802.1x

2,356 views

Published on

how to configure ms2003 IAS, for radius auth ?

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,356
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
117
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

802.1x

  1. 2. <ul><li>ers4500 802.1x application on MS2003 </li></ul><ul><li>Version 3 </li></ul><ul><li>Alp IŞIK </li></ul><ul><li>Netas NTS Engineer </li></ul><ul><li>[email_address] </li></ul>
  2. 3. <ul><li>Topology 1 </li></ul>supplicant authenticator Radius server 192.168.49.10 192.168.49.150 192.168.49.52 00:1b:24:b5:da:b3 network
  3. 4. <ul><li>Eap </li></ul><ul><li>2) Neap (non-eap) </li></ul>Authentication types that ers’s support
  4. 5. <ul><li>802.1X provides port-based authentication, which involves communications between a supplicant, authenticator, and authentication server. Port refers to a single point of attachment to the LAN infrastructure. The supplicant is often software on a client device, such as a laptop; the authenticator is a network device, such as an ethernet switch or wireless access point; and the authentication server is typically a host running software supporting the RADIUS and EAP protocols. </li></ul>EAP Authentication concept 1/2
  5. 6. EAP Authentication concept 2/2 <ul><li>The authenticator acts like a security guard to a protected network. The supplicant (i.e., client device) is not allowed access through the authenticator to the protected side of the network until the supplicant’s identity has been validated and authorized. An analogy to this is providing a valid passport at an airport before being allowed to pass through security to the terminal. With 802.1X port-based authentication, the supplicant provides credentials, such as user name / password or digital certificate, to the authenticator, and the authenticator forwards the credentials to the authentication server for verification . If the credentials are valid (in the authentication server database), the supplicant (client device) is allowed to access resources located on the protected side of the network. </li></ul>
  6. 7. Neap Authentication concept <ul><li>Neap is developed, cause eap does not useful for the dummy user or some user device, and still authentication security is neccesary. </li></ul><ul><li>Neap uses to authenticate the user’s mac address, ip address, port number of the authenticator. It can either use only mac, ip address or the combinastion of the above. </li></ul>
  7. 8. 802.1X Conversation RADIUS Server (Authentication Server) Ethernet Switch (RADIUS Client) PC_Client (EAP Client/Supplicant) EAP over Ethernet EAPoL Auth Requests & Return Attributes Port-Start EAPoL-Start EAP-Request/Identity EAP-Response/Identity Radius-Access-Request Radius-Access-Challenge EAP-Request (Credentials) EAP-Response (Credentials) Radius-Access-Request Radius-Access-Accept EAP- Success Access to the Network Blocked Access Allowed Switch to Radius Server communication Client to Switch communication
  8. 9. 802.1 X Ethernet packet Dest . MAC 0180C200000F* 0180C2000003 Type 8180* 888E Protocol Version 01 Packet Type 6 bytes 6 bytes 2 bytes 1 byte Source MAC 1 byte Packet Body Length 2 bytes Packet Body n bytes 00 EAP-Packet 01 EAPOL-Start * 02 EAPOL-Logoff * 03 EAPOL-Ke y 04 EAPOL-Encapsulated-ASF-Aler t Descriptor Type Key Length Relay Counter Key IV 1 bytes 2 bytes 8 bytes 16 bytes Key Index Key Signature Key 1 bytes n bytes 16 bytes * No packet body field packet body field packet body field * Beta release Code Identifier Length Data 1 byte 1 byte 2 bytes n bytes 1 Request 2 Response 3 Success 4 Failure
  9. 10. For eap ms2003 server configuration <ul><li>2003 server should have an active directory and IAS server </li></ul><ul><li>At the active directory users and groups need to be created. (as figure 1) </li></ul><ul><li>At the ias radius client will be created. (as figure 2-4). </li></ul><ul><li>At the ias, access policy need to be created. (as figure 5-12). </li></ul><ul><li>Return to active directory and configure the user as figure 13- </li></ul>
