{"id":751,"date":"2012-07-18T21:25:23","date_gmt":"2012-07-18T21:25:23","guid":{"rendered":"http:\/\/microsoftgeek.com\/?p=751"},"modified":"2012-07-18T21:25:23","modified_gmt":"2012-07-18T21:25:23","slug":"using-windows-2008-for-radius-authentication","status":"publish","type":"post","link":"https:\/\/microsoftgeek.com\/?p=751","title":{"rendered":"Using Windows 2008 For RADIUS Authentication"},"content":{"rendered":"<p>This will be a basic setup using Windows 2008 Server to allow RADIUS  and dot1x authentication. Steps for basic installation include:<\/p>\n<ol>\n<li>Rename the server<\/li>\n<li>Setting server as Domain Controller<\/li>\n<li>Installing Certificate Services<\/li>\n<li>Request Certificates (optional)<\/li>\n<li>Installing Network Policy Services (previously IAS)<\/li>\n<li>Creating Group Policies<\/li>\n<\/ol>\n<h2>Rename The Server<\/h2>\n<p>Something different about Windows 2008 Server is that the server name  is auto-generated and you are not given a chance during the install to  name the server so you must do <strong>before<\/strong> installing Active Directory or Certificate Services.<\/p>\n<p>In the \u201cInitial Configuration Tasks\u201d window, click the \u201cProvide computer name and domain\u201d link.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-01\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-01-e1273550001805.png\" alt=\"\" width=\"560\" height=\"318\" \/><\/p>\n<p>Enter a Computer description and click the \u201cChange\u2026\u201d button to change  the computer name. I\u2019ll be using WLAN-DC as my name and description.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-02\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-02-e1273550396390.png\" alt=\"\" width=\"355\" height=\"400\" \/><\/p>\n<p>Enter the Computer name and click \u201cOK\u201d and reboot when prompted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-03\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-03-e1273550576506.png\" alt=\"\" width=\"338\" height=\"400\" \/><\/p>\n<h2>Setting Server as a Domain Controller<\/h2>\n<p>For this example we setup a new forest for the wlan.net domain.  Server 2008 abstracts most server function into \u201cRoles\u201d so we\u2019ll be  adding the Active Directory Domain Services Role with the Server Manager  by clicking \u201cRoles\u201d and clicking \u201cAdd Roles.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-04\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-04-e1273550736123.png\" alt=\"\" width=\"560\" height=\"360\" \/><\/p>\n<p>Select the Active Directory Domain Services Role.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-05\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-05-e1273550836111.png\" alt=\"\" width=\"560\" height=\"422\" \/><\/p>\n<p>Click through the confirmation screens and click Install. You should  get see an installation progress screen and finally an \u201cinstallation  success\u201d message that asks you to run the command \u201cdcpromo.exe\u201d which  will configure your domain. So click the link to run \u201cdcpromo\u201d or click  the \u201cStart\u201d button, select \u201cRun\u201d and enter \u201cdcpromo.exe\u201d. You should now  see the \u201cActive Directory Domain Service\u201d install wizard. Click \u201cNext \u201c  to continue.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-06\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-06-e1273550931480.png\" alt=\"\" width=\"560\" height=\"527\" \/><\/p>\n<p>Choose \u201cCreate a new domain in a new forest\u201d and click \u201cNext\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-07\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-07-e1273551081300.png\" alt=\"\" width=\"560\" height=\"528\" \/><\/p>\n<p>For our example domain we\u2019ll use \u201cwlan.net\u201d. Click \u201cNext\u201d and it will check to see if the name is already used on the network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-08\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-08-e1273551187961.png\" alt=\"\" width=\"560\" height=\"528\" \/><\/p>\n<p>When asked to set which \u201cForest Functional Level\u201d I used the 2008 level.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-09\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-09-e1273551295282.png\" alt=\"\" width=\"560\" height=\"528\" \/><\/p>\n<p>The next screen you\u2019ll see is a warning that the DNS service isn\u2019t  install and will offer to install it for you. Just click \u201cNext\u201d to  accept and install.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-10\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-10-e1273551391688.png\" alt=\"\" width=\"560\" height=\"532\" \/><\/p>\n<p>It will display the following warning, just click \u201cYes\u201d to continue.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-11\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-11-e1273551509673.png\" alt=\"\" width=\"400\" height=\"223\" \/><\/p>\n<p>Just accept the defaults and click \u201cNext\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-12\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-12-e1273551594680.png\" alt=\"\" width=\"560\" height=\"527\" \/><\/p>\n<p>Now you\u2019ll be prompted to enter a \u201cDirectory Services Restore Mode Administrator Password\u201d. Enter a password and click \u201cNext\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-13\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-13-e1273551732382.png\" alt=\"\" width=\"560\" height=\"527\" \/><\/p>\n<p>Click \u201cNext\u201d at the Summary screen.