Summary: This post describes the installation and configuration how to authenticate on Cisco devices with the use of Microsofts Active Directory.
Date: Around 2010
Refactor: 21 February 2025: Checked links and formatting.
The Active Directory will be running on a Windows Server 2008 SP2, standard edition (64 bits). The steps coming towards this configuration are these:
Create A and PTR records for the switches you want authentication on:
switch04.company.local 10.10.10.133
Create a CNAME for the server who is going to provide the RADIUS service:
radius.company.local ad.company.local
The 'Network Policy and Access Services' role is now installed. You can use a wizard in the NPS console to configure Network Access Protection (NAP). To open the NPS console after installation, go to Server Manager or click Start, Administrative Tools, Network Policy Server.
To make sure you have all the tools required to administrate NPS also install the feature 'Network Policy and Access Services Tools'
The Network Policy and Access Services Tools are now installed.
To grant network administrators access you should create a group, and the group will be granted access and the network administrators will be assigned member of the group.
Create a global security group called 'NetworkAdministrators' and make the network administrators member.
The network policy only needs to be checked now, so when you're done click Finish and you're done.
Fill in the required field and remember the shared secret you enter here:
conf t hostname switch04 ip domain-name company.local ip name-server 10.10.10.53
All these commands should be issued after logging in to the server and issuing conf t
.
aaa new-model
radius-server host radius.company.local timeout 3 retransmit 2 key <shared-secret>
Note:
default timeout = 5
default retransmit = 3
* Force RADIUS to use the IP address of the management interface (Vlan1)for all outgoing RADIUS packets:
ip radius source-interface Vlan1
aaa authentication login default group radius local aaa authorization exec default group radius local
line vty 0 15 (config-line)# login authentication default end
Now check the configuration, and only write the configuration to the cisco device if you can login successfully. To do so:
write exit