01-05-2012 12:17 PM - edited 03-10-2019 06:41 PM
Hi Guys,
i am struggling with configuring NPS AA for our 3750 array ... authentication and autorization
i tried almost every config i could find online but the most i got out of it is a simple authentication. What i need is quite simple:
we have several AD groups
1- Admin
2- Readonly with few privileges for ping, show, traceroute and telnet
i need my switches to be able to recognize the groups and assign them the correct priv. But it doesnt seem to be happening. Can anyone post a clean config for the switch and for NPS ?
Thanks
P.S. i created and deleted most of my configs so if anyone has something clean and details i would greatly apreciate it.
Solved! Go to Solution.
01-05-2012 01:02 PM
Hello,
This is the configuration I have on my IOS switch:
aaa authentication login default group radius local
aaa authentication enable default group radius enable
aaa authorization exec default group radius if-authenticated
radius-server host x.x.250.20 auth-port 1645 acct-port 1646 key xxxxxxx
I created two policies on the IAS (yours would be NPS). Both have Windows Groups as condition one referring to group ReadOnly and the other to group FullAccess.
ReadOnly results return Service-Type NAS-Prompt
FullAccess results return Service-Type Administrative
When accessing with a ReadOnly user I get:
User Access Verification
Username: priv1
Password:
Switch>en
Password:
% Error in authentication.
Switch>
So, the user is restricted to unpriviledged mode (>) commands.
When accessing with a FullAccess user:
User Access Verification
Username: priv15
Password:
Switch#
I get directly assigned to Enable Mode (#) due to the Administrative Value of the Service-Type Attribute.
As per the Role Based there is a document on the Forum that refers to TACACS+ as well
https://supportforums.cisco.com/docs/DOC-15765
Regards.
01-05-2012 02:12 PM
Leon,
When using RADIUS for Device Management we cannot specify the Challenge-Handshake protocol. However, RADIUS will encrypt the User password during the transaction.
NOTE: TACACS+ will encrypt the whole packet.
Regards.
01-05-2012 12:36 PM
Leon,
Cisco IOS Command Authorization is not supported when authenticating with RADIUS. This is a protocol limitation.
RADIUS is meant for Network Access (Wireless, VPN) as it has a huge scope of Network Access attributes.
TACACS+ on the other hand is meant for Device Administration (SSH, Telnet). TACACS+ can assign Command Set, EXEC Privileges, Management Session timeouts and others.
TACACS+ can split Authentication and Authorization on different packets, whereas RADIUS send both Authentication/Authorization on the same packet.
Radius has no capability to send a separate authorization request for every executed command like TACACS+ does.
You can use a MS RADIUS server to return the EXEC privilege for users with the "Service-Type" attribute. You can set it to "Administrative" for full access and "NAS-Prompt" for only unprivileged mode.
However, in order to define specific commands to be allowed on a "Per-Group Basis" a TACACS+ server is needed. Cisco IOS "aaa authorization commands" include Group RADIUS as an argument, however it will not work.
Regards.
01-05-2012 12:45 PM
so unless i use TACACs i cant even set NPS to provide access per privilege?
as in
Ad group Admins - priv 15
AD group Readonly - priv1
?
is there a way to create a role based authentication like on Nexus ? using rules for each role ?
01-05-2012 01:02 PM
Hello,
This is the configuration I have on my IOS switch:
aaa authentication login default group radius local
aaa authentication enable default group radius enable
aaa authorization exec default group radius if-authenticated
radius-server host x.x.250.20 auth-port 1645 acct-port 1646 key xxxxxxx
I created two policies on the IAS (yours would be NPS). Both have Windows Groups as condition one referring to group ReadOnly and the other to group FullAccess.
ReadOnly results return Service-Type NAS-Prompt
FullAccess results return Service-Type Administrative
When accessing with a ReadOnly user I get:
User Access Verification
Username: priv1
Password:
Switch>en
Password:
% Error in authentication.
Switch>
So, the user is restricted to unpriviledged mode (>) commands.
When accessing with a FullAccess user:
User Access Verification
Username: priv15
Password:
Switch#
I get directly assigned to Enable Mode (#) due to the Administrative Value of the Service-Type Attribute.
As per the Role Based there is a document on the Forum that refers to TACACS+ as well
https://supportforums.cisco.com/docs/DOC-15765
Regards.
01-05-2012 01:53 PM
yup, works
thanks for your time.
01-05-2012 01:42 PM
Thanks,
I will try it on my switch and update you on the progress
Thanks alot.
01-05-2012 02:09 PM
one more question if i may ...
can i set mschap v2 on authentication ? or is it clear text only?
01-05-2012 02:12 PM
Leon,
When using RADIUS for Device Management we cannot specify the Challenge-Handshake protocol. However, RADIUS will encrypt the User password during the transaction.
NOTE: TACACS+ will encrypt the whole packet.
Regards.
01-05-2012 02:14 PM
Thanks again, thats about covers what i needed to know
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide