Windows Server 2022 NPS Radius
Windows Server 2022 NPS Radius
This lab activity delves into the implementation of AAA (Authentication, Authorization, and
Accounting) in a Cisco IOS environment using a RADIUS server. AAA provides a robust
framework that manages user access to network devices, enforces policies, and audits usage.
This lab uses a Windows Server-based RADIUS server for AAA services, offering a common
scenario in a real-world environment.
The AAA services, when configured on a Cisco device, interact with a RADIUS server that
centralizes user access control and policy enforcement. Authentication verifies a user's identity,
authorization determines what a user is allowed to do, and accounting tracks what the user
does.
When it comes to configuring AAA, it's important to note that it's different from setting up simple
password security on interfaces. AAA leverages local or external databases (like the RADIUS
server in this case) for increased security and centralized control.
Typically, AAA is set up to first try to authenticate or authorize using an external server (like
RADIUS), and if that server is unavailable, it falls back to local user accounts stored on the
router or switch.
The main advantages of using AAA with a RADIUS server include centralized user
management, scalable access control, and enhanced auditing and accountability.
3. Install and configure the Network Policy Server (NPS) role on the Windows Server to act
as a RADIUS server
5. Configure the Cisco device to use RADIUS for AAA, and set it up to use the local
user database as a fallback authentication method.
6. Test the setup by logging in with the user accounts created on the Windows Server and
tracking the accounting logs.
Hands-on experience with user account and access management on a network device.
Hostname
Prerequires:
• GNS3
• Windows server 2022 -2016 (The steps are the same for any of these
versions.) You can download the evaluation version from Microsoft.
no ip domain name lookup no logging console cdp run host S1 int vlan 1 ip
address 192.168.100.100 255.255.255.0 no shut username user privilege 15
secret password line con 0 login local line vty 0 4 login local
3. cdp run: This command enables the Cisco Discovery Protocol (CDP). CDP is a
Cisco proprietary protocol used to discover Cisco devices in your network.
4. host S1: This command changes the hostname of the device to "S1".
5. int vlan 1: This command enters the configuration mode for VLAN 1.
9. line con 0: This command enters line configuration mode for the console port.
10. login local: This command sets the login method to use the local user
database for authentication. It's used here for the console and VTY lines,
meaning that the username and password set earlier will be used for console
and remote logins.
11. line vty 0 4: This command enters line configuration mode for the first 5 VTY
lines (0-4). VTY lines are used for Telnet and SSH access to the device.
So, in essence, this configuration script is setting up a basic network device with a
single IP interface, a local user for administration, and with console and remote
login using this user. It also disables some default settings like DNS lookup on
mistyped commands and console logging.
Step 2: Configure Router
Next, we have to configure the Router for connectivity and then validate
connectivity based on the network topology.
no ip domain name lookup no logging monitor no logging console cdp run host
R1 int GigabitEthernet0/0 ip address 192.168.100.101 255.255.255.0 no shut
username user privilege 15 secret password line con 0 login local
• Type escape sequence to abort.: This line indicates that you can stop the
ping process by entering the escape sequence (typically Ctrl+Shift+6 twice).
• !!!!!: Each '!' represents a successful reply (ICMP Echo Reply) from the device
with the IP address 192.168.100.100. In this case, the router received a reply
for all 5 Echo Requests, indicating that network connectivity to this IP address
is good.
4. Enter the IP address, Subnet mask, and Default gateway that you want
to use. Below, select Use the following DNS server addresses. Enter the
Preferred DNS server.
3. Follow the wizard until you get to the Server Roles step.
4. Select Network Policy and Access Services and click Next.
4. Enter the Friendly name, Address (IP or DNS), and Shared Secret (using
88888888 for this lab**)** for the Cisco device. Click OK.
R1 192.168.100.101
SW1 192.168.100.100
Step 6: Create local Group and local user accounts on the Windows
Server
1. Open Computer Management right clicking the start menu then clicking on
Computer Management.
2. In the left pane, navigate to System Tools > Local Users and Groups >
Groups.
3. Right-click on the Groups folder and select New Group. Create two groups
(Group 1 & Group 15)
6. Create Read only user account with below information. Uncheck everything
and only check User cannot change Password & Password never expires
Password Test12!!
6. Do the same thing with the second account (Admin account) with below
information. Uncheck everything and only check Password never expires
Password Secret$$
On the Select Users menu type in cisco under Enter the object names to select
than click on Check Names for windows to resolve the local user.
5. Enter a PRIV15_Policy for the first policy name, then select Type of network
access server as Unspecified, click Next.
6. In the Conditions page, click Add, select Windows Groups and add the
Windows group. Make sure to type in group15 then click on Check Names for
windows to resolve the local group.
10. In the Authentication Methods page keep the default settings, then click
Next.
11. In the Configure Settings under Navigate to RADIUS Attributes > Standard
and Remove Framed-Protocol
12. Edit Service-Type. Select Others and change it to Login.
13. In the Configure Settings Navigate to RADIUS Attributes > Vendor Specific
click on ADD
20. Validate that in the Configure Settings under RADIUS Attributes > Vendor
Specific the value is displayed
The commands listed are used to enable and configure AAA (Authentication,
Authorization, and Accounting) using RADIUS on a Cisco IOS device:
• aaa new-model: This command enables AAA, replacing the older RADIUS and
TACACS+ authentication methods.
• aaa authentication login default group radius local: This command sets
the default login authentication method. It first tries to authenticate using the
defined RADIUS server(s) (group radius). If that fails, for example, if the
RADIUS server is not available, it falls back to using the local user database on
the router (local).
• aaa authorization exec default group radius local: This command sets up
authorization (what users are allowed to do once they're authenticated) for
exec sessions. The router will first attempt to authorize users against the
RADIUS server, and if that fails, it will use the local user database.
• aaa authentication enable default group radius enable: This command
sets the authentication method for enable mode. It specifies that the RADIUS
server should be used for authentication when the enable command is
entered. If the RADIUS server is unavailable, the enable password on the
router will be used.
• aaa authorization console: This command enables AAA authorization for all
network-related service requests that are not associated with a user terminal
session, including SLIP and PPP, ARAP, NASI, X.25 PAD connections, and LAT
terminal server host-initiated connections.
In summary, these commands are enabling AAA on the router, setting up a RADIUS
server for AAA services, and configuring the router to use the RADIUS server and
then the local user database for authentication and authorization for both login
and enable mode. It's also enabling AAA authorization for non-terminal service
requests.
*Note that the commands listed may not match with your device there might be
some syntax changes as some of the command may have been deprecated or be
different please adjust accordingly.
2. Validate that AAA is working by logging out the device and logging in with the
read-only user
Username: cisco
Password: Test12!!
*Read-only user is only able to be EXEC Mode and is unable to enter Privileged
EXEC MODE
Username: Netadmin
Password: Secret$$
*Netadmin account is set for privilege level 15 so you are automatically put in
Privileged EXEC MODE
4. Repeat steps 1-3 for R1 and validate that R1 is also able to reach the RADIUS
Server.
5. Finished!