Securing RADIUS with EAP-TLS (Wired WPA2- Enterprise) [Windows Server 2019]

OsbornePro TV
OsbornePro TV
16.3 هزار بار بازدید - 3 سال پیش - IMPORTANT NOTE: At
IMPORTANT NOTE: At 14:47 we want to set the authentication method to "RADIUS, None" not "None". This uses RADIUS authentication and keeps the port authenticated even if the RADIUS server is not available. Brandon Harp was kind enough to point out my misunderstanding here. Thanks Brandon!

I put together a script that can be run as a cron job on a Linux device that will generate a private key, create a CSR request, submit that request to your Windows CA, download the new certificate file and restart a service. I made it for replacing an HTTPS certificate however it should work across the board.
https://github.com/tobor88/Bash/blob/...

Securing RADIUS with EAP-TLS (Wired WPA2- Enterprise) [Windows Server 2019]
I (tobor), demonstrate how to secure RADIUS using EAP-TLS on wired devices using an 802.1X capable Cisco switch. If you like what you see please Subscribe!

ENABLE RADIUS ACCOUNTING
aaa accounting dot1x start-stop group radius

SET UP RADIUS SERVER USING CLI
 radius host 192.168.137.139 auth-port 1812 acct-port 1813 timeout 3 retransmit 3 deadtime 0 key MySharedSecret1 priority 0 usage dot1.x

ENABLE PORT-BASED AUTHENTICATION
 dot1x system-auth-control
 aaa authentication dot1x default none

ENABLE 802.1X ON A SINGLE PORT
 interface gigabitEthernet0/1
 dot1x authentication 802.1x

CONFIGURE 802.1X HOST MODE ON PORT
 enable
 configure terminal
 interface gigabitethernet0/1
 dot1x host-mode multi-host
OR
 access-session host-mode multi-host

MULTIPLE AUTHENTICATION (802.1X and non-802.1X devices)
 interface gigabitethernet0/1
 dot1x host-mode multi-host
 dot1x port-control auto
OR
 access-session host-mode multi-auth
 authentication port-control auto
 end
 show access-session interface interface-id

MULTI-DOMAIN AUTHENTICATION (802.1X Devices)
 interface gigabitethernet0/1
 switchport access vlan 110
 switchport voice vlan 110
 no ip address
 authentication host-mode multi-domain
 authentication port-control auto
 mab

To set the interface Port Access Entity to act only as an authenticator and ignore messages meant for a supplicant
 dot1x pae authenticator

0:00 Intro Summary and Recap of Part 1

1:07 Add 802.1X Capable Switch as NPS Client
2:06 Add Ethernet to NPS Connection Request Policy
2:42 Add Ethernet and Security Groups to NPS Network Policies
6:03 Configure Group Policy Wired Network Profile
10:19 Signing into Switch on SSH and HTTPS
10:57 Configure Accounting Levels
12:01 Add RADIUS Server to Table
14:04 Enable Port Based Authentication Usage
14:47 Set Authentication Method to RADIUS, None
16:00 Enable SNMP Traps for Success and Failure of 802.1X
16:34 Guest VLAN Comment
17:09 Port Authentication Overview
18:53 Enable 802.1x usage on an interface
19:43 Set Administrative Port Control Value
20:41 Host and Session Authentication Overview
23:00 Define the host mode for an interface
23:21 Overview of everything we configured on the switch
25:37 Outro Thanks for Watching!

CISCO RADIUS DOCs
- https://www.cisco.com/c/en/us/td/docs...
- https://www.cisco.com/c/en/us/product...

View my Verified Certifications!
https://www.credly.com/users/robertho...

Follow us on GitHub!
https://github.com/tobor88
https://github.com/OsbornePro

Official Site
https://osbornepro.com/

Give Respect on HackTheBox!
https://www.hackthebox.eu/profile/52286

Like us on Facebook!
Facebook: osborneprollc

View PS Gallery Modules!
https://www.powershellgallery.com/pro...

The B.T.P.S. Security Package
https://btpssecpack.osbornepro.com/
3 سال پیش در تاریخ 1400/02/12 منتشر شده است.
16,302 بـار بازدید شده
... بیشتر