03-27-2025 06:17 AM
We have a MS NPS server for Radius to handle aaa with users in AD.
It works fine when we use no encryption.
It does not seem to work when we enable MSCHAP on the MS Server.
Is this even possible?
Solved! Go to Solution.
04-15-2025 02:18 AM
Hello @DavidvanWijck05094
MSChap-V2 is used for user authentication like dial-in and vpn and not for switch management...
For managing your switches, the recommended approach is to use RADIUS with PAP or CHAP authentication methods. These methods are compatible with Cisco IOS for console, SSH, or Telnet access.
But also, consider using TACACS+ instead of RADIUS. Unlike RADIUS, which encrypts only the password, TACACS+ encrypts the entire authentication process, including both username and password, providing a more secure authentication mechanism.
So, TACACS+ for device administration and RADIUS for secure network access:
source: CCNP ENCOR 350-401_Chapter 26: Network Device Access Control and Infrastructure Security
03-27-2025 06:29 AM
Hello @DavidvanWijck05094
Do you check PEAP-MSCHAPv2 ?
03-27-2025 06:35 AM
No only mschap en mschapv2
03-27-2025 07:49 AM - edited 03-27-2025 07:50 AM
MS-CHAPv2 without PEAP is not secure.
MS-CHAP and MS-CHAPv2 require access to plaintext or reversibly encrypted passwords in active directory. Since AD doesn't store user passwords in plaintext by defaut, authentication will fail unless you enable "Store Password Using Reversible Encryption".
04-15-2025 02:09 AM
Does this work on a Cisco 9500/9300/9200 with aaa for management with mschap via NPS Radius?
04-15-2025 02:18 AM
Hello @DavidvanWijck05094
MSChap-V2 is used for user authentication like dial-in and vpn and not for switch management...
For managing your switches, the recommended approach is to use RADIUS with PAP or CHAP authentication methods. These methods are compatible with Cisco IOS for console, SSH, or Telnet access.
But also, consider using TACACS+ instead of RADIUS. Unlike RADIUS, which encrypts only the password, TACACS+ encrypts the entire authentication process, including both username and password, providing a more secure authentication mechanism.
So, TACACS+ for device administration and RADIUS for secure network access:
source: CCNP ENCOR 350-401_Chapter 26: Network Device Access Control and Infrastructure Security
04-02-2025 12:04 AM - edited 04-15-2025 02:10 AM
.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide