Sunday, August 14, 2011
Install Windows 2008 R2 NPS for RADIUS Authentication for Cisco Router Logins - part2
Optionally we can specify that this network policy will apply to a specific RADIUS client (i.e. Cisco router). click Add.
Select Client Friendly Name, click Add.
Type a friendly name for your router. As it says you can use pattern matching such as a wildcard (*) if desired for this to apply to multiple devices. Click OK.
Now we click Next.
If the policy conditions are matched we want to provide access so select “Access granted” and click Next.
The Cisco IOS requires unencrypted authentication methods so select “Unencrypted authentication (PAP, SPAP)”. Click Next.
We get a warning about selecting the unencrypted authentication type, click No unless you want to do some reading.
We can set additional constraints to match for the policy to apply. Just click Next.
This policy will apply to router logins only so we’ll specify an attribute to identify this connection type. Highlight Standard under RADIUS Attributes and in the right side and delete both attributes that are already there. Then click Add.
With Access type set to All select the Service-Type attribute, then click Add.
Under Attribute Value select Others, then select Login from the menu. Click OK.
Click Close.
Subscribe to:
Post Comments (Atom)
THANKS!!!
ReplyDelete