  10. 11. At the active directory part 1 <ul><li>A group (eapsunum1) is created, all eap users (alp isik) are configured as amember of “eapsunum1” and “Ras and ias servers” group. Or better to make the ‘eapsunum1’ group as a member of “Ras and ias servers” group. </li></ul>
  11. 12. Figure 1
  12. 13. At the ias server <ul><li>For radius client shared secret need to be same as the authenticator.(ers4500) </li></ul><ul><li>After radius client created can be checked as figure 4. </li></ul>
  13. 14. Figure 2
  14. 15. Figure 3
  15. 16. Figure 4
  16. 17. At the IAS access policy 1/2 <ul><li>For the access method we have chosen Ethernet. </li></ul><ul><li>For the authentication method we have chosen md5, any other method could be chosen. (figure 8) </li></ul><ul><li>On the created access policy, right click and properties (figure 9) </li></ul><ul><li>By default some policy’s will come, delete unneccesary policy’s and implement which matches your criteria.(at the example figure 10, we have implemented nas (authenticator switch) ip addr. Matches giving ers4500’s ip) and check that if the grant remote access permission is selected. </li></ul>
  17. 18. <ul><li>At the advanced tab (figure 11) we did not want to send anything to user/switch, for easy sample. Removed the attribution. </li></ul><ul><li>At the authentication tab (figure 12) noting we have chosen but checked the eap method. (md5) </li></ul>At the IAS access policy 2/2
  18. 19. Figure 5
  19. 20. Figure 6
  20. 21. Figure 7
  21. 22. Figure 8
  22. 23. Figure 9
  23. 24. Figure 10
  24. 25. Figure 11
  25. 26. Figure 12
  26. 27. <ul><li>We have returned to active directory to configure user properties. </li></ul><ul><li>At the account tab chosen password never expires and store password using reversible encryption. </li></ul><ul><li>At the member of tab added to eapsunum1 and ras & ias server. </li></ul><ul><li>At the dial-in tab we allowed the access. </li></ul>At the active directory part 2
  27. 28. Figure 13
  28. 29. Figure 14
  29. 30. Figure 15
  30. 31. For eap (authenticator) switch config (ers4500) <ul><li>At the topology 1 port 3 is used for eap client (supplicant connection). </li></ul><ul><li>Config is attached to document,with double click you may open the “eap port3.log”. </li></ul><ul><li>>enable </li></ul><ul><li>#config terminal </li></ul><ul><li>#radius-server host 192.168.49.52 port 1812 key Nortel </li></ul><ul><li>#interface fastEthernet 3 </li></ul><ul><li>#eapol status auto </li></ul><ul><li>#exit </li></ul><ul><li>#eapol enable </li></ul>
  31. 32. At the supplicant / user <ul><li>First you need to open authentication from local area connection properties, by default there is no authentication tab, from pc start, run, type services.msc, and start Wired AutoConfig. Then authentication tab will be appeared, at there click the 802.1x and choose your authentication as md5 or else. </li></ul><ul><li>Over the local area connection a box will appear as figure 16. </li></ul><ul><li>After click on it wıth the user name and password, and logon domain. Access will be provided. (which was criated at the active directory, logon domain is the active directory name) figure 17. </li></ul>
  32. 33. Figure 1 6
  33. 34. Figure 1 7
  34. 35. Successful wireshark output server side
  35. 36. Successful wireshark output user side
  36. 37. At the ms2003 event viewer it’s seen as IAS information
  37. 38. For Neap ms2003 server config <ul><li>At the 2003 server, active directory user account is different than the eap. For only mac attribute. (figure 18). User logon name need to be same as the mac of supplicant. </li></ul><ul><li>At the IAS remote access policy, edit profile, authentication pap need to be chosen as figure 19. </li></ul><ul><li>By default 2003 server has password policies, for gining mac address you need to remove the password policies. </li></ul>
