Guest

Cisco VPN 3000 Series Concentrators

Configure the Cisco VPN 3000 Series Concentrators to Support the NT Password Expiration Feature with the RADIUS Server

Cisco - Configure the Cisco VPN 3000 Series Concentrators to Support the NT Password Expiration Feature with the RADIUS Server

Document ID: 12086

Updated: Jan 19, 2006

   Print

Introduction

This document includes step-by-step instructions on how to configure the Cisco VPN 3000 Series Concentrators to support the NT Password Expiration feature using the RADIUS server.

Refer to VPN 3000 RADIUS with Expiry Feature Using Microsoft Internet Authentication Server in order to learn more about the same scenerio with the Internet Authentication Server (IAS).

Prerequisites

Requirements

  • If your RADIUS server and NT Domain Authentication server are on two separate machines, make sure that you have established IP connectivity between the two machines.

  • Make sure that you have established IP connectivity from the concentrator to the RADIUS server. If the RADIUS server is towards the public interface, don't forget to open up the RADIUS port on the Public Filter.

  • Ensure that you can connect to the concentrator from the VPN client using the Internal User Database. If this is not configured, please refer to Configuring IPSec - Cisco 3000 VPN Client to VPN 3000 Concentrator.

Note: The Password expiration feature cannot be used with Web VPN or SSL VPN clients.

Components Used

This configuration was developed and tested using the software and hardware versions below.

  • VPN 3000 Concentrator Software Version 4.7

  • VPN Client Release 3.5

  • Cisco Secure for NT (CSNT) version 3.0 Microsoft Windows 2000 Active Directory Server for User Authentication

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Network Diagram

This document uses this network setup:

vpn3k-ntpwexp-01.gif

Diagram Notes

  1. The RADIUS server in this configuration is on the public interface. If this is the case with your specific setup, please create two rules in your public filter to allow RADIUS traffic to enter and leave the concentrator.

  2. This configuration shows CSNT software and NT Domain Authentication Services running on the same machine. These elements can be run on two separate machines if required by your configuration.

Configuring the VPN 3000 Concentrator

Group Configuration

  1. To configure the group to accept the NT Password Expiration Parameters from the RADIUS Server, go to Configuration > User Management > Groups, select your group from the list, and click Modify Group. The example below shows how to modify a group named "ipsecgroup."

    vpn3k-ntpwexp-02.gif

  2. Go to the IPSec tab, make sure that RADIUS with Expiry is selected for the Authentication attribute.

    vpn3k-ntpwexp-03.gif

  3. If you want this feature to be enabled on the VPN 3002 Hardware Clients, go to the HW Client tab, make sure that Require Interactive Hardware Client Authentication is enabled, then click Apply.

    vpn3k-ntpwexp-04.gif

RADIUS Configuration

  1. To configure the RADIUS server settings on the concentrator, go to Configuration > System > Servers > Authentication > Add.

    vpn3k-ntpwexp-05.gif

  2. On the Add screen, type in the values that correspond to the RADIUS server and click Add.

    The example below uses the following values.

    Server Type: RADIUS
    
    Authentication Server: 172.18.124.96
    
    Server Port = 0 (for default of 1645)
    Timeout = 4
    
    Reties = 2
    
    Server Secret = cisco123
    
    Verify: cisco123
    

vpn3k-ntpwexp-06.gif

Configuring the Cisco Secure NT RADIUS Server

Configuring an Entry for the VPN 3000 Concentrator

  1. Log into CSNT and click Network Configuration in the left panel. Under "AAA Clients," click Add Entry.

    vpn3k-ntpwexp-07.gif

  2. On the "Add AAA Client" screen, type in the appropriate values to add the concentrator as the RADIUS Client, then click Submit + Restart.

    The example below uses the following values.

