Microsoft
Software
Hardware
Network
Question : Problem: Configure Cisco 1841 to use IAS Radius and Local user authentication
Hi experts.
We have a site that has quite a simple setup. 30 users on the LAN, an 1841 on the perimiter (with an ADSL modem on the external IF) and some remote users who connect using the Cisco VPN software client with local user authentication.
We'd like to implement IAS and do a phased integration - bring in Radius AND Local authentication, then eventually get rid of Local (give us a chance to get everyone over to using their AD account).
I haven't set up IAS before, but have another client's site I can refer to - I'm pretty much told the only real gotcha is to make sure we're using unauthenticated PAP. Have followed a few tutorials and have got this set up (but as below, it's not quite working).
So, the question is... what commands / config changes do I need to implement to make the existing VPN setup use both local AND Radius.
The Radius Server will be 192.168.1.83 - the internal IF of the 1841 is 192.168.1.1 (doh!).
The current (edited for security) config is below. It was created using SDM, so the ACLs are huge... I've removed the middle parts of some ACLs to save room here:
==========================
======
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname MYROUTER
!
boot-start-marker
boot-end-marker
!
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 51200 warnings
enable secret 5 $1$Swze$JoeKKQvZmxOefHFjCZ
3k50
!
aaa new-model
!
!
aaa authentication login local_authen local
aaa authentication login sdm_vpn_xauth_ml_1 local
aaa authorization exec local_author local
aaa authorization network sdm_vpn_group_ml_1 local
!
aaa session-id common
!
resource policy
!
clock timezone PCTime 12
clock summer-time PCTime date Mar 16 2003 3:00 Oct 5 2003 2:00
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
no ip source-route
ip cef
!
!
ip inspect name SDM_LOW cuseeme
ip inspect name SDM_LOW dns
ip inspect name SDM_LOW ftp
ip inspect name SDM_LOW h323
ip inspect name SDM_LOW https
ip inspect name SDM_LOW icmp
ip inspect name SDM_LOW imap
ip inspect name SDM_LOW pop3
ip inspect name SDM_LOW netshow
ip inspect name SDM_LOW rcmd
ip inspect name SDM_LOW realaudio
ip inspect name SDM_LOW rtsp
ip inspect name SDM_LOW esmtp
ip inspect name SDM_LOW sqlnet
ip inspect name SDM_LOW streamworks
ip inspect name SDM_LOW tftp
ip inspect name SDM_LOW tcp
ip inspect name SDM_LOW udp
ip inspect name SDM_LOW vdolive
ip tcp synwait-time 10
!
!
ip ips sdf location flash://128MB.sdf autosave
ip ips notify SDEE
ip ips name sdm_ips_rule
no ip bootp server
ip domain name mydomain.local
ip name-server 192.168.1.83
ip name-server 20.27.32.3
!
!
!
crypto pki trustpoint TP-self-signed-3444143421
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certifi
cate-34441
43421
revocation-check none
rsakeypair TP-self-signed-3444143421
!
!
crypto pki certificate chain TP-self-signed-3444143421
certificate self-signed 01
3082024D 308201B6 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33343434 31343334 3231301E 170D3038 30313233 32313335
35305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 34343431
34333432 3130819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100D2BD FF681910 A2742EDA 021E70C7 6D5DE95D 269CA554 81C6D71A 82816BD6
E172A575 2E9733C2 6884113F A8547643 FF921172 FF2630F3 4BE7766E F05C8018
BDF70ABF 45F128BC 8A07FB15 A2211445 9941A7DE DEB42AF0 8751AE12 6A6D0BCB
BD312666 E93BC64E 7F42FBA6 3D94F5B6 BF8645D2 38098F62 3DD9CBC7 34902103
9CB50203 010001A3 75307330 0F060355 1D130101 FF040530 030101FF 30200603
551D1104 19301782 1543554C 48524F30 312E6375 6C68616D 2E6C6F63 616C301F
0603551D 23041830 16801412 E3D7AF25 C2243E4C 62F155C8 E07B7BC8 4A893E30
1D060355 1D0E0416 041412E3 D7AF25C2 243E4C62 F155C8E0 7B7BC84A 893E300D
06092A86 4886F70D 01010405 00038181 00A36D7F 504BB969 06F49701 092D6AFB
8A4D4CBF 84B79B0A 13DAD21E 4104B6BA 331CDF2B DED372B7 F7591CE5 9EE8294A
132663F7 455D8FE2 73288E77 7CB2ACFC DE5A373B B00FB5E4 0710CD07 A06D9236
1C10FA5F 5B345442 CAB2F988 20571B7B B2B4BDBE D8B05680 3257AEEE F1666F39
EE33C3CB 17763B20 D7EBEE0F 3047F70C 50
quit
username administrator privilege 15 secret 5 BLAHBLAH
username fred password 7 BLAHBLAH
username shane password 7 BLAHBLAH
username bill password 7 BLAHBLAH
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp xauth timeout 15
!