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-14\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-14-e1273551808777.png\" alt=\"\" width=\"560\" height=\"527\" \/><\/p>\n<p>You\u2019ll now see the Installation Wizard install DNS and Active  Directory. Check the \u201cReboot on completion\u201d box and once the wizard  finishes it\u2019ll reboot and be ready for the next step.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-15\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-15-e1273551889342.png\" alt=\"\" width=\"400\" height=\"280\" \/><\/p>\n<h2>Installing Certificate Services<\/h2>\n<p>To enable PEAP or EAP-TLS we\u2019ll need to install Certificate Services  to enable a Certificate Authority (CA) to generate and sign certificates  for our domain. Again, add a Role via the Server Manager and select  \u201cActive Directory Certificate Services\u201d and click \u201cNext\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-16\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-16-e1273551982622.png\" alt=\"\" width=\"560\" height=\"419\" \/><\/p>\n<p>Click through the conformation screen and select \u201cCertification  Authority\u201d and \u201cCertificate Authority Web Enrollment\u201d which will tell  you that you\u2019ll need IIS to be installed to use the \u201cCertificate  Authority Web Enrollment\u201d. Click \u201cAdd Required Role Services\u201d and click  \u201cNext\u201d to continue.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-17\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-17-e1273552338764.png\" alt=\"\" width=\"560\" height=\"421\" \/><\/p>\n<p>When prompted for which type of Certificate Authority to install, choose \u201cEnterprise\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-18\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-18-e1273552439838.png\" alt=\"\" width=\"560\" height=\"420\" \/><\/p>\n<p>When prompted for CA Type, select \u201cRoot CA\u201d and click \u201cNext\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-19\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-19-e1273552638914.png\" alt=\"\" width=\"560\" height=\"421\" \/><\/p>\n<p>When prompted to Set Up Private Key select \u201cCreate a new private key\u201d and click \u201cNext\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-20\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-20-e1273552718718.png\" alt=\"\" width=\"560\" height=\"420\" \/><\/p>\n<p>When prompted to Configure Cryptography for CA, accept the defaults and click \u201cNext\u201d for the rest of the conformation screens.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-21\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-21-e1273552924303.png\" alt=\"\" width=\"560\" height=\"420\" \/><\/p>\n<h2>Request Certificates (optional)<\/h2>\n<p>Now that we have our Certificate Authority (CA) up and running we may  want to request a certificate for our Authentication Server.<\/p>\n<p>We\u2019ll create a Microsoft Management Console (MMC) that will allow us  to request and install the certificate for our server. Press the \u201cStart\u201d  button and enter \u201cMMC\u201d in the command field to open the MMC. Next we\u2019ll  add the Certificate (For Local Computer) snap-in by clicking \u201cFile\u201d and  choosing \u201cAdd\/Remove Snap-in\u201d. Select \u201cCertificates\u201d and click \u201cAdd\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-22\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-22-e1273553004769.png\" alt=\"\" width=\"560\" height=\"388\" \/><\/p>\n<p>Now be sure to select \u201cComputer Account\u201d and click \u201cNext\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-23\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-23-e1273553072299.png\" alt=\"\" width=\"560\" height=\"407\" \/><\/p>\n<p>Choose \u201cLocal Computer\u201d, click \u201cFinish\u201d and \u201cOK\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-24\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-24-e1273553151562.png\" alt=\"\" width=\"560\" height=\"405\" \/><\/p>\n<p><strong>TIP:<\/strong> While you\u2019re here you might as well add the  \u201cCertificate Authority\u201d snap-in and save this MMC to your desktop  because you\u2019ll need it again in the future.<\/p>\n<p>To request a certificate for your server (if you don\u2019t want to use  the default certificate) expand \u201cCertificates (Local Computer Account)\u201d,  \u201cPersonal\u201d, and right-click \u201cCertificates\u201d and select \u201cAll Tasks\u201d,  \u201cRequest New Certificate\u2026\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-25\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-25-e1273553218986.png\" alt=\"\" width=\"560\" height=\"391\" \/><\/p>\n<p>Click through the Enrollment screens choosing the settings you desire for your certificate.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-26\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-26-e1273553298197.png\" alt=\"\" width=\"560\" height=\"390\" \/><\/p>\n<h2>Installing Network Policy and Access Services<\/h2>\n<p>In Windows 2008 Server you can no longer just install the Internet  Authentication Service (IAS) and have RADIUS functionality. You must now  install Network Policy and Access Services, which now include  everything from earlier versions of Windows server such as  RRAS\/IAS\/etc,\u2026 but now includes NAP (think NAC for Windows). We will be  installing and configuring just enough to enable PEAP and RADIUS  functionality with our Aruba controller. So once again head to the  Server Manager and \u201cAdd a Role\u201d selecting \u201cNetwork Policy and Access  Services\u201d and click through the confirmation screen.