{"id":2022,"date":"2015-12-30T12:03:00","date_gmt":"2015-12-30T12:03:00","guid":{"rendered":"https:\/\/jay-miah.co.uk\/?p=2022"},"modified":"2024-11-18T15:13:18","modified_gmt":"2024-11-18T15:13:18","slug":"configure-radius-authentication-on-server-2012-r2-for-cisco-devices","status":"publish","type":"post","link":"https:\/\/jay-miah.co.uk\/index.php\/configure-radius-authentication-on-server-2012-r2-for-cisco-devices\/","title":{"rendered":"Configure RADIUS Authentication on Server 2012 R2 for Cisco Devices"},"content":{"rendered":"<p>In this step-by-step guide we will setup NPS\u00a0as a RADIUS server to authenticate users for our Cisco 3560X switch, this process will work on most Cisco switches and routers. In this example we will be using two AD security groups to define level 15 and level 1 user access. This is a good practice, for example if we wanted to allow some users read only access, we can give them level 1 privileges\u00a0and not hand out the enable password. The user would be assigned to the AD security group which is mapped back to an NPS policy that when these users authenticate, they will be in the user mode prompt &gt;.<\/p>\n<p>Our network admins on the other hand can have level 15 and not have to keep entering the enable password every time\u00a0they login, the NPS policy defined for level 15 access will place the user into Exec Mode # upon successful authentication. Lets get started!<\/p>\n<p>Note: You must have the NPS server role installed to begin configuring access policies, have a look at\u00a0<a href=\"http:\/\/presspi\/?p=808\">\u201cInstall Network Policy Server (NPS) on Server 2012 R2\u201d<\/a><\/p>\n<p><strong>Create the AD security groups\u00a0<\/strong><\/p>\n<p><strong>1.<\/strong>\u00a0\u00a0Log into windows server 2012 R2, and launch\u00a0\u201cActive Directory users and Computers\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"304\" height=\"212\" class=\"wp-image-2023\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/0-1-13.jpeg\" alt=\"0.1\" \/><\/p>\n<p><strong>2.<\/strong>\u00a0Navigate to the\u00a0\u201cUsers\u201d\u00a0container and create a new security group. click\u00a0\u201cAction\u201d\u00a0from the top menu, scroll down to\u00a0\u201cNew\u201d\u00a0and\u00a0\u201cGroup\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"419\" height=\"274\" class=\"wp-image-2024\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/0-2-8.jpeg\" alt=\"0.2\" \/><\/p>\n<p><strong>3.<\/strong>\u00a0Give the group a meaningful name, in this example we have used\u00a0\u201cRADIUS-lvl1-Users\u201d\u00a0This security group will be to control the users who will have level 1 access to the Cisco device upon login. Users will need to enter\u00a0the enable password should they want higher privilege access. They\u00a0will be placed at the &gt; user mode prompt when authenticated.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"451\" height=\"385\" class=\"wp-image-2025\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/0-4-8.jpeg\" alt=\"0.4\" \/><\/p>\n<p><strong>4.<\/strong>\u00a0Create a second group with a meaningful name, in this example we have used\u00a0\u201cRADIUS-lvl15-Users\u201d\u00a0this group will be for users who will have level 15 access to the Cisco device, they will be prompted with the # user mode prompt and will not need to supply the enable password.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"451\" height=\"385\" class=\"wp-image-2026\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/0-3-8.jpeg\" alt=\"0.3\" \/><\/p>\n<p><strong>5.<\/strong>\u00a0Right click\u00a0\u201cRADIUS-lvl1-Users\u201d, select the properties of the group and add a user as a member of the group. In this case i have added a user called\u00a0\u201clvl1\u201d, you can use any user in the domain that will be accessing the device. Click\u00a0\u201cOK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"464\" class=\"wp-image-2027\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/0-7-8.jpeg\" alt=\"0.7\" \/><\/p>\n<p>Click\u00a0\u201cOK\u201d\u00a0and close the properties<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"414\" height=\"168\" class=\"wp-image-2028\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/0-8-8.jpeg\" alt=\"0.8\" \/><\/p>\n<p><strong>6.<\/strong>\u00a0Right click\u00a0\u201cRADIUS-lvl15-Users\u201d, select the properties of the group and add a user as a member of the group. I have added a user called\u00a0\u201clvl15\u201d\u00a0for this group. Click\u00a0\u201cOK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"686\" height=\"463\" class=\"wp-image-2029\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/0-5-8.jpeg\" alt=\"0.5\" \/><\/p>\n<p>Click\u00a0\u201cOK\u201d\u00a0and close the properties<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"414\" height=\"156\" class=\"wp-image-2030\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/0-6-8.jpeg\" alt=\"0.6\" \/><\/p>\n<p><strong>Add the RADIUS Client<\/strong><\/p>\n<p><strong>1.<\/strong>\u00a0Click\u00a0\u201cStart\u201d\u00a0and type\u00a0\u201cNPS\u201d\u00a0click and launch the\u00a0\u201cNetwork Policy Server\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"344\" height=\"207\" class=\"wp-image-2031\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/1-32.jpeg\" alt=\"1\" \/><\/p>\n<p><strong>2.<\/strong>\u00a0Create a template of the shared secret, although this can be done\u00a0manually on the client device, its easier to work from a template when adding multiple client devices in the future. Expand\u00a0\u201cTemplates Management\u201d, Right click\u00a0\u201cShared Secret\u201d\u00a0and click\u00a0\u201cNew\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"246\" height=\"156\" class=\"wp-image-2032\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/2a-7.jpeg\" alt=\"2a\" \/><\/p>\n<p><strong>3.<\/strong>\u00a0Give the template a name and create a password that will be used by the RADIUS client to join to the RADIUS Server. Click\u00a0\u201cOK\u201d\u00a0and close the window<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"457\" height=\"380\" class=\"wp-image-2033\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/2b-7.jpeg\" alt=\"2b\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"657\" height=\"135\" class=\"wp-image-2034\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/2c-7.jpeg\" alt=\"2c\" \/><\/p>\n<p><strong>4.<\/strong>\u00a0Expand\u00a0\u201cRADIUS Clients and Servers\u201d, right click\u00a0\u201cRADIUS Client\u201d\u00a0and select\u00a0\u201cNew\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"231\" height=\"178\" class=\"wp-image-2035\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/2d-7.jpeg\" alt=\"2d\" \/><\/p>\n<p><strong>5.<\/strong>\u00a0Make sure the tickbox\u00a0\u201cEnable this RADIUS client\u201d\u00a0is ticked, give the client a\u00a0\u201cFriendly name\u201d\u00a0and specify the\u00a0\u201cIP address\u201d\u00a0of the device. From the\u00a0\u201cShared Secret\u201d\u00a0dropdown box select the template we created earlier so that the client can use this.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"468\" height=\"592\" class=\"wp-image-2036\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/2e-7.jpeg\" alt=\"2e\" \/><\/p>\n<p><strong>6.<\/strong>\u00a0Select the\u00a0\u201cAdvanced\u201d\u00a0tab, and from the\u00a0\u201cVendor name\u201d\u00a0drop down select the vendor of the device, in this case its\u00a0\u201cCisco\u201d. Click\u00a0\u201cOK\u201d\u00a0and close the window<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"470\" height=\"291\" class=\"wp-image-2037\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/3-24.jpeg\" alt=\"3\" \/><\/p>\n<p>The device will now be visible under the\u00a0\u201cRADIUS Clients\u201d\u00a0list<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"591\" height=\"153\" class=\"wp-image-2038\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/4-15.jpeg\" alt=\"4\" \/><\/p>\n<p><strong>Create a Connection Request Policy<\/strong><\/p>\n<p><strong>1.<\/strong>\u00a0Expand\u00a0\u201cPolicies\u201d\u00a0right click\u00a0\u201cConnection Request Policies\u201d\u00a0and click\u00a0\u201cNew\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"282\" height=\"160\" class=\"wp-image-2039\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/5-15.jpeg\" alt=\"5\" \/><\/p>\n<p><strong>2.<\/strong>\u00a0Give the policy a name and click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"608\" class=\"wp-image-2040\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/6-14.jpeg\" alt=\"6\" \/><\/p>\n<p><strong>3.<\/strong>\u00a0Click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"608\" class=\"wp-image-2041\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/7-17.jpeg\" alt=\"7\" \/><\/p>\n<p><strong>4.