{"id":683,"date":"2016-12-19T08:55:13","date_gmt":"2016-12-19T07:55:13","guid":{"rendered":""},"modified":"2019-04-30T08:57:26","modified_gmt":"2019-04-30T06:57:26","slug":"asa-aaa-authentication-against-windows-2016-server-ad","status":"publish","type":"post","link":"https:\/\/nil.uniza.sk\/en\/asa-aaa-authentication-against-windows-2016-server-ad\/","title":{"rendered":"ASA AAA authentication against Windows 2016 server (AD)"},"content":{"rendered":"<p>The article describes configuration of the AAA service on Cisco ASA against a Network policy server running on Windows 2016 server. The implementation of Network policy server on Windows is de-facto Microsoft implementation of RADIUS server.<\/p>\n<h1>Configuration of AAA radius server on Cisco ASA<\/h1>\n<h2>ASDM<\/h2>\n<p>1) Connect to your ASA using ASDM<br \/>\n2) From the menu select &#8222;Configuration&#8220;<br \/>\n3) From the left panel select &#8222;Remote Access VPN&#8220;<br \/>\n4) Within of the &#8222;Remote Access VPN&#8220; select AAA\/Local Users<br \/>\n5) Then select &#8222;AAA Server Group&#8220;<br \/>\n6) On the right two panels appears, the &#8222;AAA Server Group&#8220; and the &#8222;Servers in the Selected Group&#8220;<br \/>\n7) Add a new server within the Server Group<br \/>\n&#8211; choose the name for the server group<br \/>\n&#8211; select RADIUS as the protocol<br \/>\n&#8211; other options we may leave default<br \/>\n8) Now choose just created server group and within of the second half of panel (the bottom one) add the new server<br \/>\n&#8211; select the ASA interface where the server will operate<br \/>\n&#8211; specify the IP address of the server<br \/>\n&#8211; specify the &#8222;Server Secret Key&#8220;<br \/>\n&#8211; check the &#8222;MS CHAPv2 Capable&#8220; option<br \/>\n9) Ok and APPLY<\/p>\n<h2>Command line<\/h2>\n<p>The configuration in general is:<\/p>\n<pre>aaa-server NAME protocol radius\naaa-server NAME (INTERFACE) host IP_ADDRESS\n key *****<\/pre>\n<div><\/div>\n<div>where in my case it is<\/div>\n<div>\n<pre>aaa-server KIS-DC protocol radius\naaa-server KIS-DC (vlan200) host 192.168.200.2\n key *****<\/pre>\n<h1>Configuration of Windows 2016 Server &#8211; configuration of the Network police server<\/h1>\n<p>1) Login to your windows server<br \/>\n2) Open &#8222;Server Manager&#8220;<br \/>\n3) From the Dashboard select &#8222;Add roles and features&#8220; (or through Manage &gt; Add roles and features)<br \/>\n4) Go through welcome page selecting Next<br \/>\n5) Select &#8222;Role-based or feature-based installation&#8220; and go Next<br \/>\n6) Select your server then Next<br \/>\n7) We are on the &#8222;Server roles&#8220; step, where we select &#8222;Network Policy and Access Services&#8220;, then click Next<br \/>\n8) Click &#8222;Add features&#8220; and then Next\/Next and finally Install<br \/>\n9) Once the installation finish click Close<br \/>\n10) Then from the &#8222;Server Manager&#8220; select &#8222;NPAS&#8220;<br \/>\n11) In SERVERS panel right click on just installed server and select &#8222;Network Policy Server&#8220;<br \/>\n12) Right click on NPS (Local) and select &#8222;Register server in Active Directory&#8220;<br \/>\n13) From the Left menu expand &#8222;RADIUS Clients and Servers&#8220;<br \/>\n14) Right click on the RADIUS Client and select &#8222;New&#8220;<br \/>\n15) Setup a new radius client, which means:<\/p>\n<p>&#8211; Check &#8222;Enable this RADIUS client&#8220;<br \/>\n&#8211; in &#8222;Friendly name&#8220; specify the name for an ASA client, in my case (for example) &#8222;<em>cisco-asa<\/em>&#8220;<br \/>\n&#8211; In &#8222;Address&#8220; specify th eIP address of your ASA box or its DNS name (if