  38. 39. How to remove password policy at 2003 Server 1/2 <ul><li>Select Domain Security Policy from Administrative Tools . </li></ul><ul><li>Click on Security Settings > Account Policies > Password Policy . </li></ul><ul><li>Right-click on Minimum password length in the right pane. </li></ul><ul><ul><li>Click P r operties from the context menu. </li></ul></ul><ul><ul><li>Enter a new minimum password length. Entering a Zero (0) will remove the password requirement. </li></ul></ul>
  39. 40. How to remove password policy at 2003 Server 2/2 <ul><li>Double-click on Passwords must meet complexity requirements in the right pane. </li></ul><ul><li>Select the Di s abled option. </li></ul><ul><li>Click Start > R un... And Type cmd </li></ul><ul><li>Type gpupdate /force at the Command Prompt </li></ul>
  40. 41. Figure 18
  41. 42. Figure 19
  42. 43. For neap at the authenticator switch ers4500 1/3 <ul><li>At the topology 1, port 10 is used for the neap supplicant </li></ul><ul><li>For the switch configuration you may use the attached neapport10.log by duble click. </li></ul>
  43. 44. For neap at the authenticator switch ers4500 2/3 <ul><li>>enable </li></ul><ul><li>#config terminal </li></ul><ul><li>#radius-server host 192.168.49.52 port 1812 key Nortel </li></ul><ul><li>#interface fastEthernet 3 </li></ul><ul><li>#eapol status auto </li></ul><ul><li>#exit </li></ul><ul><li>#eapol enable </li></ul><ul><li>#interface fastEthernet 10 </li></ul><ul><li>#eapol status auto </li></ul><ul><li>#eapol multihost allow-non-eap-enable </li></ul><ul><li># eap multihost non-eap-mac-max 10 </li></ul><ul><li>#eapol multihost radius-non-eap-enable </li></ul><ul><li>#eapol multihost enable </li></ul><ul><li>#exit </li></ul>
  44. 45. For neap at the authenticator switch ers4500 3/3 <ul><li># eapol multihost allow-non-eap-enable </li></ul><ul><li># eapol multihost radius-non-eap-enable </li></ul><ul><li># no eapol multihost non-eap-pwd-fmt </li></ul><ul><li># eapol multihost non-eap-pwd-fmt mac-addr </li></ul><ul><li># eapol enable </li></ul>
  45. 46. For neap at the user/supplicant <ul><li>At the user noting to be done as soon as port is connected if the mac/ip/port is macth with the server config, user will get the traffic. </li></ul>
  46. 47. Successful neap event view
  47. 48. On the swicth neap supplicant can be checked as below
  48. 49. Authentication Feature Ethernet Routing Switch 2500 Ethernet Routing Switch 4500 Ethernet Routing Switch 5500 Ethernet Routing Switch 5600 Ethernet Routing Switch 8300 Single Host Single Authentication (SHSA) – 802.1x Yes Yes Yes Yes Yes Multiple Host Single Authentication (MHSA) – 802.1x Yes Yes Yes Yes Yes Multiple Host Multiple Authentication (MHMA) – 802.1x Yes Yes Yes Yes Yes *Guest VLAN with EAP (GVLAN-SHSA) Yes (4.1.0) Yes Yes (5.0.0) Yes Yes SHSA with Guest VLAN Yes Yes Yes Yes Yes *MHSA with Guest VLAN Yes (4.1.0) Yes (5.1.0) Yes (5.0.0) Yes Future MHMA wit Guest VLAN Yes Yes Yes Yes Yes MAC Based EAP Authentication Yes (4.1.0) Yes (5.1.0) Yes (5.0.0) Yes Yes EAP and Non EAP on same port Yes Yes Yes Yes Yes RADIUS Assigned VLAN in MHMA Yes (4.2.0) Yes (5.1.0) Yes (5.1.0) Yes Yes Non-EAP IP Phone Support Yes (4.2.0) Yes (5.1.0) Yes (5.1.0) Yes No EAP or Non-EAP with Guest VLAN No Yes (5.3.0) No No No EAP or Non-EAP with Fail Open VLAN No Yes(5.3.0) No No No EAP or Non-EAP with VLAN Name No Yes(5.3.0) No No No EAP or Non-EAP Last Assigned VLAN No Yes(5.3.0) No No No Non-EAP use with Wake on LAN No Yes(5.3.0) No No No Policy Support No No Yes Yes No Tagged/Untagged Per VLAN Egress Tagging Yes Yes Yes Yes Yes Tagged and untagged per port Yes Yes Yes Yes Yes Tagging with EAP Yes Yes Yes Yes **Yes
  49. 50. *Please note that a device is only put into the Guest VLAN providing another user has not already passed EAP authentication.