<\/strong>\u00a0Select\u00a0\u201cAccess Client IPv4 Address\u201d\u00a0we will use a subnet range with a wildcard to define what is allowed to request Authentication. Click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"698\" height=\"361\" class=\"wp-image-2042\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/8-14.jpeg\" alt=\"8\" \/><\/p>\n<p><strong>5.<\/strong>\u00a0Insert the\u00a0\u201cIP subnet\u201d\u00a0and\u00a0\u201cwildcard mask\u201d, in this example we are allowing anything from the 192.168.0.0 subnet,\u00a0\u201cclick OK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"185\" class=\"wp-image-2043\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/9-14.jpeg\" alt=\"9\" \/><\/p>\n<p><strong>6.<\/strong>\u00a0Click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"608\" class=\"wp-image-2044\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/10-15.jpeg\" alt=\"10\" \/><\/p>\n<p><strong>7.<\/strong>\u00a0Click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"608\" class=\"wp-image-2045\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/11-15.jpeg\" alt=\"11\" \/><\/p>\n<p><strong>8.<\/strong>\u00a0Click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"608\" class=\"wp-image-2046\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/12-13.jpeg\" alt=\"12\" \/><\/p>\n<p><strong>9.<\/strong>\u00a0Click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"608\" class=\"wp-image-2047\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/13-17.jpeg\" alt=\"13\" \/><\/p>\n<p><strong>10.<\/strong>\u00a0\u00a0Click\u00a0\u201cFinish\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"608\" class=\"wp-image-2048\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/14-17.jpeg\" alt=\"14\" \/><\/p>\n<p>The newly created policy will now be listed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"884\" height=\"158\" class=\"wp-image-2049\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/15-16.jpeg\" alt=\"15\" \/><\/p>\n<p><strong>Create the Network Access Policies for Level 1 &amp; 15\u00a0privileges<\/strong><\/p>\n<p><strong>1.<\/strong>\u00a0Right click\u00a0\u201cNetwork Policies\u201d\u00a0and select\u00a0\u201cNew\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"282\" height=\"174\" class=\"wp-image-2050\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/16-17.jpeg\" alt=\"16\" \/><\/p>\n<p><strong>2.<\/strong>\u00a0\u00a0Give the policy a name that will correspond with our security group created earlier, this policy will map\u00a0\u201cRADIUS-lvl1-Users\u201d. click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2051\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/17-12.jpeg\" alt=\"17\" \/><\/p>\n<p><strong>3.<\/strong>\u00a0\u00a0Click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2052\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2022-30.jpeg\" \/><\/p>\n<p><strong>4.<\/strong>\u00a0Select\u00a0\u201cUser Groups\u201d\u00a0and click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"698\" height=\"361\" class=\"wp-image-2053\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2022-31.jpeg\" \/><\/p>\n<p><strong>5.<\/strong>\u00a0Specify the security group this policy will\u00a0use to authenticate users. Click\u00a0\u201cOK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"471\" height=\"258\" class=\"wp-image-2054\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2022-32.jpeg\" \/><\/p>\n<p>Click\u00a0\u201cOK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"416\" height=\"317\" class=\"wp-image-2055\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/20-14.jpeg\" alt=\"20\" \/><\/p>\n<p><strong>6.<\/strong>\u00a0Click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2056\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/21-16.jpeg\" alt=\"21\" \/><\/p>\n<p><strong>7.<\/strong>\u00a0Select\u00a0\u201cAccess Granted\u201d\u00a0and click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2057\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/22-19.jpeg\" alt=\"22\" \/><\/p>\n<p><strong>8.<\/strong>\u00a0De-select all the Microsoft authenticated methods and tick\u00a0\u201cUnencrypted authentication (PAP.SPAP)\u201d, RADIUS will still continue to use a hashing algorithm so the authentication process will be secure. Click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2058\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2022-36.jpeg\" \/><\/p>\n<p>At the warning\u00a0prompt select\u00a0\u201cNO\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"497\" height=\"215\" class=\"wp-image-2059\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/23-1-8.jpeg\" alt=\"23.1\" \/><\/p>\n<p><strong>9.