Securing RADIUS with EAP-TLS (Wired WPA2- Enterprise) [Windows Server 2019]

Securing RADIUS with EAP-TLS (Wired WPA2- Enterprise) [Windows Server 2019]

OsbornePro TV

3 года назад

15,662 Просмотров

IMPORTANT NOTE: At 14:47 we want to set the authentication method to "RADIUS, None" not "None". This uses RADIUS authentication and keeps the port authenticated even if the RADIUS server is not available. Brandon Harp was kind enough to point out my misunderstanding here. Thanks Brandon!

I put together a script that can be run as a cron job on a Linux device that will generate a private key, create a CSR request, submit that request to your Windows CA, download the new certificate file and restart a service. I made it for replacing an HTTPS certificate however it should work across the board.
https://github.com/tobor88/Bash/blob/master/update-ssl-certificate.sh

Securing RADIUS with EAP-TLS (Wired WPA2- Enterprise) [Windows Server 2019]
I (tobor), demonstrate how to secure RADIUS using EAP-TLS on wired devices using an 802.1X capable Cisco switch. If you like what you see please Subscribe!

ENABLE RADIUS ACCOUNTING
aaa accounting dot1x start-stop group radius

SET UP RADIUS SERVER USING CLI
radius host 192.168.137.139 auth-port 1812 acct-port 1813 timeout 3 retransmit 3 deadtime 0 key MySharedSecret1 priority 0 usage dot1.x

ENABLE PORT-BASED AUTHENTICATION
dot1x system-auth-control
aaa authentication dot1x default none

ENABLE 802.1X ON A SINGLE PORT
interface gigabitEthernet0/1
dot1x authentication 802.1x

CONFIGURE 802.1X HOST MODE ON PORT
enable
configure terminal
interface gigabitethernet0/1
dot1x host-mode multi-host
# OR
access-session host-mode multi-host

MULTIPLE AUTHENTICATION (802.1X and non-802.1X devices)
interface gigabitethernet0/1
dot1x host-mode multi-host
dot1x port-control auto
# OR
access-session host-mode multi-auth
authentication port-control auto
end
show access-session interface interface-id

MULTI-DOMAIN AUTHENTICATION (802.1X Devices)
interface gigabitethernet0/1
switchport access vlan 110
switchport voice vlan 110
no ip address
authentication host-mode multi-domain
authentication port-control auto
mab

# To set the interface Port Access Entity to act only as an authenticator and ignore messages meant for a supplicant
dot1x pae authenticator

0:00 Intro Summary and Recap of Part 1

1:07 Add 802.1X Capable Switch as NPS Client
2:06 Add Ethernet to NPS Connection Request Policy
2:42 Add Ethernet and Security Groups to NPS Network Policies
6:03 Configure Group Policy Wired Network Profile
10:19 Signing into Switch on SSH and HTTPS
10:57 Configure Accounting Levels
12:01 Add RADIUS Server to Table
14:04 Enable Port Based Authentication Usage
14:47 Set Authentication Method to RADIUS, None
16:00 Enable SNMP Traps for Success and Failure of 802.1X
16:34 Guest VLAN Comment
17:09 Port Authentication Overview
18:53 Enable 802.1x usage on an interface
19:43 Set Administrative Port Control Value
20:41 Host and Session Authentication Overview
23:00 Define the host mode for an interface
23:21 Overview of everything we configured on the switch
25:37 Outro Thanks for Watching!

CISCO RADIUS DOCs
- https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960l/software/15-2_5_e/config-guide/b_1525e_consolidated_2960l_cg/b_1525e_consolidated_2960l_cg_chapter_0100011.html
- https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/whitepaper_C11-731907.html

View my Verified Certifications!
https://www.credly.com/users/roberthosborne/badges

Follow us on GitHub!
https://github.com/tobor88
https://github.com/OsbornePro

Official Site
https://osbornepro.com/

Give Respect on HackTheBox!
https://www.hackthebox.eu/profile/52286

Like us on Facebook!
https://www.facebook.com/osborneprollc

View PS Gallery Modules!
https://www.powershellgallery.com/profiles/tobor

The B.T.P.S. Security Package
https://btpssecpack.osbornepro.com/

Тэги:

#radius #eap-tls #802.1x #eap #network_policy_server #radius_server #radius_server_for_wired_network #radius_authentication_server #radius_authentication_cisco_switch #eap-tls_windows_10 #802.1x_port-based_authentication_configuration #802.1x_configuration_on_cisco_switch #802.1x_wired_authentication_step_by_step #802.1x_tutorial #802.1x_wired #802.1x_nac #802.1x_certificate_authentication
Ссылки и html тэги не поддерживаются


Комментарии: