Loading

Configure IEEE 802.1X on the authentication server (phase 1)

Network Policy Server (NPS) is a service included in Windows Server. Its acts as RADIUS server to authenticate clients against Active Directory.

RADIUS (Remote Authentication Dial-In User Service) is a client / server system that secures the Local Area Network (LAN) against unauthorized access. The RADIUS server must be configured to support the IEEE 802.1X port-based authentication and to enable the communication to the authenticator (switch) for authentication requests.

NOTE

The instructions below refer to Windows Server 2016. Other systems may need another configuration. See the vendor documentation for the complete instructions.

Before you begin

Perform the following instructions below in the order they are listed.

1. Configure Network Policy Server (NPS) to support RADIUS clients

  1. In [Server Manager], click [Manage].

    [Server Manager] options
  2. Click [Add Roles and Features].

  3. The first page of the [Add Roles and Features] wizard is displayed.

  4. On the [Before You Begin] page, click [Next].

  5. On the [Installation Type] page, ensure that [Role-Based or feature-based installation] is selected. Then click [Next].

  6. On the [Server Selection] page, ensure that [Select a server from the server pool] is selected. Then, select the local computer from the [Server Pool] list.

  7. On the [Server Roles] page, select [Network Policy and Access Services]. Then click [Next].

    [Network Policy and Access Services] wizard
  8. On the [Features] page, click [Next].

  9. On the [Confirmation] page, click [Install].

  10. On the [Results] page, you see if the installation has been successful.

2. Check the current RADIUS client (switch) properties

When the RADIUS client (switch) is not configured, perform instruction 3.

  1. In [Server Manager], click [Tools].

    [Server Manager] options
  2. Click [Network Policy Server].

  3. In the [NPS] console, click [NPS (Local)].

  4. Expand the [RADIUS Clients and Servers] entries.

  5. Double-click [RADIUS Clients].

    [RADIUS Clients]
  6. Right-click the name of the RADIUS client (switch) and select [Properties].

  7. Click the [Settings] tab. Check if the [Enable this RADIUS client] check box is selected and the [Name and Address] fields are correct.

    RADIUS client (switch) properties
  8. Click the [Advanced] tab. Check if [RADIUS Standard] is selected from the [Vendor name] list.

    RADIUS client (switch) properties

3. Add the switch as a RADIUS client to Network Policy Server (NPS)

When the switch is not configured (see instruction 2), perform this instruction.

  1. In [Server Manager], click [Tools].

    [Server Manager] options
  2. Click [Network Policy Server].

  3. In the [NPS] console, click [NPS (Local)].

  4. Expand the [RADIUS Clients and Servers] entries.

  5. Right-click [RADIUS Clients] and select [New].

  6. In the new [RADIUS Client] dialog box, click the [Settings] tab.

  7. Select the [Enable this RADIUS client] check box.

  8. Enter the display name of the switch in the [Friendly name] field.

  9. Enter the IP address or Fully Qualified Domain Name (FQDN) of the switch in the [Address (IP or DNS)] field.

  10. When you entered the FQDN (Fully Qualified Domain Name), click [Verify...] to verify if the name refers to a valid IP address.

  11. In the [Shared secret] option, select [Manual].

  12. Enter a strong text string in the [Shared secret] field. This shared secret is the text string that is used as password between RADIUS clients (switch) and the RADIUS server. You will enter the same shared secret when you configure the switch.

  13. Re-enter the shared secret in the [Confirm shared secret] field.

  14. On the [Advanced] tab, select [RADIUS Standard] from the [Vendor name] drop-down list.

  15. Click [OK]. The switch appears in the list of RADIUS clients.

    [RADIUS Clients]

4. Check the [Ethernet] Connection Request Policy

The connection request policy determines how the server or service acts as a RADIUS server. By default the connection request policy uses Network Policy Server (NPS) as a RADIUS server and processes all authentication requests locally.

When the [Ethernet] Connection Request Policy is not configured, perform instruction 5.

  1. In [Server Manager], click [Tools].

    [Server Manager] options
  2. Click [Network Policy Server].

  3. In the [NPS] console, click [NPS (Local)].

  4. Expand [Policies].

  5. Right-click the connection request policy that refers to the [Ethernet] connection and select [Properties].

    [Ethernet] properties
  6. Click the [Overview] tab and check if the [Policy enabled] check box is selected.

    [Ethernet] properties
  7. Click the [Conditions] tab and check if the [NAS Port Type] has the value: [Ethernet].

    [Ethernet] properties
  8. Click the [Settings] tab and check if all check boxes are cleared.

    [Ethernet] properties
  9. Click [OK].

5. Add the [Ethernet] Connection Request Policy

When the [Ethernet] Connection Request Policy is not configured (see instruction 4), perform this instruction.

  1. In [Server Manager], click [Tools].

    [Server Manager] options
  2. Click [Network Policy Server].

  3. In the [NPS] console, click [NPS (Local)].

  4. Expand the [Policies] entries.

  5. Right-click [Connection Request Policies]. Then, click [New].

  6. Start the [New Connection Request Policy Wizard] to configure the connection request policy.

  7. In the [Policy name] field, enter a name to identify the policy. Then, click [Next].

  8. On the [Specify Conditions] page, click [Add].

  9. In the [Select condition] dialog box, select [NAS Port Type] as a condition. Then, click [Add].

  10. In the [NAS Port Type] dialog box, select the [Ethernet] check box. This option defines which type of media is used by the supplicant (PRISMAsync Print Server).

  11. Click [OK].

  12. On the [Specify Connection Request Forwarding] page, select [Authenticate requests on this server]. Then, click [Next].

  13. On the [Specify Authentication page] clear the [Override network policy authentication settings] check box. Then, click [[Next].

  14. On the [Configure Settings] page, click [Next].

  15. On the [Completing Connection Request Policy Wizard], click [Finish]. Now, the policy is listed in the [Network Policies] pane.