Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.

Slides:



Advertisements
Similar presentations
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Advertisements

1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 10: Server Administration.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Guide to MCSE , Second Edition, Enhanced 1 Objectives Understand and use the Control Panel applets Describe the versatility of the Microsoft Management.
NORTEL NETWORKS CONFIDENTIAL CallPilot 150 Modem Access Jan 03, 2005 Version 1.5.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 11: Remote Access Fundamentals
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
How to configure DNS for a Windows 2000 domain? 1.Start the Install/Remove Programs Control Panel Applet (Start - Settings - Control Panel - Add/Remove.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Chapter 3: Authentication, Authorization, and Accounting
1 Part-1 Chap 5 Configuring Accounts Definitions.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Lesson 12: Configuring Remote Management
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Administering Microsoft Windows Server 2003 Chapter 2.
RADIUS What it is Remote Authentication Dial-In User Service
1 Active Directory Administration Tasks And Tools Active Directory Administration Tasks Active Directory Administrative Tools Using Microsoft Management.
When you run a scenario, the Vusers on each host machine use the host’s IP address. You can define multiple IP addresses on a host machine to emulate a.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Module Overview Installing and Configuring a Network Policy Server
Configuring and Troubleshooting Routing and Remote Access
Dynamic Web Page A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual viewing.
Planning a Group Policy Management and Implementation Strategy
Presentation transcript:

Implementing RADIUS AAA Phil & Rick

Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation Management Console Case Study IAS Configuration Router Configuration Case Study Summary Resources

Terms and Concepts

Access Control Access control is the way you control who is allowed access to the network server and what services they are allowed to use once they have access. Authentication, Authorization, and Accounting (AAA) provide the primary framework through which you set up access control on your router or access server.

What is AAA? Authentication, Authorization and Accounting Authentication Verifies users before they are allowed access to the network and network services Authorization Enables you to limit the services available to a user Accounting Enables you to track the services that users are accessing and the amount of network resources they are consuming

Benefits of AAA AAA provides the following benefits: Increased flexibility and control of access configuration Scalability Standardized authentication methods such as RADIUS, TACACS+, and Kerberos Multiple backup systems AAA is designed to enable you to dynamically configure the type of authentication and authorization you want on a per-line (per-user) or per-service (for example, IP, IPX) basis

What is RADIUS? Remote Access Dial-in User Service (RADIUS) Client/Server Protocol Client is typically a NAS Server is usually a daemon process running on a Unix or Windows machine The client passes user information to the designated RADIUS servers, and acts on the response that is returned RADIUS servers receive user connection requests, authenticate the user, and then return the configuration information necessary for the client to deliver service to the user

Internet Authentication Service Overview

Internet Authentication Service Performs centralized AAA of users who connect to the network. Implements the IETF standard RADIUS protocol. Implementing IAS Overview Configure your server with a static IP address IP Address: /24 (case study) Default Gateway: (case study) Install IAS Create an IAS Management Console (optional) Create users and groups (case study) Edit system log to show IAS events (optional) Configure authentication and accounting ports (optional) Configure IAS log (case study) Add a RADIUS client (case study) Creating Remote Access Policies (case study)

IAS Installation

IAS Installation Installing IAS Start > Settings > Control Panel > Add/Remove Programs

IAS Installation Open the Windows Component Wizard by clicking Add/Remove Windows Components

IAS Installation Highlight Network Services in the Components box and then click details

IAS Installation Find Internet Authentication Service in the Subcomponents of Networking Services box Check the box to the left of IAS and click OK

IAS Installation Click Next Click Finish

IAS Management Console Creating and Using an IAS Management Console

IAS Management Console Microsoft management consoles centralize IAS administration Creating an IAS Management Console Start > Run > mmc

IAS Management Console In the MMC menu bar click Console > Add/Remove snap-in

IAS Management Console From the Add/Remove snap-in applet Click Add

IAS Management Console Adding a Standalone Snap-in Highlight Internet Authentication Service Standalone Snap-In Click Add

IAS Management Console Select the computer you want the snap-in to manage Select local computer Click Finish

IAS Management Console Add the following standalone snap-insAdd the following standalone snap-ins Event Viewer Local Users and Groups

IAS Management Console The the management console should look like the following

IAS Management Console Configuring the System Log to display IAS events (optional) From the IAS Management Console Expand Event Viewer Right Click the System Log File > Properties

IAS Management Console Click the filter tab in the system log properties Select IAS from the event source drop down box Click OK

IAS Management Console Creating Users and Groups in the IAS Management Console Expand Local Users and Groups Creating Groups Expand Groups Click Action > New Group Add the following groups Router_Admins Internet_Users Creating Users Expand Users Click Action > New User Add the following users Administrator member of group Router_Admins I_User member of group Internet_Users

Case Study Implementing RADIUS AAA

Case Study You work for a small business and would like to implement AAA for remote users and telnet sessions. Here are the requirements for your design: Authenticate remote users who are members of the group Router_Admins and Internet_Users. Authorize Router_Admins for EXEC sessions, PPP sessions and telnet. Authorize Internet_Users for PPP sessions only. Implement accounting for EXEC sessions, PPP sessions, and telnet sessions.

