Installing CA and NPS


After I configured DC (It is desirable that DC role is installed on separate server from Radius role) I started Radius installation. If you want Radius to work, first step is to install CA (certificate authority) and configure it. We`ll first install both CA and NPS roles, and then configure them.

Server Manager | Roles | Add Roleshttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall1-300x124.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall2-300x220.jpg

Choose | Active Directory Certificate Services | Network Policy and Access Services | Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall3-300x218.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall4-300x221.jpg

Choose | Network Policy Server. Optionally you can choose other services… Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall5-300x222.jpg

Choose | Create a self-signed certificate for SSL encryption | Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall6-300x224.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall7-300x225.jpg

Choose | Certification Authority |Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall8-300x225.jpg

Choose| Enterprise |Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall9-300x223.jpg

Choose |Root CA |Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall10-300x223.jpg

Choose |Create a new private key |Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall11-300x223.jpg

Leave everything as it is | Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall12-300x223.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall13-300x224.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall14-300x225.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall15-300x226.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall16-300x224.jpg

Leave everything as it is in IIS setup, or choose additional options that you need |Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall17-300x225.jpg

Installhttp://medicblog.net/wp-content/uploads/2012/09/Radiusinstall18-300x225.jpg

Installation…http://medicblog.net/wp-content/uploads/2012/09/Radiusinstall19-300x224.jpg

Installation successful.http://medicblog.net/wp-content/uploads/2012/09/Radiusinstall20-300x223.jpg

Configuring certificates
After installing Active Directory Certificate Service and Network Policy Server service we need to configure them.
I`m starting with Active Directory Certificate Services.

Start MMC | File | Add/Remove Snap-in | choose Certificates |Addhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig1-300x206.jpg

Click on Add, new window will show up |Choose Computer |Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig2-300x213.jpg

Choose | Local computer |Finishhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig3-300x218.jpg

Confirm new MMC Snap-in by clicking on OKhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig4-300x206.jpg

Created Snap-in opens up. Expand Certificates | Choose Personal | Right click on Certificates |All Tasks | Request New Certificatehttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig5-300x214.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig6-300x208.jpg

Choose your computer |Enrollhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig7-300x208.jpg

Successful | Finishhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig8-300x204.jpg
With this we finished configuring certificates for our Radius server.
Configuring RADIUS service
Choose Start | Administrative Tools | Network Policy Server
Right click on NPS and then click on Register server in Active Directoryhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig9-300x184.jpg

OKhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig10-300x137.jpg

OKhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig11-300x136.jpg

Stay on NPS (local) and from the right window choose |RADIUS server for 802.1x Wireless or Wired Connections |Click on Configure 802.1xhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig12-300x166.jpg

Choose |Secure Wireless Connections | Choose Name |Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig13-300x297.jpg

Radius clients |Addhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig14-300x292.jpg

Choose a name for client | Enter IP address (it has to be fixed) of client that we are registering | Shared secret – Manual |Enter password for client identification |OKhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig15-300x254.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig16-300x292.jpg

Choose | Microsoft Protected EAP (PEAP) |Click on Configurehttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig17-300x291.jpg

Certificate Properties | Select Secured password | click on Edithttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig18-300x258.jpg

Edit number of authentication retries to desired value | OK |OKhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig19-300x146.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig20-300x289.jpg

Choose groups that will be able to authenticate with RADIUS |Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig21-300x290.jpg

Nexthttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig22-300x294.jpg

Finishhttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig23-300x292.jpg
After finishing configuration click on Start |Administrative Tools | Services |find NPS service and restart it.
By clicking on Radius Clients and Servers | Radius Clients I can see created client. I`m now able to authenticate with RADIUS.http://medicblog.net/wp-content/uploads/2012/09/Radiusconfig24-300x113.jpg
That is the basic setup for RADIUS server.
You can setup RADIUS more detailed under |NPS |Policies |Connection Request Policies or Network Policies

I`m now directing my attention to Network Policies
Network Policies | Choose created WiFiAP and right click| Propertieshttp://medicblog.net/wp-content/uploads/2012/09/Radiusconfig25-300x88.jpg

Tab Constraints |I have chosen even less secure authentication methods for testing purposes. In production environment you should choose only most secure protocols.http://medicblog.net/wp-content/uploads/2012/09/Radiusconfig26-300x243.jpg

Tab Settings | Encryption. For testing purposes I left all options ON, in production environment you should choose strongest encryption (MPPE 128bit)http://medicblog.net/wp-content/uploads/2012/09/Radiusconfig27-300x245.jpg
You should go through all the settings and setup RADIUS to your preferences.

ACCESS POINT setup
I used Linksys WAP54G. Setup is more or less the same for all APs. Although I had some APs that just won`t work with Windows Server based RADIUS server, so be careful when you choose your equipment.

Access Point should have ethernet connection to the network environment where RADIUS server is located.

Access Point should be setup as follows:
Static IP, same subnet as RADIUS serverhttp://medicblog.net/wp-content/uploads/2012/09/RadiusWAP54G-300x176.jpg

Setup as Access Pointhttp://medicblog.net/wp-content/uploads/2012/09/RadiusWAP54G1-300x219.jpg

Basic Wireless Settings |Setup SSID namehttp://medicblog.net/wp-content/uploads/2012/09/RadiusWAP54G2-300x192.jpg

Wireless Security |Choose WPA Enterprise ( My AP is older so It doesn`t have WPA2 ) |Encryption AES | RADIUS Server: IP address of RADIUS server | RADIUS Port: it`s usually 1812 |Shared secret: you defined it while creating new client in NPS, desirable value for shared secret is for example: 984752G2N3
Key renewal: leave as it is.http://medicblog.net/wp-content/uploads/2012/09/RadiusWAP54G3-300x168.jpg

Advanced Wireless Settings | Leave default settings.http://medicblog.net/wp-content/uploads/2012/09/RadiusWAP54G4-300x213.jpg
With this step we configured AP for communication with RADIUS. Save your settings and reboot Access Point.

Testing

I want to connect my iPhone (iOS5) to WiFI network RadiusTest and by that connection test connection between client – AP and RADIUS server.

On my iPhone in WiFI networks I can see created WiFi RadiusTest  – I`m taping on it to connect.http://medicblog.net/wp-content/uploads/2012/09/itest1-200x300.jpg
I need to authenticate. I entered my domain user account and password in following form : Domain\user + password | Choose Joinhttp://medicblog.net/wp-content/uploads/2012/09/itest2-200x300.jpg
After few seconds I`m offered the certificate that I created earlier on RADIUS server | Accepthttp://medicblog.net/wp-content/uploads/2012/09/itest3-200x300.jpg
iPhone is successfully connected and authenticated on RADIUS server.http://medicblog.net/wp-content/uploads/2012/09/itest4-200x300.jpg
With this step installing, configuring and testing RADIUS server on Windows Server 2008 x64 is successfully finished.

2 comments:

  1. Its not working on IOS 8 and above...is something missing?

    ReplyDelete
    Replies
    1. Android devices doesnt work too...I ve setup exact the same configuration as on your setup, I have the same access point. Devices asking for username and password but certificate offer never appeared on my ipad or android device.
      Thank you in advance

      Delete