it is configured)<br \/>\n&#8211; select &#8222;Manual&#8220; at the bottom and specify Shared secret (the one previously configured previously on the ASA box)<br \/>\n&#8211; Confirm secret<br \/>\n&#8211; Click OK<br \/>\n16) then expand Policies and do the right click on &#8222;Connection Request Policies&#8220; where select &#8222;New&#8220;<br \/>\n17) Specify the name within the Policy Name<br \/>\n18) In &#8222;Specify condition&#8220; add a condition, where select &#8222;Client Friendly Name&#8220;&#8218; and click Add<\/p>\n<\/div>\n<p>19) Specify the name for the condition, for example the same as was done above (cisco-asa)<br \/>\n20) Then Next\/Next and after &#8222;Specify Authentication Methods&#8220; step within &#8222;Configure Settings&#8220; select the &#8222;User-Name&#8220; attribute and Finish<br \/>\n21) Now right click on the Network Policies and select New<br \/>\n22) Specify the name within the &#8222;Policy-name&#8220; form and go Next<br \/>\n23) then Specify conditions where we need to select &#8222;User Groups&#8220;<br \/>\n24) Add users group which we wish to allows access. The list is taken from the active directory server, I selected for example Domain Users, then click Next<br \/>\n25) Select Access granted and go Next<br \/>\n26)\u00a0Select &#8222;Unencrypted Authentication PAP SPAP&#8220; and go Next.<br \/>\n27) Then select No when asking for Connection Request Policy and go Next<br \/>\n28) Go Next and finish<\/p>\n<h1>Testing<\/h1>\n<p>Test the authentication. We may use for it the ASA ASDM, where on the same page as we have added servers there is the Test button where we may specify the name and password ad check if the authentication was successful.<\/p>","protected":false},"excerpt":{"rendered":"<p>\n\tThe article describes the configuration of AAA service on Cisco ASA against Network policy server running on Windows 2016 server. The implementation of Network policy server on Windows is defacto the MS implementaion of RADIUS server.<\/p>\n<h1>\n\tConfiguration of AAA radius server on Cisco ASA<\/h1>\n<h2>\n\tASDM<\/h2>\n<p>\n\t1) Connect to your ASA using ASDM<\/p>\n<p>\n\t2) Select &quot;Configuration&quot; from the menu<\/p>\n<p>\n\t3) From the left panel select &quot;Remote Access VPN&quot;<\/p>\n<p>\n\t4) Within of the &quot;Remote Access VPN&quot; select AAA\/Local Users<\/p>","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[851],"tags":[],"class_list":["post-683","post","type-post","status-publish","format-standard","hentry","category-windows-2016-server"],"taxonomy_info":{"category":[{"value":851,"label":"Windows 2016 server"}]},"featured_image_src_large":false,"author_info":{"display_name":"admin","author_link":"https:\/\/nil.uniza.sk\/en\/author\/admin\/"},"comment_info":12,"category_info":[{"term_id":851,"name":"Windows 2016 server","slug":"windows-2016-server","term_group":0,"term_taxonomy_id":849,"taxonomy":"category","description":"","parent":845,"count":2,"filter":"raw","cat_ID":851,"category_count":2,"category_description":"","cat_name":"Windows 2016 server","category_nicename":"windows-2016-server","category_parent":845}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/posts\/683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/comments?post=683"}],"version-history":[{"count":0,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/posts\/683\/revisions"}],"wp:attachment":[{"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/media?parent=683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/categories?post=683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nil.uniza.sk\/en\/wp-json\/wp\/v2\/tags?post=683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}