<HTML xmlns="http://www.w3.org/TR/REC-html40" xmlns:v = "urn:schemas-microsoft-com:vml" xmlns:o = "urn:schemas-microsoft-com:office:office" xmlns:w = "urn:schemas-microsoft-com:office:word" xmlns:st1 = "urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META content="text/html; charset=iso-8859-15" http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 8.00.7600.16671">
<STYLE>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</STYLE>
<o:SmartTagType name="PersonName" namespaceuri="urn:schemas-microsoft-com:office:smarttags"></o:SmartTagType>
<STYLE>
st1\:*{behavior:url(#default#ieooui) }
</STYLE>
<STYLE>
<!--
/* Font Definitions */
@font-face
{font-family:Tahoma;
panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
{font-family:"Segoe UI";
panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman";
mso-believe-normal-left:yes;}
a:link, span.MsoHyperlink
{color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{color:blue;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-reply;
color:black;}
@page Section1
{size:8.5in 11.0in;
margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
{page:Section1;}
-->
</STYLE>
</HEAD>
<BODY style="MARGIN: 4px 4px 1px; FONT: 10pt Segoe UI" lang=EN-US link=blue vLink=blue>
<DIV>Yep, simple auth should be no problem, I was referring to pushing the authorization out to the switch. So for us, we login and are automatically at the enable level we defined in TACACS. When I was researching this, I believe it said you could get all the same stuff with Radius, the only real difference is that TACACS encrypts more of the authentication requests then Radius and does better accounting. Of course it only really works on Cisco which is a major draw back.</DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV>
<DIV>Brett Littrell</DIV>
<DIV>Network Manager</DIV>
<DIV>MUSD</DIV>
<DIV>CISSP, CCSP, CCVP, MCNE</DIV><BR><BR>>>> On Wednesday, February 09, 2011 at 8:11 AM, in message <9938_1297267879_4D52BCA7_9938_10000_2_D9B37353831173459FDAA836D3B43499AF0FA72D@WADPMBXV0.waddell.com>, Gary Gatten <Ggatten@waddell.com> wrote:<BR></DIV>
<TABLE style="MARGIN: 0px 0px 0px 15px; FONT-SIZE: 1em" border=0 bgColor=#f3f3f3>
<TBODY>
<TR>
<TD>
<DIV style="BORDER-LEFT: #050505 1px solid; PADDING-LEFT: 7px">
<DIV class=Section1>
<P class=MsoNormal><FONT color=black size=3 face="Times New Roman"><SPAN style="COLOR: black; FONT-SIZE: 12pt">Authentication with ntlm-auth and "require-membership-of" works well for us. Right now we simply authenticate the login/vty session with AD, and the secret is "authorized" locally by the switch. So, each person gets the vty session with their own unique credentials validated via ntlm-auth and AD. Everyone knows the secret password. Works well. On our "dev" FR instance I have an FR users file to return various Cisco attribute-value pairs. This works well too. Somewhere down the road I'll go for a full authorization process with AD on the back side, or since a relatively small number of users access our gear, might just stick to users file. Guess it depends how skilled I get with LDAP/AD/unlang/whatever else.<o:p></o:p></SPAN></FONT></P>
<P class=MsoNormal><FONT color=black size=3 face="Times New Roman"><SPAN style="COLOR: black; FONT-SIZE: 12pt">G<o:p></o:p></SPAN></FONT></P>
<P class=MsoNormal><FONT color=black size=3 face="Times New Roman"><SPAN style="COLOR: black; FONT-SIZE: 12pt"><o:p> </o:p></SPAN></FONT></P>
<P class=MsoNormal><FONT color=black size=3 face="Times New Roman"><SPAN style="COLOR: black; FONT-SIZE: 12pt"><o:p> </o:p></SPAN></FONT></P>
<DIV>
<DIV style="TEXT-ALIGN: center; MARGIN: 0in 0in 0pt" class=MsoNormal align=center><FONT size=3 face="Times New Roman"><SPAN style="FONT-SIZE: 12pt">
<HR tabIndex=-1 align=center SIZE=2 width="100%">
</SPAN></FONT></DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><B><FONT size=2 face=Tahoma><SPAN style="FONT-FAMILY: Tahoma; FONT-SIZE: 10pt; FONT-WEIGHT: bold">From:</SPAN></FONT></B><FONT size=2 face=Tahoma><SPAN style="FONT-FAMILY: Tahoma; FONT-SIZE: 10pt"> freeradius-users-bounces+ggatten=waddell.com@lists.freeradius.org [mailto:freeradius-users-bounces+ggatten=waddell.com@lists.freeradius.org] <B><SPAN style="FONT-WEIGHT: bold">On Behalf Of </SPAN></B>Brett Littrell<BR><B><SPAN style="FONT-WEIGHT: bold">Sent:</SPAN></B> Wednesday, February 09, 2011 9:57 AM<BR><B><SPAN style="FONT-WEIGHT: bold">To:</SPAN></B> <st1:PersonName w:st="on">FreeRadius users mailing list</st1:PersonName><BR><B><SPAN style="FONT-WEIGHT: bold">Subject:</SPAN></B> Re: Authenticating SSH login on a Cisco IOS switch to AD</SPAN></FONT><o:p></o:p></P></DIV>
