top of page

Dot1x | Radius | AAA Complete Lab

OK this took some time to put together but its finally done, this is a full lab, setting up a DC with DHCP and DNS, a separate NPS that authenticates and authorizes users to connect to the LAN with 802.1x and also using RADIUS to authenticate logins to networking devices!
All from woe to go!

Step 1
Download and install the following; 

  • GNS3 (current version)

  • Virtual box (current version)

  • Learn how to use them (youtube)

Step 2

  • Build, a couple of 2008 R2 boxes and a couple of Windows 7 64 bit boxes too for clients.


Step 3

  • Build the follwoing basic topology within GNS3

  • switches are IOU running IOS version 15.0

  • router is a 7200 running IOS version 15.0(1)M

  • The Domain controller and NPS/CA are Windows 2008 R2 Enterprise SP1

  • Win7- 2 is....Windows 7 64 bit


  • Address the network and get the base config done for connectivity,i used EIGRP for simplicity.

    Step 4.
    Build the DC
    1. Set an admin password,
    i used "Password123" classic!

 

  • Close the auto opening "server manager" and "quick start" page, check the boxes to make sure they don't come back, they're not the boss of me!

    2. Server Manager==>Roles==>Add Roles==>Skip this page by default==>Next==>Check "Active Directory Domain Services"==>Add required .NET 3.5.1 features==>Next==>Next==>Install

    Done!

  • 3.Assign a static iP to the DC

    First change the Virtualbox network adaptor to "Generic Driver"

  • Then change the IP of the adaptor;

  • 4. Promote the DC!

  • Next==>Next==>Create a new domain in a new forest==>Next==>Mycertstudies.local==>Next==>Windows 2008 R2==>Next==>DNS Server==>Next==>Yes==>Next==>Password123/Password123==>Next==>Next==>Reboot on completion

    5. Build some sort of custom AD OU's and stuff for your computers and user accounts...(you can tell a network guy did this!)
    I also created a copy of the admin account for myself and put it in the "IS" OU and i created a blank user "rjunk" and put him in the "ER" OU.

  • Done!

    Step 5 
    Build the NPS/CA!

    First off, assign the box an IP, i used 10.2.0.200 and point it to the DC for DNS

    Then Join it to your domain!

  • Server Manager==>Roles==>Add Roles==>Next==>Check the following;

  • Next==>Next==>Check the following services;

  • Next==>Select Create a self-signed Certificate;

  • Next==>Next==>Certificate Authority==>Next==>Enterprise==>Next==>Root CA==>Next==>Create a new private key==>Next x 6==>Install

  • Done!

  • Step 6
    Request a cert for the NPS from the CA

    Start Menu==>Run==>mmc.exe==>File==>Add/remove Snap-ins;
    Certificates==>Add==>Computer account==>Local Computer==>Finish==>OK

  • Expand Certificates==>Personal==>Right click on Certificates==>All Tasks==>Request New Certificate;

  • Next==>Next==>Computer==>Enroll==>Finish

  • Done!

Configure NPS for radius logins

  • Add radius client for the switch that will be sending the request....

  • Server Manager==>Roles==>NPS==>Radius Clients and Servers==>Right click "Radius Clients"==>New

  • Add Connection Request Policy

    Server Manager==>Roles==>NPS==>Policies==>Right click "Connection Request Policies"==>New 

    Copy the following Policy called "Connection"

  • Add the Network Policy

    Server Manager==>Roles==>NPS==>Policies==>Right click "Network Policies"==>New

    Copy the following Network Policy called "Policy"

This gives you a very generic policy that will allow users to login, you can add restrictions, conditions and other parameters from here...now;

 

Configure the radius client (the switch)

no ip routing
ip
default-gateway 10.1.0.1int

vlan 1
ip add 10.1.0.50 255.255.255.0
!
username cisco secret cisco
enable secret cisco
!
aaa new-model
aaa authentication login default local group radius
radius-server host 10.2.0.100 key Password123

Test a login!



From user exec;

 

test aaa group radius rhard Password123 legacy

bottom of page