<\/strong>\u00a0Click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2060\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/24-18.jpeg\" alt=\"24\" \/><\/p>\n<p><strong>10.<\/strong>\u00a0From the RADIUS Attributes select\u00a0\u201cStandard\u201d\u00a0and remove the two listed default attributes highlighted and Click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2061\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/25-17.jpeg\" alt=\"25\" \/><\/p>\n<p><strong>11.<\/strong>\u00a0Select\u00a0\u201cService Type\u201d\u00a0and click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"468\" class=\"wp-image-2062\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/26-16.jpeg\" alt=\"26\" \/><\/p>\n<p><strong>12.<\/strong>\u00a0Select\u00a0\u201cOthers\u201d\u00a0and define\u00a0\u201cLogin\u201d\u00a0from the drop down list. Click\u00a0\u201cOK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"404\" height=\"357\" class=\"wp-image-2063\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/27-14.jpeg\" alt=\"27\" \/><\/p>\n<p>The Attributes should now contain the single\u00a0\u201cService-Type\u201d\u00a0of\u00a0\u201cLogin\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2064\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/28-16.jpeg\" alt=\"28\" \/><\/p>\n<p><strong>13.<\/strong>\u00a0Click\u00a0\u201cVendor Specific\u201d\u00a0and Click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2065\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/29-16.jpeg\" alt=\"29\" \/><\/p>\n<p><strong>14.<\/strong>\u00a0Select\u00a0\u201cVendor Specific\u201d\u00a0from the list and click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"463\" class=\"wp-image-2066\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/30-15.jpeg\" alt=\"30\" \/><\/p>\n<p><strong>15.<\/strong>\u00a0Click\u00a0\u201cAdd\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"436\" height=\"391\" class=\"wp-image-2067\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/31-15.jpeg\" alt=\"31\" \/><\/p>\n<p><strong>16.<\/strong>\u00a0Select\u00a0\u201cCisco\u201d\u00a0from the drop down list, select\u00a0\u201cYes. It conforms\u201d\u00a0and click\u00a0\u201cConfigure Attribute\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"399\" height=\"363\" class=\"wp-image-2068\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/32-16.jpeg\" alt=\"32\" \/><\/p>\n<p><strong>17.<\/strong>\u00a0Change the\u00a0\u201cVendor-assigned attribute number\u201d\u00a0to\u00a0\u201c1\u201d\u00a0the\u00a0\u201cAttribute format\u201d\u00a0to\u00a0\u201cString\u201d\u00a0and the\u00a0\u201cAttribute Value\u201d\u00a0to\u00a0<strong>\u201cshell:priv-lvl=1\u201d<\/strong>. In this attribute we are simply specifying that we want users that authenticate to our Cisco device to be allocated into user mode upon authentication. click\u00a0\u201cOK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"336\" height=\"245\" class=\"wp-image-2069\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/33-23.jpeg\" alt=\"33\" \/><\/p>\n<p><strong>18.<\/strong>\u00a0Click\u00a0\u201cOK\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"436\" height=\"391\" class=\"wp-image-2070\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/34-12.jpeg\" alt=\"34\" \/><\/p>\n<p><strong>19.<\/strong>\u00a0Click\u00a0\u201cNext\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2071\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/35-15.jpeg\" alt=\"35\" \/><\/p>\n<p><strong>20.<\/strong>\u00a0At the summary window click\u00a0\u201cFinish\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"696\" height=\"607\" class=\"wp-image-2072\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/36-16.jpeg\" alt=\"36\" \/><\/p>\n<p>The\u00a0Access policy for users that will default to user mode is now complete, we must now setup the second policy for our users that will be using level 15.<\/p>\n<p><strong>21.