Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption



Similar documents
A practical guide to Eduroam

The example in this Note uses Linux for both the access controller (RADIUS server) and the supplicant (client).

Security Backbone Configuration

Joint Research Activity 5 Task Force Mobility

Recommended Security System for wireless networks Implementation of IEEE 802.1X Best Practice Document

Wireless Alphabet. Soup CHAP WPA(2) 802.1x RADIUS TKIP AES i CBC-MAC EAP TSN WPA(1) EAPOL PEAP WEP PAP RSN CCMP

FreeRADIUS Database Connection Best Practice Document

Cisco on Cisco Best Practices Cisco Wireless LAN Design

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Network Startup Resource Center

Wireless Network Configuration Guide

CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA. Switch S1 S1#sh ru Building configuration...

Lab Configuring Syslog and NTP (Instructor Version)

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

How to connect to the diamonds wireless network with Vista.

FreeRADIUS server. Defining clients Access Points and RADIUS servers

CS3695/M6-109 Lab 8-NPS02 VOIP Sniffing Ver. 8 Rev. 0

Administration Guide Integrating Novell edirectory with FreeRADIUS 1.1 January 02, 2011

How To Test An Eap Test On A Network With A Testnet (Networking) On A Pc Or Mac Or Ipnet (For A Network) On An Ipnet Or Ipro (For An Ipro) On Pc Or Ipo

Brest. Backup : copy flash:ppe_brest1 running-config

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Management Authentication using Windows IAS as a Radius Server

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Case Study - Configuration between NXC2500 and LDAP Server

Configure WorkGroup Bridge on the WAP131 Access Point

How To Configure A Cisco Router With A Cio Router

Switch Configuration Required to Support Cisco ISE Functions

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net (Net 2) On A Gmaalto.Com Web Server

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

Lab Configure Local AAA on Cisco Router

Simple MPLS network topology for Dynamips/Olive

CruzNet Secure Set-Up Instructions for Windows Vista

Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone

802.1X Port Based Authentication HOWTO

ClickShare Network Integration

WIRELESS SETUP FOR WINDOWS 7

Lab Configure Basic AP Security through IOS CLI

SURFnet. Supplicant. Gast Employee. Commercial VLAN VLAN. Student. Proxy server VLAN

Wi- Fi settings for Windows XP

RWL Tech Note Wireless 802.1x Authentication with Windows NPS

vwlan External RADIUS 802.1x Authentication

Lab 5.3.9b Managing Router Configuration Files Using TFTP

Deploying the BIG-IP System v11 with RADIUS Servers

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents

LAN-Cell to Cisco Tunneling

Configuring the Cisco Secure PIX Firewall with a Single Intern

Remote Access VPN Business Scenarios

Wireless Security Architecture for Campus Network

Windows PEAP-GTC Supplicant Plug-In

The back story of our Wireless (reading will help you understand what is going on in the building):

How to Access Coast Wi-Fi

Using Windows NPS as RADIUS in eduroam

Introduction to Cisco router configuration

Supporting Document LNS Configuration

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. October

Configuring RADIUS Servers

Lab Configure Syslog on AP

Network Security and AAA

Configuring Sponsor Authentication

Configuring Eduroam on Microsoft Windows Vista and 7 (all editions, 32 and 64 bits)

Configuring a Windows 2003 Server for IAS

Configuring Eduroam in Windows Vista

IPSec. User Guide Rev 2.2

APNIC Members Training Course Security workshop. 2-4 July, Port Vila Vanuatu. In conjunction with PACNOG 4

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE. RADIUS installation and configuration

Application Note. Onsight Device Certificate Management

How To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro

Abstract. Avaya Solution & Interoperability Test Lab

Connecting to Secure Wireless (iitk-sec) on Fedora

Manual Configuration Instructions

Chapter 3 Authenticating Users

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Simple Installation of freeradius

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR

netld External Authentication Setup Guide

Configure Allied Telesis and Cisco routers to interoperate over L2TP

Chapter 5 - Basic Authentication Methods

Configuring Single Sign-on for WebVPN

Belnet Networking Conference 2013

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

Network Services One Washington Square, San Jose, CA

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

User Guide for eduroam

Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram

Product Summary RADIUS Servers

Instructions for accessing the new TU wireless Network

GPC JagTalk Secure Wireless Network. Connection Instructions

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

Eduroam wireless network Windows Vista

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7

Transcription:

Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption Ivan Klimek Computer Networks Laboratory Technical University Kosice, Slovakia http://www.cnl.tuke.sk