  50. 51. ERS4500 implementations / features 1/ 11 <ul><li>RADIUS password fallback </li></ul><ul><li>With the RADIUS password fallback feature, the user can log on to the switch or stack by using the local password if the RADIUS server is unavailable or unreachable for authentication. </li></ul>
  51. 52. <ul><li>EAPOL dynamic VLAN assignment </li></ul><ul><li>If EAPOL-based security is enabled on an authorized port, the EAPOL feature dynamically changes the port VLAN configuration and assigns a new VLAN. The new VLAN configuration values apply according to previously stored parameters in the Authentication server. </li></ul><ul><li>The following VLAN configuration values are affected: </li></ul><ul><li>• port membership </li></ul><ul><li>• PVID </li></ul><ul><li>• port priority </li></ul>ERS4500 implementations / features 2/ 11
  52. 53. <ul><li>Single Host with Single Authentication (SHSA) </li></ul><ul><li>Multiple Host with Multiple Authentication (MHMA) </li></ul><ul><li>Multiple Host with Single Authentication (MHSA) </li></ul>ERS4500 implementations / features 3/ 11
  53. 54. <ul><li>Single Host with Single Authentication and Guest VLAN </li></ul><ul><li>With EAPOL SHSA Single Host with Single Authentication (the simplest EAPOL port operating mode), you can connect only one client on each port that is configured for EAPOL-based security. If you attempt to add additional clients to a port, that port state changes to Unauthorized. </li></ul><ul><li>You can configure a guest VLAN for non-authenticated users to access the port. Any active VLAN can be a guest VLAN. </li></ul><ul><li>The following rules apply for SHSA: </li></ul><ul><li>• When the port is EAP enabled </li></ul><ul><li>— If Guest VLAN is enabled, the port is placed on a Guest VLAN. </li></ul><ul><li>PVID of the port = Guest VLAN ID </li></ul>ERS4500 implementations / features 4/ 11
  54. 55. <ul><li>Guest Vlan </li></ul><ul><li>When an authentication failure occurs, a port is placed back in the Guest VLAN. </li></ul><ul><li>ATTENTION </li></ul><ul><li>EAP enabled port is not moved to guest-vlan, if guest vlan and original vlan are associated with different STGs. EAP port does not forward traffic in guest vlan or original VLAN, if EAP authentication succeeds packets are transmitted properly in the original VLAN. </li></ul>ERS4500 implementations / features 5/ 11
  55. 56. <ul><li>After the switch accesses the RADIUS server and authentication succeeds, the ports move to the Guest VLAN, or to configured VLANs, and age to allow the authentication of all incoming MAC addresses on the port. If there is at least one authenticated MAC address on the port, it blocks all other unauthenticated MAC addresses on the port. </li></ul>ERS4500 implementations / features 6/ 11
  56. 57. <ul><li>802.1X or non-EAP with Fail Open VLAN </li></ul><ul><li>802.1X or non-EAP with Fail Open VLAN provides network connectivity </li></ul><ul><li>when the switch cannot connect to the RADIUS server. Every three </li></ul><ul><li>minutes, the switch verifies whether the RADIUS servers are reachable. If </li></ul><ul><li>the switch cannot connect to the primary and secondary RADIUS servers, </li></ul><ul><li>then after a specified number of attempts to restore connectivity, the switch </li></ul><ul><li>declares the RADIUS servers unreachable. </li></ul><ul><li>All authenticated devices move into the configured Fail Open VLAN, when </li></ul><ul><li>the switch declares the RADIUS servers unreachable. This prevents </li></ul><ul><li>the clients from being disconnected when the reauthentication timer </li></ul><ul><li>expires and provides the devices some form of network connectivity. </li></ul>ERS4500 implementations / features 7 / 11
