authenticate Cisco devices against AD via Freeradius

aquilinux aquilinux at gmail.com
Wed Sep 21 17:11:24 CEST 2016


nevermind.... got it working.
i had commented out some useful entries in "user" file.
thanks!

On Wed, Sep 21, 2016 at 5:07 PM, aquilinux <aquilinux at gmail.com> wrote:

> Thanks for your reply Alan, it was trivial...
> btw even if radius server answers with a Access-Accept the NAS is
> rejecting with "authorization failed".
>
> From Radius
> Ready to process requests
> (0) Received Access-Request Id 73 from 192.168.105.222:1812 to
> 172.20.2.199:1812 length 80
> (0)   NAS-IP-Address = 192.168.105.222
> (0)   NAS-Port = 1
> (0)   NAS-Port-Type = Virtual
> (0)   User-Name = "testrad"
> (0)   Calling-Station-Id = "172.20.17.151"
> (0)   User-Password = "testrad123"
> (0) # Executing section authorize from file /usr/etc/raddb/sites-enabled/
> vr-test-netdev
> (0)   authorize {
> (0)     policy filter_username {
> (0)       if (&User-Name) {
> (0)       if (&User-Name)  -> TRUE
> (0)       if (&User-Name)  {
> (0)         if (&User-Name =~ / /) {
> (0)         if (&User-Name =~ / /)  -> FALSE
> (0)         if (&User-Name =~ /@[^@]*@/ ) {
> (0)         if (&User-Name =~ /@[^@]*@/ )  -> FALSE
> (0)         if (&User-Name =~ /\.\./ ) {
> (0)         if (&User-Name =~ /\.\./ )  -> FALSE
> (0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))  {
> (0)         if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))
> -> FALSE
> (0)         if (&User-Name =~ /\.$/)  {
> (0)         if (&User-Name =~ /\.$/)   -> FALSE
> (0)         if (&User-Name =~ /@\./)  {
> (0)         if (&User-Name =~ /@\./)   -> FALSE
> (0)       } # if (&User-Name)  = notfound
> (0)     } # policy filter_username = notfound
> (0)     [preprocess] = ok
> (0) auth_log: EXPAND /usr/var/log/radius/radacct/%{
> %{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d
> (0) auth_log:    --> /usr/var/log/radius/radacct/19
> 2.168.105.222/auth-detail-20160921
> (0) auth_log: /usr/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{
> Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d expands to
> /usr/var/log/radius/radacct/192.168.105.222/auth-detail-20160921
> (0) auth_log: EXPAND %t
> (0) auth_log:    --> Wed Sep 21 17:04:02 2016
> (0)     [auth_log] = ok
> (0) ntlm_auth: Executing: /usr/bin/ntlm_auth --request-nt-key
> --domain=EA-MILANO --username=%{mschap:User-Name}
> --password=%{User-Password} --require-membership-of=S-1-5-
> 21-486643733-1688716086-2075228900-512:
> (0) ntlm_auth: EXPAND --username=%{mschap:User-Name}
> (0) ntlm_auth:    --> --username=testrad
> (0) ntlm_auth: EXPAND --password=%{User-Password}
> (0) ntlm_auth:    --> --password=testrad123
> (0) ntlm_auth: Program returned code (0) and output 'NT_STATUS_OK: Success
> (0x0)'
> (0) ntlm_auth: Program executed successfully
> (0)     [ntlm_auth] = ok
> (0)     if (ok) {
> (0)     if (ok)  -> TRUE
> (0)     if (ok)  {
> (0)       update control {
> (0)         Auth-Type := Accept
> (0)       } # update control = noop
> (0)     } # if (ok)  = noop
> (0)     [files] = noop
> (0)     [unix] = notfound
> (0)     return
> (0)   } # authorize = ok
> (0) Found Auth-Type = Accept
> (0) Auth-Type = Accept, accepting the user
> (0) # Executing section post-auth from file /usr/etc/raddb/sites-enabled/
> vr-test-netdev
> (0)   post-auth {
> (0)     update {
> (0)       No attributes updated
> (0)     } # update = noop
> (0)     [exec] = noop
> (0)   } # post-auth = noop
> (0) Sent Access-Accept Id 73 from 172.20.2.199:1812 to
> 192.168.105.222:1812 length 0
> (0) Finished request
> Waking up in 4.9 seconds.
> (0) Cleaning up request packet ID 73 with timestamp +12
> Ready to process requests
>
> From Cisco 2950:
> Username: testrad
> Password:
> % Authorization failed.
> Connection closed by foreign host.
>
> thanks.
>
> On Wed, Sep 21, 2016 at 3:04 PM, Alan DeKok <aland at deployingradius.com>
> wrote:
>
>> On Sep 21, 2016, at 5:08 AM, aquilinux <aquilinux at gmail.com> wrote:
>> >
>> > Hi all, i currently use my radius server (3.0.11) to do things such
>> > EAP-TTLS, MSCHAPv2, CHAP in order to authenticate different users on
>> > devices/machines/etc...
>> > I managed to configure a virtual router for doing PAP against local
>> USERS
>> > (in users file) following a guide about IOS+Freeradius. Works perfectly.
>> > What i'd like to do now is to authenticate users from the Cisco IOS
>> device
>> > against AD (via ldap, mschap or whatever). The device i'm using only
>> > support PAP.
>> > The radius server is joined to the AD domain, getent passwd retrives all
>> > the AD users.
>> > Is it possible? (i know, i have a lot of imagination :-))
>>
>> http://deployingradius.com/documents/configuration/active_directory.html
>>
>>   Alan DeKok.
>>
>> -
>> List info/subscribe/unsubscribe? See http://www.freeradius.org/list
>> /users.html
>
>
>
>
> --
> "Madness, like small fish, runs in hosts, in vast numbers of instances."
>
> Nessuno mi pettina bene come il vento.
>



-- 
"Madness, like small fish, runs in hosts, in vast numbers of instances."

Nessuno mi pettina bene come il vento.


More information about the Freeradius-Users mailing list