More actions
No edit summary |
No edit summary |
||
(13 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
[[Authentication: Microsoft NPS]], or Network Policy Server, allows you to create and enforce organization-wide network access policies for connection requests, authentication and authorization, including RADIUS authentication. Official Microsoft documentation can be found [https://learn.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-top here]. | [[Authentication: Microsoft NPS]], or Network Policy Server, allows you to create and enforce organization-wide network access policies for connection requests, authentication and authorization, including RADIUS authentication. Official Microsoft documentation can be found [https://learn.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-top here]. | ||
This service was setup to authenticate [[Network: Road Warrior VPN]] on [[Hardware:SAD-HME-FW01]] via RADIUS. In addition to RADIUS authentication, [[Authentication: Cisco DUO | This service was setup to authenticate [[Network: Road Warrior VPN]] on [[Hardware:SAD-HME-FW01]] via RADIUS. In addition to RADIUS authentication, [[Authentication: Cisco DUO]] handles multi-factor authentication. These services run from [[Servers:SAD-AUTH01]] and [[Servers:SAD-DUO01]] to provide secure access to sysadminafterdark internal operations. | ||
== Deployment == | == Deployment == | ||
Line 24: | Line 24: | ||
The role is now installed on the server and can be accessed by clicking the start button and launching "Network Policy Server". After Network Policy Server is launched, proceed with configuring the RADIUS server: | The role is now installed on the server and can be accessed by clicking the start button and launching "Network Policy Server". After Network Policy Server is launched, proceed with configuring the RADIUS server: | ||
# On the left sidebar, right | # On the left sidebar, right click "RADIUS Clients", then click "new". | ||
# Give the connection a Friendly Name. For example, I am using "SAD-HME-FW01 Road Warrior VPN" | # Give the connection a Friendly Name. For example, I am using "SAD-HME-FW01 Road Warrior VPN" | ||
# Input the IP address of the firewall. For example, I am using "10.1.1.1 | # Input the IP address of the firewall. For example, I am using "10.1.30.1". | ||
## WARNING: If you utilize multiple VLANS, set the IP address to the gateway your RADIUS server utilizes! For example, if your RADIUS server is on VLAN 30 with a gateway IP address of 10.1.30.1, DO NOT use 10.1.1.1! | |||
# Click the Generate radio button, then click "Generate". Copy this password to your password manager for later use. | # Click the Generate radio button, then click "Generate". Copy this password to your password manager for later use. | ||
# Click OK. The RADIUS server will appear in the list of configured clients. | # Click OK. The RADIUS server will appear in the list of configured clients. | ||
# | # Under Policies, right click Network Policies then click New. | ||
# Enter the policy name to enable communication to your firewall. For example, I am using "Allow from Firewall" | |||
# Leave the "Type of network access server" at the default value of "Unspecified" and click Next. | |||
# On the "Specify Conditions" screen, Click Add. Then Click "User Groups". | |||
# On the "User Groups" window, click add groups, then type in the name of your Active Directory group that will be utilized to define authorized VPN users. For example, I am using [[Users and Groups: sg_roadwarrior_vpn_access]]. Be sure to add the appropriate users to your group in Active Directory. Once the group is added, click Ok, then Click Next. | |||
# On the "Specify Access Permission" window, select "Access Granted" then click Next. | |||
# On the "Configure Authentication Methods" window, select all of the "Less secure authentication methods" checkboxes, leaving the last one, "Allow clients to connect without negotiating an authentication method" unticked. Click Next. | |||
# On the "Configure Constraints" window, you may configure any time of constraints that suits your environment. For example, I set the Idle Timeout to 120 minutes, or two hours. Click Next. | |||
# On the "Configure Settings" window, click Next. | |||
# On the "Completing New Network Policy" window click Finish. | |||
== Firewall Configuration == | |||
Sysadminafterdark utilizes OPNsense which runs on [[Hardware: SAD-HME-FW01]]. The below steps were utilized to connect the RADIUS server we created and configured for authentication on this platform: | |||
# Open a web browser and navigate to your firewall. | |||
# On the firewall web UI, click System, then click Servers. | |||
# Give the connection a Descriptive Name. For example, I am using "Road Warrior VPN". | |||
# Type the IP Address of the Windows RADIUS server into "Hostname or IP Address". In my case, this is 10.1.30.7. | |||
# Paste in your pre-shared key to "Shared Secret". | |||
# From the "Services Offered" drop down, select "Authentication" | |||
# Keep the default 1812 value for "Authentication Port Value", unless you have changed it. | |||
# Navigate to System > Access > Tester. Input your domain username and password. A blue bar should appear stating the connection was successful. | |||
== Status == | |||
This setup guide has successfully been deploy to sysadminafterdark production. If you are following step by step to enable RADIUS authentication with a VPN solution, please continue following the procedure located at the page [[Network: Road Warrior VPN]] to configure the firewall. |
Latest revision as of 23:37, 19 May 2024
History
Authentication: Microsoft NPS, or Network Policy Server, allows you to create and enforce organization-wide network access policies for connection requests, authentication and authorization, including RADIUS authentication. Official Microsoft documentation can be found here.