  57. 58. <ul><li>MHMA (Multiple Host with Multiple Authentication) </li></ul><ul><li>Each user must complete EAP authentication before the port allows traffic from the corresponding MAC address. Only traffic from the authorized hosts is allowed on that port. </li></ul><ul><li>Transmitting EAPOL packets </li></ul><ul><li>Only unicast packets are sent to a specific port so that the packets reach the correct destination. </li></ul><ul><li>After the first successful authentication, only EAPOL packets and data from the authenticated MAC addresses are allowed on a particular port. </li></ul>ERS4500 implementations / features 8/11
  58. 59. <ul><li>A port remains on the Guest VLAN when no authenticated hosts exist on it. Until the first authenticated host, both EAP and non EAP clients are allowed on the port. </li></ul><ul><li>RADIUS VLAN assignment is enabled for ports in MHMA mode. Upon successful RADIUS authentication, the port gets a VLAN value in a RADIUS attribute with EAP success. The port is added and the PVID is set to the first such VLAN value from the RADIUS server. </li></ul><ul><li>Reauthenticate Now, when enabled, causes all sessions on the port to reauthenticate. </li></ul>ERS4500 implementations / features 9 / 11
  59. 60. <ul><li>802.1X or non-EAP Last Assigned RADIUS VLAN </li></ul><ul><li>The 802.1X or non-EAP Last Assigned RADIUS VLAN functionality allows you to configure the switch such that the last received RADIUS VLAN assignment is always honoured on a port. In the previous release, if you enable the use-radius-assigned-vlan option, then only the first valid RADIUS-assigned VLAN (by EAP or non-EAP authentication) on that port is honoured. The subsequent RADIUS VLAN assignments are ignored for any user on that port. The last RADIUS-assigned VLAN (either EAP or non-EAP) determines the VLAN membership and PVID replacing any previous RADIUS-assigned VLAN values for that port. </li></ul>ERS4500 implementations / features 10 / 11
  60. 61. <ul><li>ATTENTION </li></ul><ul><li>If a PC client is assigned to a VLAN based on a previous RADIUS Assigned VLAN, when the client goes into sleep or hibernation mode it reverts to either the default port-based VLAN or Guest VLAN configured for that port. So, the WoL Magic Packet must be sent to the default VLAN or Guest VLAN. </li></ul>ERS4500 implementations / features 11 / 11
  61. 62. For eap/neap with guest vlan <ul><li>We need to open dhcp at ms 2003 to give ip to authenticated </li></ul><ul><li>vlan users. (figure 20) </li></ul><ul><li>We need to configure dhcp relay at the ers4500 </li></ul><ul><li>It will provide us for authenticate user gets ip from dhcp and </li></ul><ul><li>non-authenticate user to use guest vlan. </li></ul>
  62. 63. Figure 20
  63. 64. Ers 4500 dhcp relay commands <ul><li>ip dhcp-relay ip dhcp-relay fwd-path <next hope ip> <server ip> enable ip dhcp-relay fwd-path <next hope ip> <server ip> mode bootp-dhcp </li></ul>
  64. 65. <ul><li>Duble click to packege to see eap-radius resources </li></ul>
  65. 66. <ul><li>Thanks </li></ul>

×