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-27\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-27-e1273553366805.png\" alt=\"\" width=\"560\" height=\"421\" \/><\/p>\n<p>Select \u201cNetwork Policy Server\u201d, \u201cRouting and Remote Access Services\u201d,  \u201cRemote Access Service\u201d and \u201cRouting\u201d. Click \u201cNext\u201d, click through the  confirmation screen and click \u201cInstall\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-28\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-28-e1273553424312.png\" alt=\"\" width=\"560\" height=\"420\" \/><\/p>\n<p>Installation will take a couple of minutes and present you with an install summery. Just click \u201cClose\u201d.<\/p>\n<p>Now that NPS is installed, press the \u201cStart\u201d button and enter  \u201cnps.msc\u201d in the command field. The NPS MMC should open up allowing you  to select the \u201cRADIUS server for 802.1X Wireless or Wired Connections\u201d  Installation Wizard from the \u201cStandard Configuration\u201d pull-down menu and  click \u201cConfigure 802.1X\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-29\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-29-e1273553502661.png\" alt=\"\" width=\"560\" height=\"398\" \/><\/p>\n<p>From the \u201cSelect 802.1X Connections Type\u201d page, select \u201cSecure Wireless Connections\u201d and click \u201cNext\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-30\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-30-e1273553571847.png\" alt=\"\" width=\"560\" height=\"555\" \/><\/p>\n<p>From the \u201cSpecify 802.1X Switches\u201d screen click \u201cAdd\u2026\u201d and enter the settings for your Aruba controller and press \u201cOK\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-31\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-31-e1273553731450.png\" alt=\"\" width=\"560\" height=\"557\" \/><\/p>\n<p>For the \u201cConfigure an Authentication Method\u201d screen select \u201cMicrosoft  Smart Card or other certificate\u201d for EAP-TLS or \u201cMicrosoft Protected  EAP (PEAP)\u201d for PEAP. I will be selecting PEAP for this example and  click \u201cConfigure\u2026\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-32\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-32-e1273553815793.png\" alt=\"\" width=\"560\" height=\"556\" \/><\/p>\n<p>Select the appropriate certificate to use for this server. In this  case we\u2019ll use the \u201cWLAN-DC.wlan.net\u201d certificate and click \u201cOK\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-33\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-33-e1273553876894.png\" alt=\"\" width=\"560\" height=\"493\" \/><\/p>\n<p>For the \u201cSpecify User Groups\u201d screen select the users and\/or groups  you would like to allow wireless access. For this example I am allowing  all of my domain users by selecting the \u201cDomain Users\u201d group. If I want  to enforce Machine Authentication I need to add the \u201cDomain Computers\u201d  group as well as checking the \u201cEnforce Machine Auth\u201d option in the dot1x  policy on my Aruba controller. Click \u201cNext\u201d to continue.<\/p>\n<p><strong>Note:<\/strong> Groups listed here are considered as an OR statement.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-34\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-34-e1273553940221.png\" alt=\"\" width=\"560\" height=\"554\" \/><\/p>\n<p>For the next screen you can click \u201cNext\u201d and \u201cFinish\u201d or click  \u201cConfigure\u2026\u201d to add RADIUS attributes for Server Derivation rules.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-35\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-35-e1273554032284.png\" alt=\"\" width=\"560\" height=\"558\" \/><\/p>\n<p>For example, you may want to map the \u201cDomain Users\u201d to the  \u201cemployee_role\u201d on your Aruba controller. You could do that here with  the \u201cFilter-Id\u201d attribute.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"nps-36\" src=\"http:\/\/www.fatofthelan.com\/wp-content\/uploads\/2010\/04\/nps-36-e1273554098898.png\" alt=\"\" width=\"560\" height=\"538\" \/><\/p>\n<p><strong>Note:<\/strong> There seems to be a bug in Windows if you mess  with these attributes too much the \u201cFilter-Id\u201d attribute vanishes. If  this happens cancel out of the wizard and start over.<\/p>\n<p>Press \u201cNext\u201d and \u201cFinish\u201d to complete the wizard. This should now  allow you to authenticate users against your Windows 2008 Server.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This will be a basic setup using Windows 2008 Server to allow RADIUS and dot1x authentication. Steps for basic installation include: Rename the server Setting server as Domain Controller Installing Certificate Services Request Certificates (optional) Installing Network Policy Services (previously IAS) Creating Group Policies Rename The Server Something different about Windows 2008 Server is that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-751","post","type-post","status-publish","format-standard","hentry","category-general-2008"],"_links":{"self":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=751"}],"version-history":[{"count":2,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/751\/revisions"}],"predecessor-version":[{"id":753,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/751\/revisions\/753"}],"wp:attachment":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}