<P class=MsoNormal><FONT size=3 face="Times New Roman"><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></FONT></P>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt">Hi Chris,<o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"> <o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"> We use TACACS+ to administer our switches here and I can tell you that I had to add extra stuff to the TACACS replies to allow authorization to manage the switches. So you may be able to login via radius but somewhere you are going to have to send information to the switch on what authorization is given per user. This means that your going to have to have AD respond with this information or have some other method that will inject those values when you login.<o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"> <o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"> I think it is possible but I do not think it will be to easy if you are only using AD as the back-end, you may need to use local files to define groups with attributes or some scripts to inject the values Cisco wants.<o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"> <o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt">Hope that helps.<o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"> <o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"> <o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"> <o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt">Brett Littrell<o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt">Network Manager<o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt">MUSD<o:p></o:p></SPAN></FONT></P></DIV>
<DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt">CISSP, CCSP, CCVP, MCNE<o:p></o:p></SPAN></FONT></P></DIV>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=2 face="Segoe UI"><SPAN style="FONT-FAMILY: 'Segoe UI'; FONT-SIZE: 10pt"><BR><BR>>>> On Wednesday, February 09, 2011 at 7:24 AM, in message <604AAF035805AB46B4F293945AE8F9FC182FEB879C@pzex01-07>, "Schaatsbergen, Chris" <Chris.Schaatsbergen@aleo-solar.de> wrote:<o:p></o:p></SPAN></FONT></P></DIV>
<TABLE style="BACKGROUND: #f3f3f3; MARGIN-LEFT: 12.55pt" class=MsoNormalTable border=0 cellPadding=0 bgColor=#f3f3f3>
<TBODY>
<TR>
<TD style="PADDING-BOTTOM: 0.75pt; PADDING-LEFT: 0.75pt; PADDING-RIGHT: 0.75pt; PADDING-TOP: 0.75pt">
<DIV style="BORDER-BOTTOM: medium none; BORDER-LEFT: #050505 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 6pt; PADDING-RIGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-TOP: 0in">
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=3 face="Times New Roman"><SPAN style="FONT-SIZE: 12pt">Greetings all,<BR><BR>We have a couple of Cisco switches that we administer using SSH sessions. Now I have been asked if we can authenticate the SSH login on our Windows 2008 Active Directory using our Freeradius (2.1.10) installation.<BR><BR>I have been looking and found:<BR><A href="http://wiki.freeradius.org/Cisco">http://wiki.freeradius.org/Cisco</A><BR>for authenticating inbound shell users and <BR><A href="http://deployingradius.com/documents/configuration/active_directory.html">http://deployingradius.com/documents/configuration/active_directory.html</A><BR>for authenticating users on AD.<BR><BR>Now I am trying to combine those two. <BR><BR>On the Freeradius server Samba and Kerberos are configured, the ntlm_auth returns an NT_STATUS_OK.<BR><BR>First question: Would this at all be possible?<BR><BR>And if so my second question: Unfortunately, when I add ntlm_auth to the authenticate section of sites-enabled/default and run freeradius -X I get an error that the ntlm_auth module could not be loaded though I have created the ntlm_auth file in the modules folder as described in the link. How should I get that to work?<BR><BR>Help would be highly appreciated.<BR><BR>Chris Schaatsbergen<BR><BR>-<BR>List info/subscribe/unsubscribe? See <A href="http://www.freeradius.org/list/users.html">http://www.freeradius.org/list/users.html</A><o:p></o:p></SPAN></FONT></P></DIV></TD></TR></TBODY></TABLE>
<P style="MARGIN: 0in 0in 0pt" class=MsoNormal><FONT size=3 face="Times New Roman"><SPAN style="FONT-SIZE: 12pt"><o:p> </o:p></SPAN></FONT></P></DIV><FONT size=1>
<DIV style="BORDER-BOTTOM: windowtext 2.25pt double; BORDER-LEFT: medium none; PADDING-BOTTOM: 1pt; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: medium none; BORDER-RIGHT: medium none; PADDING-TOP: 0in"></DIV>"This email is intended to be reviewed by only the intended recipient and may contain information that is privileged and/or confidential. If you are not the intended recipient, you are hereby notified that any review, use, dissemination, disclosure or copying of this email and its attachments, if any, is strictly prohibited. If you have received this email in error, please immediately notify the sender by return email and delete this email from your system." </FONT></DIV></TD></TR></TBODY></TABLE></BODY></HTML>