1. Introduction This document describes the configuration steps needed to set up and use 802.1X: Port-Based Network Access Control using PEAP (PEAP/MS- CHAPv2) as authentication method and FreeRADIUS as back-end authentication server running on Debian Sarge. Cisco AP1200 series as the authenticator. And Windows XP default build-in supplicant. 2. FreeRadius 2.1 Before the installation apt-get install libssl-dev apt-get build-dep freeradius 2.2 Working with the source - getting the source code: apt-get source freeradius - unpacking, compile, make, make install (the filename can be different) tar zxfv freeradius-1.0.4.tar.gz cd freeradius-1.0.4./configure --disable-shared make make install 2.3 Configuring FreeRADIUS - the binaries are installed in /usr/local/bin and /usr/local/sbin. The configuration files are found under /usr/local/etc/raddb. cd /usr/local/etc/raddb

- Open the main configuration file radiusd.conf. Inside the encrypted PEAP tunnel, an MS-CHAPv2 authentication mechanism is used. - it should look like this: mschap { As of 0.9, the mschap module does NOT support reading from /etc/smbpasswd. If you are using /etc/smbpasswd, see the 'passwd' module for an example of how to use /etc/smbpasswd authtype value, if present, will be used to overwrite (or add) Auth-Type during authorization. Normally should be MS-CHAP authtype = MS-CHAP if use_mppe is not set to no mschap will add MS-CHAP-MPPE-Keys for MS-CHAPv1 and MS-MPPE-Recv-Key/MS-MPPE-Send-Key for MS-CHAPv2 use_mppe = yes if mppe is enabled require_encryption makes encryption moderate require_encryption = yes require_strong always requires 128 bit key encryption require_strong = yes Windows sends us a username in the form of DOMAIN\user, but sends the challenge response based on only the user portion. This hack corrects for that incorrect behavior. with_ntdomain_hack = no The module can perform authentication itself, OR use a Windows Domain Controller. This configuration directive tells the module to call the ntlm_auth program, which will do the authentication, and return the NT-Key. Note that you MUST have "winbindd" and

"nmbd" running on the local machine for ntlm_auth to work. See the ntlm_auth program documentation for details. Be VERY careful when editing the following line ntlm_auth = "/path/to/ntlm_auth --request-nt-key --username=% {Stripped-User-Name:-%{User-Name:-None}} --challenge=%{mschap:challenge:- 00} --nt-response=%{mschap:nt-response:-00}" } - configuring LDAP support: Lightweight Directory Access Protocol (LDAP) This module definition allows you to use LDAP for authorization and authentication (Auth-Type := LDAP) See doc/rlm_ldap for description of configuration options and sample authorize{} and authenticate{} blocks ldap { server = "10.0.0.4" identity = "cn=wifiadmin-ro,cn=serviceadmins,ou=ldapadmins,dc=sk" password = "password" basedn = "dc=wifi.cnl.tuke.sk,ou=people,dc=sk" filter = "(eaplogin=%{stripped-user-name:-%{user-name}})" start_tls = no tls_mode = no } dictionary_mapping = ${raddbdir}/ldap.attrmap ldap_connections_number = 5 password_attribute = eapuserpassword reply_attribute = eapuserpassword timeout = 4 timelimit = 3 net_timeout = 1 - Also make sure the "authorize" and "authenticate" contains: authorize { preprocess mschap suffix eap files ldap

} authenticate { MSCHAP authentication. Auth-Type MS-CHAP { mschap } } Allow EAP authentication. eap - open the file clients.conf which speciefies the AP the authenticator server will be serving, a sample: client 10.0.0.1 { secret = secret shortname = test } - this specifies the IP address of the AP. Secret stands for shared secret, thats the password needed for communication between the authenticator (AP) and the authenticator server (FreeRadius). Shortname is meaningless, but cannot be omitted. - proceed to the file eap.conf, in the eap section, set default eap type to peap: default_eap_type = peap - since PEAP is using TLS, the TLS section must contain: tls { private_key_password = whatever private_key_file = ${raddbdir}/certs/cert-srv.pem If Private key & Certificate are located in the same file, then private_key_file & certificate_file must contain the same file name. certificate_file = ${raddbdir}/certs/cert-srv.pem

Trusted Root CA list CA_file = ${raddbdir}/certs/democa/cacert.pem dh_file = ${raddbdir}/certs/dh random_file = ${raddbdir}/certs/random } - it isnt necessary to create new certificates, nobody will ever see them. If you set the private_key_password = whatever and uncomment all lines as shown in the sample output, it will work, since FreeRadius comes with some built-in certificates. But if you want to create our own certificates, dont use the CA.all scripts, try tinyca. Dont forget to specify the password in the certificate the same as here in eap.conf. - find the "peap" section, and make sure it contain the following: peap { } The tunneled EAP session needs a default EAP type which is separate from the one for the non-tunneled EAP module. Inside of the PEAP tunnel, we recommend using MS-CHAPv2, as that is the default type supported by Windows clients. default_eap_type = mschapv2 3. Cisco AP1200 - sample config: version 12.3 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname CNL-test-AP enable secret 5 $1$xRPb$3EqSNTpcS0SfFQMZ/15Gs1 ip subnet-zero aaa new-model aaa group server radius rad_eap server 10.0.0.3 auth-port 1812 acct-port 1813

aaa group server radius rad_mac aaa group server radius rad_acct aaa group server radius rad_admin cache expiry 1 cache authorization profile admin_cache cache authentication profile admin_cache aaa group server radius rad_pmip aaa group server radius dummy aaa authentication login eap_methods group rad_eap aaa authentication login eap_methods group rad_eap aaa authorization exec default local aaa accounting network acct_methods start-stop group rad_acct aaa cache profile admin_cache all aaa session-id common dot11 ssid CNL-KPI-240 vlan 240 authentication open eap eap_methods authentication network-eap eap_methods authentication key-management wpa dot11 ssid CNL-KPI-PDA vlan 666 authentication open eap eap_methods authentication network-eap eap_methods authentication key-management wpa dot11 ssid CNL-KPI-PEAP-WPA2 vlan 481 authentication open eap eap_methods authentication network-eap eap_methods authentication key-management wpa guest-mode username Cisco password 7 14341B180F0B bridge irb interface Dot11Radio0 no ip address encryption vlan 481 mode ciphers aes-ccm encryption vlan 240 mode ciphers aes-ccm encryption vlan 666 mode ciphers tkip ssid CNL-KPI-240 ssid CNL-KPI-PDA

ssid CNL-KPI-PEAP-WPA2 speed basic-1.0 2.0 5.5 6.0 9.0 11.0 12.0 18.0 24.0 36.0 48.0 54.0 station-role root bridge-group 1 bridge-group 1 block-unknown-source no bridge-group 1 source-learning no bridge-group 1 unicast-flooding bridge-group 1 spanning-disabled interface Dot11Radio0.240 encapsulation dot1q 240 bridge-group 240 bridge-group 240 subscriber-loop-control bridge-group 240 block-unknown-source no bridge-group 240 source-learning no bridge-group 240 unicast-flooding bridge-group 240 spanning-disabled interface Dot11Radio0.481 encapsulation dot1q 481 bridge-group 255 bridge-group 255 subscriber-loop-control bridge-group 255 block-unknown-source no bridge-group 255 source-learning no bridge-group 255 unicast-flooding bridge-group 255 spanning-disabled interface Dot11Radio0.666 encapsulation dot1q 666 bridge-group 254 bridge-group 254 subscriber-loop-control bridge-group 254 block-unknown-source no bridge-group 254 source-learning no bridge-group 254 unicast-flooding bridge-group 254 spanning-disabled interface FastEthernet0 no ip address duplex auto speed auto bridge-group 1 no bridge-group 1 source-learning bridge-group 1 spanning-disabled interface FastEthernet0.240 encapsulation dot1q 240 bridge-group 240 no bridge-group 240 source-learning bridge-group 240 spanning-disabled interface FastEthernet0.481 encapsulation dot1q 481 bridge-group 255

no bridge-group 255 source-learning bridge-group 255 spanning-disabled interface FastEthernet0.666 encapsulation dot1q 666 bridge-group 254 no bridge-group 254 source-learning bridge-group 254 spanning-disabled interface BVI1 ip address 10.0.0.1 255.0.0.0 ip default-gateway 10.0.0.2 ip http server no ip http secure-server ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag ip radius source-interface BVI1 access-list 1 permit any radius-server attribute 32 include-in-access-req format %h radius-server host 10.0.0.3 auth-port 1812 acct-port 1813 key 7 00171605165E1F radius-server vsa send accounting control-plane bridge 1 route ip line con 0 transport preferred all transport output all line vty 0 4 transport preferred all transport input all transport output all line vty 5 15 transport preferred all transport input all transport output all end - for more information refer to www.cisco.com

4. Windows XP - configure windows as shown in the next screenshots.

- configuration is finished, now try to connect.

- to configure the username and password click on the bubble in the

right bottom of the screen. - look at the first line, (with index 1) it says that the user was sucessufly associated, the lines bellow it (index 2,6) show what will happen when the radius daemon isnt running - authentification will fail.

4. Literature http://tldp.org/howto/html_single/8021x-howto/ http://www.cisco.com http://www.microsoft.com http://lists.freeradius.org http://mattzz.dyndns.org/twiki/bin/view/projects/freeradiusauthentication http://lists.cistron.nl http://vuksan.com/linux/dot1x/802-1x-ldap.html