<\/strong>\u00a0Follow the above steps to configure the second policy using the the\u00a0\u201cRADIUS-lvl15-Users\u201d\u00a0AD security group and the\u00a0\u201cVendor Specific\u201d\u00a0attribute value of\u00a0<strong>\u201cshell:priv-lvl=15\u201d<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"336\" height=\"245\" class=\"wp-image-2073\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/33-24.jpeg\" alt=\"33\" \/><\/p>\n<p>Once the second policy has been added, both policies should be visible in \u201cNetwork Policies\u201d pane<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"785\" height=\"197\" class=\"wp-image-2074\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/42-12.jpeg\" alt=\"42\" \/><\/p>\n<p><strong>Configure the Cisco Switch<\/strong><\/p>\n<p><strong>1.\u00a0<\/strong>Login into the switch using putty or console, and enter the following commands:<\/p>\n<p><strong># conf t\u00a0<\/strong>\u2013 Enter global Configuration mode<\/p>\n<p><strong>(config)# aaa new-model<\/strong>\u00a0\u2013 Define a new aaa server<\/p>\n<p><strong>(config)# radius-server host 192.168.10.23 auth-port 1645 acct-port 1646<\/strong>\u00a0\u2013 Define the IP address of the RADIUS server and the Authentication and Authorization ports<\/p>\n<p><strong>(config)# radius-server key cisco\u00a0<\/strong>\u2013 Define the shared secret<\/p>\n<p><strong>(config)# aaa authentication login default group radius local<\/strong>\u00a0\u2013 Define the login group and method, use RADIUS and only use local if RADIUS is unavailable but do not fail\u00a0over<\/p>\n<p><strong>(config)# aaa authorization exec default group radius if-authenticated\u00a0<\/strong>\u2013 authorize the user with exec mode privileges if already previously authenticated in the event RADIUS is\u00a0unavailable during the session.<\/p>\n<p><strong>(config)# ip radius source-interface Vlan 1<\/strong>\u00a0\u2013 VLAN1 is the source interface which the client device uses to communicate to the RADIUS server, this command is necessary only if SVIs are on the device or routing is enabled, this will not be required for access switches.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"170\" class=\"wp-image-2075\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/sw-config-7.jpeg\" alt=\"sw config\" \/><\/p>\n<p><strong>Testing\u00a0<\/strong><\/p>\n<p><strong>1.<\/strong>\u00a0Login using the user allocated to the level 1 RADIUS security group and verify the correct privilege level is allocated allocated to the user upon authentication<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"132\" class=\"wp-image-2076\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/lvl1-login-7.jpeg\" alt=\"lvl1 -login\" \/><\/p>\n<p>debug radius output from the switch for user lvl1 with privilege level 1. (#debug radius)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"989\" height=\"462\" class=\"wp-image-2077\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2022-55.jpeg\" \/><\/p>\n<p><strong>2.<\/strong>\u00a0Login using the user allocated to the level 15 RADIUS security group and verify the correct privilege level is allocated to the user upon authentication<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"670\" height=\"137\" class=\"wp-image-2078\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/lvl15-login-7.jpeg\" alt=\"lvl15 -login\" \/><\/p>\n<p>debug radius output from the switch for user lvl15 with privilege level 15. (#debug radius)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"985\" height=\"513\" class=\"wp-image-2079\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2022-57.jpeg\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this step-by-step guide we will setup NPS\u00a0as a RADIUS server to authenticate users for our Cisco 3560X switch, this process will work on most<\/p>\n","protected":false},"author":1,"featured_media":2018,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6,151,9],"tags":[106,104,124,112,113,125],"class_list":["post-2022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-network","category-security","category-server-endpoint","category-switching","tag-aaa","tag-authentication","tag-cisco-radius","tag-nps","tag-radius","tag-switch-radius"],"_links":{"self":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=2022"}],"version-history":[{"count":2,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2022\/revisions"}],"predecessor-version":[{"id":2110,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2022\/revisions\/2110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/media\/2018"}],"wp:attachment":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=2022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=2022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=2022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}