    AAA Client Hostname = 133_3000_conc
    
    AAA Client IP Address = 172.18.124.133
    
    Key = cisco123
    
    Authenticate using = RADIUS (Cisco VPN 3000)
    

    vpn3k-ntpwexp-08.gif

    An entry for your 3000 concentrator will appear under the "AAA Clients" section.

    vpn3k-ntpwexp-09.gif

Configuring the Unknown User Policy for NT Domain Authentication

  1. To configure User Authentication on the RADIUS server as a part of the Unknown User Policy, click External User Database in the left panel, then click the link for Database Configuration.

    vpn3k-ntpwexp-10.gif

  2. Under "External User Database Configuration," click Windows NT/2000.

    vpn3k-ntpwexp-11.gif

  3. On the "Database Configuration Creation" screen, click Create New Configuration.

    vpn3k-ntpwexp-12.gif

  4. When prompted, type a name for the NT/2000 Authentication and click Submit. The example below shows the name "Radius/NT Password Expiration."

    vpn3k-ntpwexp-13.gif

  5. Click Configure to configure the Domain Name for User Authentication.

    vpn3k-ntpwexp-14.gif

  6. Select your NT domain from the "Available Domains," then click the right-arrow button to add it to the "Domain List." Under "MS-CHAP Settings," ensure that the options for Permit password changes using MS-CHAP version 1 and version 2 are selected. Click Submit when you are done.

    vpn3k-ntpwexp-15.gif

  7. Click External User Database in the left panel, then click the link for Database Group Mappings (as seen in this example). You should see an entry for your previously configured external database. The example below shows an entry for "Radius/NT Password Expiration," the database that we just configured.

    vpn3k-ntpwexp-16.gif

  8. On the "Domain Configurations" screen, click New configuration to add the domain configurations.

    vpn3k-ntpwexp-17.gif

  9. Select your domain from the list of "Detected Domains" and click Submit. The example below shows a domain named "JAZIB-ADS."

    vpn3k-ntpwexp-18.gif

  10. Click on your domain name to configure the group mappings. This example shows the domain "JAZIB-ADS."

    vpn3k-ntpwexp-19.gif

  11. Click Add mapping to define the group mappings.

    vpn3k-ntpwexp-20.gif

  12. On the "Create new group mapping" screen, map the group on the NT domain to a group on the CSNT RADIUS server, then click Submit.. The example below maps the NT group "Users" to the RADIUS group "Group 1."

    vpn3k-ntpwexp-21.gif

  13. Click External User Database in the left panel, then click the link for Unknown User Policy (as seen in this example). Make sure that the option for Check the following external user databases is selected. Click the right-arrow button to move the previously configured external database from the list of "External Databases" to the list of "Selected Databases."

    vpn3k-ntpwexp-22.gif

Testing the NT/RADIUS Password Expiration Feature

The concentrator offers a function to test RADIUS authentication. To test this feature properly, make sure that you follow these steps carefully.

Testing RADIUS Authentication

  1. Go to Configuration > System > Servers > Authentication. Select your RADIUS server and click Test.

    vpn3k-ntpwexp-23.gif

  2. When prompted, type your NT domain user name and password, and then click OK. The example below shows user name "jfrahim" configured on the NT domain server with "cisco123" as the password.

    vpn3k-ntpwexp-24.gif

  3. If your authentication is set up properly, you should get a message stating "Authentication Successful."

    vpn3k-ntpwexp-25.gif

    If you receive any message other than the one shown above, there is some configuration or connection problem. Please repeat the configuration and testing steps outlined in this document to ensure that all settings were made properly. Also check the IP connectivity between your devices.

Actual NT Domain Authentication Using RADIUS Proxy to Test the Password Expiration Feature

  1. If the user is already defined on the domain server, modify the properties so that the user will be prompted to change the password at the next logon. Go to the "Account" tab of the user's properties dialog box, select the option for User must change password at next logon, then click OK.

    vpn3k-ntpwexp-26.gif

  2. Launch the VPN client, then try to establish the tunnel to the concentrator.

    vpn3k-ntpwexp-27.gif

  3. During User Authentication, you should be prompted to change the password.

    vpn3k-ntpwexp-28.gif

Related Information

Updated: Jan 19, 2006
Document ID: 12086