crypto isakmp client configuration group culham-vpn
key mysecretk3y
dns 192.168.1.83
domain mydomain.local
pool SDM_POOL_1
acl 106
split-dns mydomain.local
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto dynamic-map SDM_DYNMAP_1 1
set transform-set ESP-3DES-SHA
reverse-route
!
!
crypto map SDM_CMAP_1 client authentication list sdm_vpn_xauth_ml_1
crypto map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1
crypto map SDM_CMAP_1 client configuration address respond
crypto map SDM_CMAP_1 65535 ipsec-isakmp dynamic SDM_DYNMAP_1
!
!
!
interface Null0
no ip unreachables
!
interface FastEthernet0/0
description Internal Network$ETH-LAN$$FW_INSIDE
$
ip address 192.168.1.1 255.255.255.0
ip access-group 100 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
no mop enabled
!
interface FastEthernet0/1
description To ADSL Internet Modem$ETH-WAN$$FW_OUTSIDE$
ip address 192.168.200.1 255.255.255.0
ip access-group 101 in
ip verify unicast reverse-path
no ip redirects
no ip unreachables
no ip proxy-arp
ip inspect SDM_LOW out
ip ips sdm_ips_rule in
ip ips sdm_ips_rule out
ip nat outside
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
no mop enabled
crypto map SDM_CMAP_1
!
ip local pool SDM_POOL_1 192.168.101.201 192.168.101.254
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.200.254
!
ip http server
ip http access-class 2
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source static tcp 192.168.1.31 10019 interface FastEthernet0/1 10019
ip nat inside source static tcp 192.168.1.31 8201 interface FastEthernet0/1 8201
ip nat inside source static tcp 192.168.1.31 8200 interface FastEthernet0/1 8200
ip nat inside source static tcp 192.168.1.31 8016 interface FastEthernet0/1 8016
ip nat inside source route-map SDM_RMAP_1 interface FastEthernet0/1 overload
ip nat inside source static tcp 192.168.1.83 25 interface FastEthernet0/1 25
!
access-list 1 remark SDM_ACL Category=16
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 2 remark HTTP Access-class list
access-list 2 remark SDM_ACL Category=1
access-list 2 permit 192.168.1.0 0.0.0.255
access-list 2 deny any
access-list 100 remark auto generated by SDM firewall configuration
access-list 100 remark SDM_ACL Category=1
access-list 100 permit udp host 192.168.1.83 eq domain any
access-list 100 deny ip 192.168.200.0 0.0.0.255 any
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
access-list 101 remark auto generated by SDM firewall configuration
access-list 101 remark SDM_ACL Category=1
access-list 101 permit ip host 192.168.101.201 192.168.1.0 0.0.0.255
access-list 101 permit ip host 192.168.101.202 192.168.1.0 0.0.0.255
...
access-list 101 permit ip host 192.168.101.253 192.168.1.0 0.0.0.255
access-list 101 permit ip host 192.168.101.254 192.168.1.0 0.0.0.255
access-list 101 permit udp host 202.27.184.3 eq domain any
access-list 101 permit udp host 202.27.184.5 eq domain any
access-list 101 permit udp host 202.27.18.3 eq domain any
access-list 101 permit tcp any host 192.168.200.1 eq smtp
access-list 101 permit tcp any host 192.168.200.1 eq 10019
access-list 101 permit tcp any host 192.168.200.1 eq 8201
access-list 101 permit tcp any host 192.168.200.1 eq 8200
access-list 101 permit tcp any host 192.168.200.1 eq 8016
access-list 101 permit ip host 192.168.101.201 any
access-list 101 permit ip host 192.168.101.202 any
access-list 101 permit ip host 192.168.101.203 any
...
