General

RADIUS on Windos Server 2019

RADIUS on Windows Server 2019

If you need to connect your network devices in your IT system, RADIUS (Remote Authentication Dial-In User Service) will help you to get AAA capabilities — Authentication, Authorization, and Accounting. I will show how to use RADIUS services on a Windows Server 2019. I will skip some installation parts, since you can find them on the internet and reference section, below. In this topology, there is a switch needs to be reached by an administrator using username and password. By using any RADIUS server, all authentication can be done easily and more securely. Once an administrator changes admin password, all registered devices can be accessible using a RADIUS server easily.

Step 1. Create a lab

Step 2. Register switch on a Radius Server

Step 3. Create a user and group on Active Directory

Step 4. Switch configuration

!!S1 Configuration
=======================================
interface vlan 1
ip address 192.168.3.30 255.255.255.0
no shutdown
=======================================
!!Generate RSA for ssh connection
ip domain-lookup monash.local
crypto key generate rsa modulus 1024
ip ssh version 2
=======================================
!!ONLY ssh connection for the switch
username user password Test123
line vty
transport input ssh
=======================================
!!Indicate RADIUS server and authentication method
aaa new-model
aaa authentication login default group radius local
aaa authorization exec default group radius if-authenticated

radius-server host 192.168.3.4 key SECRET-KEY
service password-encryption

Step 5. SSH connection from a client to switch

By using Active Directory user, namely john1, a ssh connection is occurred from client pc. All packets can be seen on wireshark capture such as request, accept, port number, encrypted password etc.

Step 6. Proof of the concept - capturing RADIUS packets

In conclusion, it is beneficial and practical to use an Active Directory and Network Policy Server services together. Once you change the password of client on an Active Directory, you do not need to change passwords on network devices again. It is time saving. Of course, you can use Cisco ISE or any other authentication services, however, if you have any Active Directory service and do not have ISE, you can use RADIUS services together for network devices authorization and wireless authentication for clients.

References:

https://theitbros.com/radius-server-configuration-on-windows/

yldrmdgn

Recent Posts

SQL on Docker containers

SQL on Docker Containers I have tested different databases, namely MySQL, Microsoft SQL, and PostgreSQL,…

4 years ago

VMware ESXi 7.0 Upgrade​

VMware ESXi 7.0 Upgrade It is time to upgrade VMware environment, but I have an…

4 years ago

No Signal – HP ProLiant DL380 G7

HP ProLiant DL380 G7 It is time to troubleshooting. It can be challenge once you…

4 years ago

Cisco ASA and SNMP configuration

Cisco ASA and SNMP configuration SNMP is important to collect data from network devices. In…

5 years ago

FortiClient

FORTICLIENT In this lab, I will configure a Fortigate firewall for a remote connection from…

5 years ago

Fortigate site-to-site VPN

Fortigate site-to-site VPN As a network engineer, I may need to connect different branches to…

5 years ago

This website uses cookies.