Cisco Cisco ASA for Nexus 1000V Series Switch 기술 매뉴얼

다운로드
페이지 20
ASA VPN User Authentication against Windows
2008 NPS Server (Active Directory) with RADIUS
Configuration Example
Document ID: 117641
Contributed by Sunil Kumar S and Raja Periyasamy, Cisco TAC
Engineers.
Jun 10, 2014
Contents
Introduction
Prerequisites
     Requirements
     Components Used
Configure
     Network Diagram
     Configurations
        ASDM Configuration
        CLI Configuration
        Windows 2008 Server with NPS Configuration
Verify
     ASA Debugs
Troubleshoot
Introduction
This document explains how to configure an Adaptive Security Appliance (ASA) to communicate with a
Microsoft Windows 2008 Network Policy Server (NPS) with the RADIUS protocol so that the legacy Cisco
VPN Client/AnyConnect/Clientless WebVPN users are authenticated against Active Directory. NPS is one of
the server roles offered by Windows 2008 Server. It is equivalent to Windows 2003 Server, IAS (Internet
Authentication Service), which is the implementation of a RADIUS server to provide remote dial−in user
authentication. Similarly, in Windows 2008 Server, NPS is the implementation of a RADIUS server.
Basically, the ASA is a RADIUS client to an NPS RADIUS server. ASA sends RADIUS authentication
requests on behalf of VPN users and NPS authenticates them against Active Directory.
Prerequisites
Requirements
There are no specific requirements for this document.
Components Used
The information in this document is based on these software and hardware versions:
ASA that runs Version 9.1(4)
•