![]() ![]() Switch1(config-line)# login authentication AAA_RADIUSĪssuming NPS is already installed and configured correctly we need to define a RADIUS client and create a Network Policy. Switch1(config)# aaa authentication login AAA_RADIUS group radius local The first step is configuring the switch to use RADIUS authentication. This post provides step by step commands to configure a Cisco Catalyst switch to authenticate administrator users to a Windows 2008 R2 NPS RADIUS server. For “EAP Types” click Add and select “Microsoft: Protected EAP (PEAP). “Constraints”, select “Authentication Methods”.“Access Granted”, ensure “Access granted” is select.“Specify Condition”, click Add and select the “Machine Groups” option, add the “Domain Computers” group.Create a new “Network Policy” with a descriptive name e.g. ![]() Open the “Network Policy Server” MMC console.Switch(config-if)# dot1x port-control auto Switch(config-if)# switchport mode access Switch(config)# interface fastethernet 0/1 Switch(config)# dot1x system-auth-control Switch(config)# aaa authentication dot1x default group radius It is assumed that a Windows 2008 Active Directory domain, Certificate Authority and NPS RADIUS is already installed. This post describes how to configure a Cisco Catalyst switch and a RADIUS server for 802.1x authentication.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |