Using Windows 2008 RADIUS Authentication with Tripp Lite SNMPWEBCARD



Similar documents
How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication

Configuring a Windows 2003 Server for IAS

Configure your firewall for administrative access via RADIUS authentication

Microsoft IAS Configuration for RADIUS Authorization

Searching for accepting?

Creating a Domain Tree

Setting up Active Directory Domain Services

Installation of MicroSoft Active Directory

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR EROOM

Management Authentication using Windows IAS as a Radius Server

How to Install the Active Directory Domain Services (AD DS) Role in Windows Server 2008 R2 and Promote a Server to a Domain Controller

In the Active Directory Domain Services Window, click Active Directory Domain Services.

Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming

The safer, easier way to help you pass any IT exams. Exam : Administering Windows Server Title : Version : V16.

Setting Up a Backup Domain Controller

Authenticating users of Cisco NCS or Cisco Prime Infrastructure against Microsoft NPS (RADIUS)

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Installing Active Directory

Creating a New Domain Tree in the Forest

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Using RADIUS Agent for Transparent User Identification

How to configure MAC authentication on a ProCurve switch

Joining. Domain. Windows XP Pro

Configuring Internet Authentication Service on Microsoft Windows 2003 Server

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes

Configuring Global Protect SSL VPN with a user-defined port

Training module 2 Installing VMware View

Professional Mailbox Software Setup Guide

User s Guide. SNMPWEBCARD Firmware Version through Revision A

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Using iscsi with BackupAssist. User Guide

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

How to install Small Business Server 2003 in an existing Active

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

istorage Server: High-Availability iscsi SAN for Windows Server 2008 & Hyper-V Clustering

Windows Domain Network Configuration Guide

Outlook 2010 Setup Guide (POP3)

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

IIS, FTP Server and Windows

Quick Start Guide. User Manual. 1 March 2012

Microsoft Outlook 2010

Integrating idrac 7 with Microsoft Active Directory

FaxCore Ev5 -To-Fax Setup Guide

CruzNet Secure Set-Up Instructions for Windows Vista

Active Directory integration with CloudByte ElastiStor

Active Directory Restoration

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Print Audit 6 - SQL Server 2005 Express Edition

For paid computer support call

Virtual Office Remote Installation Guide

Exchange 2013 mailbox setup guide

How to Configure Web Authentication on a ProCurve Switch

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

Using Windows Active Directory for Account Authentication to PS Series Groups

netld External Authentication Setup Guide

Remote Access Technical Guide To Setting up RADIUS

Management, Logging and Troubleshooting

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Network System Management. Creating an Active Directory Domain

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Setup and Configuration Guide for Pathways Mobile Estimating

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

MailEnable Installation Guide

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Professional Mailbox Software Setup Guide

Installing Active Directory on Windows Server 2008 by Daniel Petri - January 8, 2009 Printer Friendly Version

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

NAS 206 Using NAS with Windows Active Directory

HOTPin Integration Guide: DirectAccess

Quick Scan Features Setup Guide

Phone: Fax: Box: 230

Step by step guide for connecting PC to wired LAN at dormitories of University of Pardubice

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Authenticating a Lucent Portmaster 3 with Microsoft IAS and Active Directory

Team Foundation Server 2012 Installation Guide

Connecting to SQL server

Virto Password Reset Web Part for SharePoint. Release Installation and User Guide

Server Installation: ServerTools

Configuring the Watchguard Edge for RADIUS authentication

ThinManager and Active Directory

External Authentication with Windows 2008 Server with Routing and Remote Access Service Authenticating Users Using SecurAccess Server by SecurEnvoy

Implementing Microsoft SQL Server 2008 Exercise Guide. Database by Design

Using Windows Task Scheduler instead of the Backup Express Scheduler

Introduction. Versions Used Windows Server 2003

Configuring Microsoft RADIUS Server and Gx000 Authentication. Configuration Notes. Revision 1.0 February 6, 2003

Installation and Configuration of VPN Software

INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY

Configuring Sponsor Authentication

Click Studios. Passwordstate. High Availability Installation Instructions

Defender EAP Agent Installation and Configuration Guide

Integrating idrac7 With Microsoft Active Directory

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

User s Guide. Software Version

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client.

Transcription:

Using Windows 2008 RADIUS Authentication with Tripp Lite SNMPWEBCARD December 11, 2012 Summary This Technical Bulletin describes how to configure Microsoft RADIUS Server for authenticating users for access to SNMPWEBCARD (built-in and accessory card versions). Versions Affected SNMPWEBCARD Version 12.06.0061 Revision D and later versions. Solution Steps for basic installation include: 1. Rename the server 2. Add Active Directory Domain Services 3. Add Network Policy and access Services 4. Configure AAA RADIUS Authentication Step 1. Rename the Server Windows 2008 Server is unique in that the server name is auto-generated and you are not given a chance during the install to name the server so you must do before installing Active Directory. In the Initial Configuration Tasks window, click the Provide computer name and domain link. 1

