Cisco AAA with RADIUS against Active Directory through the NPS role in Windows Server 2012 R2

Поделиться
HTML-код
  • Опубликовано: 15 сен 2024
  • In this video I demonstrate setting up Active Directory authentication for a Cisco router IOS. This will be using AAA and RADIUS through the Network Policy Server (NPS) role in Windows Server 2012 R2 to authenticate users in Active Directory on Cisco IOS devices.

Комментарии • 32

  • @mattr5664
    @mattr5664 5 лет назад +3

    oh man you are a life saver. I was only getting it partly working with a bunch of other walkthroughs. Yours worked right off the bat. Thank you!
    Windows Server 2016 - C9300 on 16.8.1a

  • @carlmarkley3817
    @carlmarkley3817 Год назад

    Outstanding, I had all the right pieces in place but they were not lined up correctly on my Server 2019 and Cisco Catalysis 9300. All set now, thanks for putting this out there.

  • @jhilling
    @jhilling 4 года назад +4

    How are you making this work using MS-CHAP? My previous setup on 2012 required me to use "Unencrypted authentication (PAP, SPAP).

    • @Lonje
      @Lonje 2 года назад +2

      i am also interested to know

  • @xbyrxlyr
    @xbyrxlyr 2 года назад +1

    Great video, but the splash screen at the end made me shard a little.

  • @DishantPandya
    @DishantPandya 7 лет назад +4

    I configured everything exactly as shown in here but still there's a problem authenticating.

    • @Chris-Christopher-
      @Chris-Christopher- 3 года назад

      @Nehemiah Brayan, when tried it I got a virus and my entire family got cancer. My kids are dead because of instaportal. Do not use instaportal.

  • @bsiko1
    @bsiko1 4 года назад

    Thank you so much it's worked for me

  • @carlosarjonaquijano2791
    @carlosarjonaquijano2791 4 месяца назад

    To connect a user through the wireless network, what type of radius authentication must the switch have?

  • @mdhumayun
    @mdhumayun 6 лет назад +5

    It is working if I unchecked all button except Unencrypted authentication (PAP, SPAP) on Authentication Methods under Network policies :)

    • @tusredesti9017
      @tusredesti9017 5 лет назад

      Same here, i do a equal action.

    • @jonbiong
      @jonbiong 5 лет назад

      Thanks, this solved it.

    • @trancechannel6633
      @trancechannel6633 4 года назад

      Which part bro in this video

    • @saadabdulla9934
      @saadabdulla9934 3 года назад

      Solved my issue, thanks.

    • @Lonje
      @Lonje 2 года назад

      mine too. i wonder how he made it work using the other authentication protocols.

  • @KrishnaHurree
    @KrishnaHurree 26 дней назад

    No need to define authen and authoriz commands under the line vty 0-4?

  • @andresparamo6734
    @andresparamo6734 2 года назад +1

    Has anyone configured a cisco switch with radius from DUO using their auth proxy? Would the cisco side of this tutorial be the same?

  • @martynjones973
    @martynjones973 2 года назад

    Great video thank you, do you have one on Cisco ICE 👍👍👍

  • @jozamaymen
    @jozamaymen 4 года назад

    don't forget to use (BAP percentage of capacity), sometime the radius won't work without it.

  • @networklabs1
    @networklabs1 4 года назад

    Nice video mate

  • @fredh3603
    @fredh3603 7 лет назад

    Hi, thanks for the tutorial. I tested this with a Windows Server 2012R2, which is currently also being used as our MAB-server. My iOS device is an old Cisco1721 using iOS 12.4(25d).
    I am sitting in an AD-forest and assume my testingdevice is too old. I wonder if the command "domain-stripping" could add the domain automatically to the username.
    Can you confirm this thought?
    _____
    Oh, also I'm not sure if you mentioned, but the local account is only being used when the Cisco IOS device cannot pass the authentication to the radius OR the radius cannot pass it to the active direcotry.

  • @badisdolor8456
    @badisdolor8456 3 года назад

    just for the nps server ?? how can i add one in my lab ?

  • @andresparamo6734
    @andresparamo6734 2 года назад

    Great tutorial! Quick question for you for anyone that might know. Do you know if after enabling aaa for authentication is the option still available to login with the local credentials that were created on the router/switch?

    • @jaysonpatricio
      @jaysonpatricio 2 года назад

      got same question when radius server is down, local credential should work but he did not mention it here

  • @BurninBosmer
    @BurninBosmer 6 лет назад

    Is it possible to then limit who can log into the router, such as only a certain group in AD/LDAP?

  • @jaysonpatricio
    @jaysonpatricio 2 года назад

    how about the failover if the NPS(radius is down) the local admin should work right?

  • @anasa.ghannam9302
    @anasa.ghannam9302 5 месяцев назад

    it doesn't work mate, the syslog said: invalid_group_handle , anyone can help please))

  • @jugsonmunganga891
    @jugsonmunganga891 4 года назад

    the acouch-adm account comes from where ?????

    • @dbacky
      @dbacky 4 года назад +1

      That is the user (Adam Couch, acouch-adm@BTSLAB.COM) that is added to the Network Admins security group at the 2:32 mark in the video.

  • @luileliomatsenguane440
    @luileliomatsenguane440 6 лет назад

    Hi, where do you defined acouch-adm?

    • @dbacky
      @dbacky 4 года назад

      That is the user (Adam Couch, acouch-adm@BTSLAB.COM) that is added to the Network Admins security group at the 2:32 mark in the video.