access-list 101 permit ip host 192.168.101.252 any
access-list 101 permit ip host 192.168.101.253 any
access-list 101 permit ip host 192.168.101.254 any
access-list 101 permit udp any host 192.168.200.1 eq non500-isakmp
access-list 101 permit udp any host 192.168.200.1 eq isakmp
access-list 101 permit esp any host 192.168.200.1
access-list 101 permit ahp any host 192.168.200.1
access-list 101 permit udp host 20.27.32.5 eq domain host 192.168.200.1
access-list 101 permit udp host 20.27.32.3 eq domain host 192.168.200.1
access-list 101 deny ip 192.168.1.0 0.0.0.255 any
access-list 101 permit icmp any host 192.168.200.1 echo-reply
access-list 101 permit icmp any host 192.168.200.1 time-exceeded
access-list 101 permit icmp any host 192.168.200.1 unreachable
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip host 255.255.255.255 any
access-list 101 deny ip host 0.0.0.0 any
access-list 101 deny ip any any log
access-list 102 remark VTY Access-class list
access-list 102 remark SDM_ACL Category=1
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 deny ip any any
access-list 103 remark SDM_ACL Category=2
access-list 103 deny ip 192.168.1.0 0.0.0.255 host 192.168.101.201
access-list 103 deny ip 192.168.1.0 0.0.0.255 host 192.168.101.202
...
access-list 103 deny ip 192.168.1.0 0.0.0.255 host 192.168.101.252
access-list 103 deny ip 192.168.1.0 0.0.0.255 host 192.168.101.253
access-list 103 deny ip 192.168.1.0 0.0.0.255 host 192.168.101.254
access-list 103 deny ip any host 192.168.101.201
access-list 103 deny ip any host 192.168.101.202
...
access-list 103 deny ip any host 192.168.101.253
access-list 103 deny ip any host 192.168.101.254
access-list 103 permit ip 192.168.1.0 0.0.0.255 any
access-list 106 remark SDM_ACL Category=4
access-list 106 permit ip 192.168.1.0 0.0.0.255 any
no cdp run
route-map SDM_RMAP_1 permit 1
match ip address 103
!
!
!
control-plane
!
banner login ^CUNAUTHORISED ACCESS PROHIBITED^C
!
line con 0
login authentication local_authen
transport output telnet
line aux 0
login authentication local_authen
transport output telnet
line vty 0 4
access-class 102 in
authorization exec local_author
login authentication local_authen
transport input telnet ssh
line vty 5 15
access-class 102 in
authorization exec local_author
login authentication local_authen
transport input telnet ssh
!
scheduler allocate 4000 1000
end
==========================
======
I've been trying to get just the RADIUS authenticating for testing, and added:
aaa authentication login sdm_vpn_xauth_ml_1 radius
aaa accounting network default start-stop group radius
aaa accounting system default start-stop group radius
radius-server host 192.168.1.83 auth-port 1812 acct-port 1813 key 7 MYKEYHERE
ip radius source-interface FastEthernet0/0
... but the VPN client doesn't authenticate with a user I've added in my AD Group (and set up in IAS) or (of course) a local Cisco user. There have been no IAS logs created either, even though I've enabled logging, so I guess the router isn't talking to IAS at all just yet.
IAS setup is basically:
RADIUS CLIENTS
Friendly name = Router name
Address = Router address
Client-Vendor = Cisco
Shared Secret = ... shared secret
REMOTE ACCESS POLICIES (all deleted, except for:)
Name = Cisco VPN Connections
Conditions = Client-Vendor matches "Cisco" AND Windows-Group matches "DOMAIN\CiscoVPNUsers
Edit Profile Settings:
Authentication = everything unticked except for Unencrypted Authentication
... pretty much everything else has been left unchanged I think.
Have had a really good play with this, but I'm hitting the brick wall... :(
Looking forward to hearing back!
Thanks in advance!
Answer : Problem: Configure Cisco 1841 to use IAS Radius and Local user authentication
The local will be hit if radius does not answer. What do the radius logs indicate?
Random Solutions
Problem: Ghost 10 doesnot work on Dell precision T3400
Problem: SyncLBS table Enterprise BES Blackberry Server plotting users positions on a web viewable map
Problem: Is it possible a cell phone can be tracked and/or it calls and texts be alerted, read or listened to by another phone?
Problem: Vista Home Premium blue screens when watching TV on Hauppauge PVR-150
Problem: power adaptor replacement
Problem: Remote desktop manager software
Problem: Does anyone know of a PDA hardware diagnostics tool please?
Problem: Needing Direct Download Link for Microsoft Wireless USB Adapter Model MN - 510 XP SP2 Drivers
Problem: Can't access connect menu on thin client
Problem: Scanner could not be initialized (Scanner not found)