More actions
No edit summary |
No edit summary |
||
Line 29: | Line 29: | ||
# Click the Generate radio button, then click "Generate". Copy this password to your password manager for later use. | # Click the Generate radio button, then click "Generate". Copy this password to your password manager for later use. | ||
# Click OK. The RADIUS server will appear in the list of configured clients. | # Click OK. The RADIUS server will appear in the list of configured clients. | ||
# | # Under Policies, right click Network Policies then click New. | ||
# Enter the policy name to enable communication to your firewall. For example, I am using "Allow from Firewall" | |||
# Leave the "Type of network access server" at the default value of "Unspecified" and click Next. | |||
# On the "Specify Conditions" screen, Click Add. Then Click "User Groups". | |||
# On the "User Groups" window, click add groups, then type in the name of your Active Directory group that will be utilized to define authorized VPN users. For example, I am using [[Users and Groups: sg_roadwarrior_vpn_access]]. Once the group is added, click Ok. |
Revision as of 01:38, 18 May 2024
History
Authentication: Microsoft NPS, or Network Policy Server, allows you to create and enforce organization-wide network access policies for connection requests, authentication and authorization, including RADIUS authentication. Official Microsoft documentation can be found here.
This service was setup to authenticate Network: Road Warrior VPN on Hardware:SAD-HME-FW01 via RADIUS. In addition to RADIUS authentication, Authentication: Cisco DUO Application Proxy handles multi-factor authentication. These services run from Servers:SAD-AUTH01 and provide secure access to sysadminafterdark internal operations.
Deployment
The steps below were followed to attain a working Microsoft NPS server with RADIUS Authentication:
- Click the Start button and open Server Manager
- On the top right, click Manage, then click "Add Roles and Features"
- The Microsoft "Add Roles And Features Wizard" will open. Click Next to continue.
- On the installation type screen, proceed with a Role-based or feature-based installation.
- Click Next to proceed with the installation on the local server on the "Server Selection" screen. If you are using RSAT, you may need to select a different server, or add the server to the pool to proceed with management.
- On the "Select Server Roles" screen, click the check next to "Network Policy And Access Services". A new window will open asking to also install management tools. Click "Add Features". Then Click Next.
- Click Next on the "Features" screen.
- Click Next on the Network Policy and Access Services" screen.
- On the "Conformation" screen, click Install.
Configuration
The role is now installed on the server and can be accessed by clicking the start button and launching "Network Policy Server". After Network Policy Server is launched, proceed with configuring the RADIUS server:
- On the left sidebar, right clcik "RADIUS Clients", then click "new".
- Give the connection a Friendly Name. For example, I am using "SAD-HME-FW01 Road Warrior VPN"
- Input the IP address of the firewall. For example, I am using "10.1.1.1".
- Click the Generate radio button, then click "Generate". Copy this password to your password manager for later use.
- Click OK. The RADIUS server will appear in the list of configured clients.
- Under Policies, right click Network Policies then click New.
- Enter the policy name to enable communication to your firewall. For example, I am using "Allow from Firewall"
- Leave the "Type of network access server" at the default value of "Unspecified" and click Next.
- On the "Specify Conditions" screen, Click Add. Then Click "User Groups".
- On the "User Groups" window, click add groups, then type in the name of your Active Directory group that will be utilized to define authorized VPN users. For example, I am using Users and Groups: sg_roadwarrior_vpn_access. Once the group is added, click Ok.