This service was setup to authenticate Network: Road Warrior VPN on Hardware:SAD-HME-FW01 via RADIUS. In addition to RADIUS authentication, Authentication: Cisco DUO handles multi-factor authentication. These services run from Servers:SAD-AUTH01 and Servers:SAD-DUO01 to provide secure access to sysadminafterdark internal operations.
Deployment
The steps below were followed to attain a working Microsoft NPS server with RADIUS Authentication:
- Click the Start button and open Server Manager
- On the top right, click Manage, then click "Add Roles and Features"
- The Microsoft "Add Roles And Features Wizard" will open. Click Next to continue.
- On the installation type screen, proceed with a Role-based or feature-based installation.
- Click Next to proceed with the installation on the local server on the "Server Selection" screen. If you are using RSAT, you may need to select a different server, or add the server to the pool to proceed with management.
- On the "Select Server Roles" screen, click the check next to "Network Policy And Access Services". A new window will open asking to also install management tools. Click "Add Features". Then Click Next.
- Click Next on the "Features" screen.
- Click Next on the Network Policy and Access Services" screen.
- On the "Conformation" screen, click Install.
Configuration
The role is now installed on the server and can be accessed by clicking the start button and launching "Network Policy Server". After Network Policy Server is launched, proceed with configuring the RADIUS server:
- On the left sidebar, right click "RADIUS Clients", then click "new".
- Give the connection a Friendly Name. For example, I am using "SAD-HME-FW01 Road Warrior VPN"
- Input the IP address of the firewall. For example, I am using "10.1.30.1".
- WARNING: If you utilize multiple VLANS, set the IP address to the gateway your RADIUS server utilizes! For example, if your RADIUS server is on VLAN 30 with a gateway IP address of 10.1.30.1, DO NOT use 10.1.1.1!
- Click the Generate radio button, then click "Generate". Copy this password to your password manager for later use.
- Click OK. The RADIUS server will appear in the list of configured clients.
- Under Policies, right click Network Policies then click New.
- Enter the policy name to enable communication to your firewall. For example, I am using "Allow from Firewall"
- Leave the "Type of network access server" at the default value of "Unspecified" and click Next.
- On the "Specify Conditions" screen, Click Add. Then Click "User Groups".
- On the "User Groups" window, click add groups, then type in the name of your Active Directory group that will be utilized to define authorized VPN users. For example, I am using Users and Groups: sg_roadwarrior_vpn_access. Be sure to add the appropriate users to your group in Active Directory. Once the group is added, click Ok, then Click Next.
- On the "Specify Access Permission" window, select "Access Granted" then click Next.
- On the "Configure Authentication Methods" window, select all of the "Less secure authentication methods" checkboxes, leaving the last one, "Allow clients to connect without negotiating an authentication method" unticked. Click Next.
- On the "Configure Constraints" window, you may configure any time of constraints that suits your environment. For example, I set the Idle Timeout to 120 minutes, or two hours. Click Next.
- On the "Configure Settings" window, click Next.
- On the "Completing New Network Policy" window click Finish.
Firewall Configuration
Sysadminafterdark utilizes OPNsense which runs on Hardware: SAD-HME-FW01. The below steps were utilized to connect the RADIUS server we created and configured for authentication on this platform:
- Open a web browser and navigate to your firewall.
- On the firewall web UI, click System, then click Servers.
- Give the connection a Descriptive Name. For example, I am using "Road Warrior VPN".
- Type the IP Address of the Windows RADIUS server into "Hostname or IP Address". In my case, this is 10.1.30.7.
- Paste in your pre-shared key to "Shared Secret".
- From the "Services Offered" drop down, select "Authentication"
- Keep the default 1812 value for "Authentication Port Value", unless you have changed it.
- Navigate to System > Access > Tester. Input your domain username and password. A blue bar should appear stating the connection was successful.
Status
This setup guide has successfully been deploy to sysadminafterdark production. If you are following step by step to enable RADIUS authentication with a VPN solution, please continue following the procedure located at the page Network: Road Warrior VPN to configure the firewall.