Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

802 1x

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 28

802.

1X Configuration

Terena 802.1X workshop


the Netherlands, Amsterdam, March 30th

Paul Dekkers

Overview

EAP

What makes EAP flexible

Man-in-the-Middle attack
Thats why we need a good EAP mechanism!

RADIUS proxy-ing

RADIUS
Client-Server model
Authenticator is a RADIUS client Authentication-server is the RADIUS server RADIUS server can be a client as well

RADIUS whats in the packet


UDP, ports 1645/1646 or 1812/1813 Mind the firewall! Attributes, like User-Name, User-Password, EAP-Message Shared Secret

RADIUS and REALMS


Use well-chosen realms: preferably like an e-mail address, user@institution.ccTLD Important with PROXY-ing

Guest Access

10

Traffic separation without 1x

11

Traffic separation with 1x

Supplicant

Authenticator (AP or switch)

RADIUS server University X User DB

RADIUS server SURFnet office User DB

Guest Paul.Dekkers@surfnet.nl

Internet Guest VLAN Students VLAN

Employee VLAN

Central RADIUS proxy server

12

Traffic separation with 1x

13

Hands-on setup

14

Configuration:

Radiator
Linear Global configuration
AuthPort 1812 AcctPort 1813 LogDir /var/log/radius DbDir /etc/radiator

Clients Handlers
15

Configuration:

Radiator
RADIUS Clients
<Client 192.168.1.2> Secret 6.6obaFkm&RNs666 Identifier AP1 IdenticalClients 192.168.1.3, 192.168.1.4 </Client>

16

Configuration:

Radiator
<Handler Realm=surfnet.nl> <AuthBy FILE> Filename users </AuthBy> </Handler>

17

Configuration:

Radiator
<Handler Realm=surfnet.nl> <AuthBy FILE> Filename users EAPType TTLS, PEAP, MSCHAP-V2 EAPTLS_CAFile root-ca.pem EAPTLS_CertificateFile server.pem EAPTLS_CertificateType PEM EAPTLS_PrivateKeyFile private.pem EAPTLS_PrivateKeyPassword secret EAPTLS_MaxFragmentSize 1024 AutoMPPEKeys </AuthBy> </Handler>

18

Configuration:

Radiator
<Handler Realm=surfnet.nl, Request-Type=Accounting-Request> # Accept, and log </Handler> <Handler Realm=surfnet.nl, TunnelledByTTLS=1> # PAP </Handler> <Handler Realm=surfnet.nl, TunnelledByPEAP=1> # EAP-MSCHAPv2 </Handler> <Handler Realm=surfnet.nl> # EAP-TTLS and EAP-PEAP </Handler>

19

Configuration:

Radiator, Identifiers and Catch-all


<AuthBy RADIUS> Identifier SURFNET-PROXY Host radius-proxy.surfnet.nl Secret Sdfg8WeR98r09d8fg AuthPort 1812 AcctPort 1813 </AuthBy> <Handler> AuthBy SURFNET-PROXY </Handler>

20

RADIUS proxy-loop
Good configuration is more complex, often lacks in prevention for proxy-loops

21

Configuration:

Access-Point

22

Cisco AP - RADIUS
AP1(config)#aaa new-model aaa group server radius rad_eap server 192.87.116.63 auth-port 1812 acct-port 1813 aaa authentication login eap_methods group rad_eap aaa accounting network acct_methods start-stop group rad_acct radius-server host 192.87.116.63 auth-port 1812 acct-port 1813 key X

23

Cisco AP - Wireless Interface


AP1(config)#interface dot11Radio 0 AP1(config-if)#encryption mode ciphers wep40 AP1(config-if)#broadcast-key change 1800 AP1(config-if)#no ssid tsunami AP1(config-if)#ssid SURFnet AP1(config-if-ssid)#authentication open eap eap_methods AP1(config-if-ssid)#guest-mode AP1(config-if-ssid)#^Z

24

Cisco switch enable RADIUS


Switch# configure terminal Switch(config)# aaa new-model Switch(config)# radius-server host 192.168.100.1x auth-port 1812 key <secret>

25

Cisco switch enable 802.1x


Switch(config)# aaa authentication dot1x default group radius Switch(config)# dot1x system-auth-control Switch(config)# interface fastethernet0/1 Switch(config-if)# spanning-tree portfast Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan 10 Switch(config-if)# dot1x port-control auto Switch(config-if)# end Switch(config-if)# dot1x guest-vlan 60

26

Windows and wired 802.1x

27

Extra in hands-on
Configuration of VLANs: Can you enable roaming with another group? Can you create an SSID for users without 802.1x?

28

You might also like