Case Study Objectives Windows 2000 Server Administration Installing Microsoft’s IAS Using the Microsoft Management Console Configuring AAA Viewing IAS accounting log Tools/Preparation 1 Windows 2000 Server 1 Cisco 1900 Catalyst 1 Cisco 2600 Router 2 modems and drivers 1 PC running Windows 2000

Topology Implementing IAS OverviewImplementing IAS Overview IAS ConfigurationIAS Configuration IAS InstallationIAS Installation Remote Access PoliciesRemote Access Policies IAS Management Console

IAS Configuration

Configuring IAS Authentication and Accounting Ports (optional) IAS uses port 1845, 1645 by default for authentication and 1846, 1646 by default for accounting. Optional step but by following this step we are only opening 2 ports on our server instead of 4 Open the IAS MC or IAS applet > Right Click Internet Authentication Service > Click Properties > Click the tab labeled RADIUS Set the Authentication port to 1645 and the Accounting port to 1646 > Click OK

IAS Configuration Configuring IAS Accounting Open the IAS MC or IAS applet > click Remote Access Logging > Right click Local File > Properties Local file properties Select the settings tab > check the following Log Authentication Requests Log Accounting Requests Log Periodic Status Select the Local File tab > check the following Database compatible file format Click OK Note that the log will be saved to C:\winnt\system32\logfiles

IAS Configuration Adding a RADIUS client overview Recall that RADIUS is a client/server protocol. The RADIUS client is typically, a NAS or router The RADIUS server is the machine running the RADIUS daemon process, which in our case is the IAS server The RADIUS server needs the following information about the RADIUS client IP Address Security Protocol being used Client-Vendor Shared-Secret (also known as a key)

IAS Configuration Adding a RADIUS client Open the IAS MC or the IAS applet Expand IAS Right click the folder labeled clients Click new client

IAS Configuration Adding a RADIUS client Enter the hostname of your router and select the RADIUS protocol Click Next

IAS Configuration Adding a RADIUS client Enter the IP Address of the RADIUS client Select Cisco as the client-vendor Enter a shared-secret (key) Finish

IAS Configuration Remote Access Policies IAS uses remote access policies to authenticate and authorize users Keep in mind that a user may be authenticated but not authorized to use certain network services (PPP, EXEC, telnet). The following is a guide if you trying to implement the case study and you are having a hard time recreating the Remote Access Policies This does not follow the class demonstration! But you’ll get the same results

IAS Configuration Remote Access Policies Open the IAS applet or IAS MC Expand IAS Click Remote Access Policies Right click and delete the policy on the right

IAS Configuration Remote Access Policies Right click remote access policies and click new remote access policy

IAS Configuration Remote Access Policies Enter a Policy friendly name In our case we’ll enter “Allow members of the group Internet_Users PPP network services” Click next Specifying conditions Click Add

IAS Configuration Remote Access Policies Highlight Windows-Groups click add In the Groups applet click add Highlight the Internet_Users group and click add then OK

IAS Configuration Remote Access Policies Add another condition by clicking add Highlight NAS-port-type click add Highlight async(modem) click add then click OK

IAS Configuration Remote Access Policies Your condition should look similar to the following screen capture

IAS Configuration Remote Access Policies Click Next Select Grant remote access permission Click Next Click Edit Profile Click the Authentication tab Only check PAP uncheck all other authentication methods Click the Advanced tab Service-type should be Framed Framed-Protocol should be PPP Click OK Ok, Now what did we just do?

IAS Configuration Remote Access Policies We created a remote access policy that said if a user accesses the RADIUS client through an async port and that user is a member of the windows group Internet_Users authorize the user to use the framed protocol PPP. Here’s a shorten version of the condition Policy Name Allow members of the group Internet_Users PPP network service. Windows-Groups Internet_Users NAS-Port-Type Async(modem) Service-Type Framed Framed Protocol PPP

IAS Configuration Remote Access Policies Create the following remote access policies (demo in class) Policy Name Allow members of the group Router_Admins PPP network service and EXEC session. Windows-Groups Router_Admins NAS-Port-Type Async(modem) Service-Type Administrative Framed Protocol PPP

IAS Configuration Remote Access Policies Policy Name Allow members of the group Router_Admins telnet access. Windows-Groups Router_Admins NAS-Port-Type Virtual(VPN) Service-Type Administrative

Router Configuration The RADIUS client

Router Configuration The router is the RADIUS client. It must have the same IP address that was entered in the IAS RADIUS client configuration.IAS RADIUS client configuration Here is the router configuration file without AAA

Router Configuration We need to know what a method list is before we get started with the router configuration Method list Defines the type of AAA to be performed and the sequence in which it will be performed Some types of AAA include authentication login, authorization exec and others An example of a sequence type is checking a server or a local database for user information

Router Configuration Here is the final configuration file that was demonstrated. Demonstration notes and some accounting database stuff

RADIUS Case Study Summary

Case Study Summary Authentication and Authorization 1.User initiates PPP authentication to the NAS. 2.NAS prompts for username and password (if PAP) or challenge (if CHAP). 3.User replies. 4.RADIUS client sends username and password to the RADIUS server. 5.RADIUS server responds with Accept, Reject, or Challenge. 6.The RADIUS client acts upon service parameters bundled with Accept or Reject.

Case Study Summary Accounting The NAS sends an Accounting-Request start packet to the RADIUS security server The RADIUS security server sends an Accounting-Response packet to acknowledge the receipt of the Accounting-Request start packet. After the NAS has sent all the accounting info it wanted to send, it sends an Accounting- Request stop packet. This stop packet describes the type of service delivered and other optional values. The RADIUS server acknowledges receipt of the Accounting-Request stop packet by sending an Accounting-Response packet.

Resources Search For: Configuring Authentication Configuring RADIUS Configuring TACACS+ Configuring Kerberos Configuring Authorization RADIUS Attributes Configuring Accounting Search For: Dialup Corporate Access Extranet Access for Business Partners Outsourced corporate access through service providers Configuring IAS for dial-up and VPN access Configuring IAS to outsource dial-up access