IPv4 Packet.
*May 20 12:30:35.747: ISAKMP:(0):peer does not do paranoid keepalives.
*May 20 12:30:35.747: ISAKMP:(0):deleting SA reason "Phase1 SA policy proposal not accepted" state (R) MM_NO_STATE (peer 192.168.56.1)
*May 20 12:30:35.747: ISAKMP (0): FSM action returned error: 2
*May 20 12:30:35.747: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*May 20 12:30:35.747: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_R_MM1
*May 20 12:30:35.751: ISAKMP:(0):deleting SA reason "Phase1 SA policy proposal not accepted" state (R) MM_NO_STATE (peer 192.168.56.1)
*May 20 12:30:35.751: ISAKMP: Unlocking peer struct 0x670060AC for isadb_mark_sa_deleted(), count 0
*May 20 12:30:35.751: ISAKMP: Deleting peer node by peer_reap for 192.168.56.1: 670060AC
*May 20 12:30:35.759: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
*May 20 12:30:35.759: ISAKMP:(0):Old State = IKE_R_MM1 New State = IKE_DEST_SA
*May 20 12:30:35.763: ISAKMP:(0):deleting SA reason "No reason" state (R) MM_NO_STATE (peer 192.168.56.1)
*May 20 12:30:35.763: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_ERROR
*May 20 12:30:35.763: ISAKMP:(0):Old State = IKE_DEST_SA New State = IKE_DEST_SA
05-24-2011 08:59 AM
hi,
VPN client uses IPsec as a protocol. L2TP is used when you want to terminate a VPN connection on a MIcrosoft server.
You can authenticate the IPSec RA VPN i.e. VPN client via Digital certificates or username and password from Radius.
The following link explains the Certificate configuration with IPsec RA VPN.
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080930f21.shtml
EAP-TLS protocol is a protocol used to authenticate the wireless clients.
Hope this helps.
Regards,
Anisha
P.S.: please mark this thread as answered if you feel your query is resolved. Do rate helpful posts.
05-25-2011 02:43 AM
hi,
I know how do this using certificates without EAP-TLS, but I want to try do this with EAP-TLS via RADIUS because I heard that it is possible...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide