EAP-TLS Authentication with an NPS RADIUS Server
Total Page:16
File Type:pdf, Size:1020Kb
EAP-TLS Authentication with an NPS RADIUS Server 802.1X/EAP-TLS (Extensible Authentication Protocol-Transport Layer Security), defined in RFC 5216, provides secure authentication methods. Client devices (RADIUS supplicants) and a RADIUS authentication server verify each other's identity by validating the signature on the computer and server certificates that they send one another. This authentication method uses an infrastructure that includes a RADIUS authentication server that communicates with an external LDAP database. It also needs a mechanism for installing certificates on the server and all the supplicants, which you can do with a Windows NPS (Network Policy Server) using a GPO (Group Policy Object) to distribute computer certificates and an 802.1X SSID client configuration for wireless access. You can also employ the same infrastructure to authenticate users (also referred to as RADIUS supplicants) who submit user names and passwords to the authentication server. This document explains how to set up the following components to provide wireless client and user authentication through 802.1X/EAP-TLS: • (Aerohive) An 802.1X SSID that instructs APs (RADIUS authenticators) to forward authentication requests to an NPS RADIUS server • (Windows) An NPS RADIUS server that accepts authentication requests from the APs and EAP-TLS authentication requests from clients • (Windows) A GPO to deploy computer certificates and a wireless network configuration to clients • (Aerohive and Windows – optional) An Aerohive and NPS configuration in which different RADIUS attributes are returned based on authentication method (EAP-TLS or PEAP-MS-CHAPv2 in this example) assigning one user profile to clients authenticating by certificate and another to users authenticating by user name/password. The Aerohive configuration instructions in this guide are based on HiveManager and HiveOS 6.x. Thomas Munzer November 3, 2015 To learn more about Aerohive products, visit www.aerohive.com/techdocs EAP-TLS Authentication with an NPS RADIUS Server | 2 Contents 1 Aerohive Configuration ..................................................................................................................... 3 SSID Configuration ......................................................................................................................................................................3 Create an 802.1X SSID ........................................................................................................................................................ 3 Configure the RADIUS server ............................................................................................................................................. 4 Add a Default User Profile .................................................................................................................................................. 5 2 Windows Configuration ..................................................................................................................... 7 NPS Configuration for EAP-TLS Authentication ...................................................................................................................... 7 Identify RADIUS Clients ........................................................................................................................................................ 7 Define a Network Policy ..................................................................................................................................................... 9 GPO for Certificate Enrollment ...............................................................................................................................................13 Create a New Certificate Template ..............................................................................................................................14 Publish the New Certificate Template ...........................................................................................................................16 Create a New Group Policy for Auto-enrollment ........................................................................................................ 17 GPO for Wireless Access ..........................................................................................................................................................19 3 Optional Configuration.................................................................................................................... 23 Allow EAP-TLS for Corporate Access and PEAP-MS ChapV2 for BYOD ........................................................................... 23 User Profile ...........................................................................................................................................................................23 NPS Rule ..............................................................................................................................................................................26 To learn more about Aerohive products, visit www.aerohive.com/techdocs EAP-TLS Authentication with an NPS RADIUS Server | 3 1 Aerohive Configuration The complete setup for 802.1X/EAP-TLS involves the configuration of Aerohive devices and an NPS RADIUS server. For the Aerohive side of the configuration, you simply add an 802.1X SSID to a network policy and configure authentication parameters to point APs to the NPS RADIUS server for the authentication of wireless clients and apply user profiles to their traffic. (You can apply a single default user profile or multiple profiles based on the RADIUS attributes returned.) In a later section, the steps to configure the NPS RADIUS server are explained. SSID Configuration This section explains how to add an 802.1X SSID, its RADIUS server parameters, and user profiles to a network policy. Create an 802.1X SSID Define an SSID profile and add it to a network policy. 1. Navigate to your network policy, click Choose next to SSIDs, and then click New in the Choose SSIDs dialog box that appears. 2. In the New SSID panel that appears, enter a name in the Profile Name field, which automatically enters the same name in the SSID field, select WPA/WAP2 802.1X (Enterprise) for access security, and then click Save. 3. In the Choose SSIDs dialog box, highlight your new SSID, and then click OK to add it to the network policy. To learn more about Aerohive products, visit www.aerohive.com/techdocs EAP-TLS Authentication with an NPS RADIUS Server | 4 Configure the RADIUS server Configure the information that the Aerohive RADIUS clients (also referred to as RADIUS authenticators or network access servers) need to forward authentication requests from clients (RADIUS supplicants) to the RADIUS authentication server. 1. Click <RADIUS Settings> and then click New in the Choose RADIUS dialog box that appears. 2. In the New AAA RADIUS Client dialog box, enter a name for your AAA RADIUS client object, the IP address or domain name of your RADIUS server, and the shared secret that the APs use to authenticate themselves to the server and verify the integrity of the RADIUS messages that they exchange with each other. Note: The shared secret must be the same on both the access points and RADIUS server. You can define one primary RADIUS server and up to three backup servers. All of them can be deployed on Aerohive devices, or you can use a mix of external RADIUS servers (NPS/IAS, FreeRADIUS, ...) and embedded RADIUS servers. 3. Click Apply to save the RADIUS server settings and apply them to the RADIUS client configuration, and then click Save to save the entire RADIUS client configuration object. 4. Highlight the RADIUS client in the Choose RADIUS dialog box, and then click OK to add it to the SSID configuration. To learn more about Aerohive products, visit www.aerohive.com/techdocs EAP-TLS Authentication with an NPS RADIUS Server | 5 Add a Default User Profile Add a default user profile to the SSID. User profiles define how Aerohive devices process traffic from and to the wireless clients that connect to them. This includes the VLAN, firewall policy, QoS policy, tunnel policy, and so on. Note: It is possible to add multiple user profiles to the SSID. You can see how to link an Active Directory computer or user group to a user profile and assign them to different supplicants in "Optional Configuration" on page 23. 1. Click Add/Remove in the User Profile column. 2. In the Choose User Profiles dialog box that appears, click New. 3. Create a new user profile containing its name, attribute number, default VLAN, and other settings that you want to apply to the wireless clients accessing the network, and then click Save. 4. With the Default tab active in the Choose User Profiles dialog box, highlight EAP-TLS(1) and then click Save. If the RADIUS server returns an ACCESS-ACCEPT message with attributes indicating user profile 1, or if it returns an ACCESS-ACCEPT message without any attributes, the AP places the client in this default user profile. To learn more about Aerohive products, visit www.aerohive.com/techdocs EAP-TLS Authentication with an NPS RADIUS Server | 6 5. Click Continue to save the changes and advance to the Configure and Update Devices panel where you can upload the configuration to your Aerohive devices. Note: Ensure the network policy contains proper settings for the management and native VLANs and NTP server. Certificate validity checks rely on the authentication server, APs, and clients having accurate time