Enter a Computer description and click the Change button to change the computer name. Enter the Computer name and click OK and reboot when prompted. Step 2. Add Active Directory Domain Services For this example we setup a new forest for the tlsw.net domain. Server 2008 abstracts most server function into Roles so we ll be adding the Active Directory Domain Services Role with the Server Manager by clicking Roles and clicking Add Roles. 2

Select the Active Directory Domain Services Role: Click through the confirmation screens and click Install. You should see an installation progress screen and finally an installation success message that asks you to run the command dcpromo.exe which will configure your domain. Click the link to run dcpromo or click the Start button, select Run and enter dcpromo.exe. You should now see the Active Directory Domain Service install wizard. Click Next to continue. 3

Choose Create a new domain in a new forest and click Next. For our example domain we ll use tlswdev.net. Click Next and it will check to see if the name is already used on the network. 4

When asked to set which Forest Functional Level Use the 2008 level. The next screen you ll see is a warning that the DNS service isn t installed and an offer to install it for you. Click Next to accept and install. 5

You ll receive the following warning. Click Yes to continue. Accept the defaults and click Next. Now you ll be prompted to enter a Directory Services Restore Mode Administrator Password. Enter a password and click Next. 6

Click Next at the Summary screen. You ll now see the Installation Wizard install DNS and Active Directory. Check the Reboot on completion box and once the wizard finishes it ll reboot and be ready for the next step. Step 3. Add Network Policy and Access Services In Windows 2008 Server you can no longer just install the Internet Authentication Service (IAS) and have RADIUS functionality. You must now install Network Policy and Access Services, which now include everything from earlier versions of Windows server such as RRAS/IAS/etc but now includes NAP (think NAC for Windows). We will be installing and configuring RADIUS functionality. So once again head to the Server Manager and Add a Role selecting Network Policy and Access Services and click through the confirmation screen. 7

Select Network Policy Server, Routing and Remote Access Services, Remote Access Service and Routing. Click Next, click through the confirmation screen and click Install. Installation will take a couple of minutes and present you with an install summary. Click Close. 8

Step 4. Configure AAA RADIUS Authentication Step 4.1 Add Active Directory User In Server Manager, go to Roles -> Active DIrecotry Domain Service -> Active Directory Users and Computers -> Domain Name (in example, it s tlswdev.net) -> Users. Right click Users -> New -> User to add a new user logon name - testuser 9

Click Next to create password then Next and Finish Step 4.2 Add RADIUS Client Go to Server Manager -> Roles -> Network Policy and Access Services -> NPS -> RADIUS Clients and servers -> RADIUS Clients 10

Right click RADIUS Clients -> New to add new RADIUS Client. Give it a name, IP address of the SNMP web card, and select Manual for the shared secret and type a password. Press OK when finished. 11

Step 4.3 Configure Connection Request Policy Go to Server Manager -> Roles -> Network Policy and Access Services -> NPS -> Policies, right click Connection Request Policies -> New. 12

Click Next to add Conditions, Select User Name Click Add and specify the user name testuser then OK 13

Click Next and keep Authenticate requests on this server 14

Click Next and make sure Override network policy authentication settings unchecked. 15

Click Next, in RADIUS Attributes, select Standard -> Add Add in the attribute Service-Type and select Login for Others 16

Select Vendor Specific -> Add, choose Vendor-Specific then Add Add Tripp Lite vendor specific Radius attributes. Check Enter Vendor Code, input 850 for Tripp Lite vendor code. 17

Check Yes. It conforms then Configure Attribute to add Tripp Lite Authorization attribute (attribute number is 1), For Attribute value, please refer to the followings: # ---------------------------------------------------------------------------- # Access is granted to the various facilities within the PowerAlert software # by means of the TrippLite-Authorization attribute, which is a comma- # delimited string of facility-code to access-level pairs. # # Facility Codes: default, security, networksettings, systemsettings, info, # logging, devicestatus, devicecontrols, deviceevents, # deviceloads, actions, discovery # # Access Levels: none --> No Access (or 0), # ro --> Read Only (or 1), # rw --> Read-Write Access (or 2.) # # Example: default=rw,security=none,systemsettings=ro # # - The default access for all non-specified facilitys is read/write # - The user has no access to the security facility # - The user has read-only access to the system settings # ---------------------------------------------------------------------------- 18

Click OK then Configure Attribute to add Tripp Lite outlet realms attribute (attribute number is 2) Click OK then OK again 19

Click OK, Close, then Next to Finish 20

Step 4.4 Configure Network Policies Go to Server Manager -> Roles -> Network Policy and Access Services -> NPS -> Policies, right click Network Policies -> New, then Next 21

add condition -> Authentication Type, check CHAP and PAP, OK then Next 22

Specify Access Permission, check Access granted, then Next 23

Configure Authentication Methods, check CHAP and PAP, then Next and No for View the corresponding Help topic? 24

Configure Constraints. Leave unchanged. 25

Configure Settings, clear out anything in the Radius Attributes Standard except Service-type, edit Service-type and select Login for Others: 26

Ok then click Next to Finish Status Effective until further notice. 27