Configuringme: Configuring Wired 8021x Authentication On Windows Server 2012.pdf Wired 8021x Authentication On Windows Server 2012
Configuringme: Configuring Wired 8021x Authentication On Windows Server 2012.pdf Wired 8021x Authentication On Windows Server 2012
1x Authentication on
Windows Server 2012
Johan Loos
[email protected]
Version 1.0
802.1x authentication offers visibility since all clients are identified and authenticated. Offers
security if the strongest authentication method is used and offers transparency because
there is no involvement of the end-user.
Without proper access to your network, malicious users can use your network to access
private data or launch attacks to servers or client computers on your network.
Example:
A consultant enters your company, plugs its computer into a socket wall, the client adapter
request an IP address from a DHCP server which is located on the local area network. The
client computers now have access to your network.
Authentication requires that the user provides some valid credentials such as
username and password or a certificate stored on the client computer or smartcard.
Some components that you can use to protect the wired environment are:
One or more 802.1x capable switches which are compatible with RADIUS
802.1x Components
Supplicant (workstation): Is a client that request access to the local area network and
respond to requests from the switch.
Authentication server (NPS Server): This server actually authenticates the client. The
authentication server validates the identity of the client and informs the switch if the client
is authorized to access the local area network. The authentication server is basically a
RADIUS server configured to support EAP authentication.
Authenticator (switch, wireless access point, wireless controller): Controls physical access
to the network based on the authentication status of the client. This device relays the
supplicant credentials to the authentication server.
EAP Protocol
EAPOL works at Layer 2 to authenticate a supplicant before access is granted on the
network. EAPOL creates specialized EAP packets to allow EAP packets in the packet body.
The goal of port based authentication is to transport the EAP-Method data which
implements the actual authentication method.
Type
Length
Packet Body
Version field identifies the version of the EAPOL protocol. The value is one octet in length
and has the value 0000 0002.
Type field identifies the type of packet being sent and is one octet in length.
EAP-Packet: 0000 0000
EAPOL-Start: 0000 0001
EAPOL-Logoff: 0000 0010
EAPOL-Key: 0000 0011
EAPOL-Encapsulated-ASF-Alert: 0000 0100
Length field defines the length of the packet body and is two octets in length. For example
an EAPOL Length field value of 0000 0000 0001 1010 indicates that the Packet Body field
contains 22 octets of data.
Packet Body field is the payload portion
EAP Packet
Extensible Authentication Protocol is an authentication protocol which supports multiple
authentication methods. It works at the Data link layer and does not need IP to operate.
EAP Header
Code
Identifier
Length
Data
Type
Code field specifies the type of EAP packet and is one 1 byte long. The six EAP packet types
can be used:
Code
Description
x01
EAP-Request
x02
EAP-Response
x03
EAP-Success
x04
EAP-Failure
x05
EAP-Initiate
x06
EAP-Finish
Identifier field to match EAP-Response packets to Request packets and is one byte in length.
Configuring Wired 802.1x Authentication on Windows Server 2012
Length field includes the size of the EAP packets including EAP header and data fields and is
two bytes long.
Data field is variable in length, can contain zero or more bytes as indicated in the Length
field.
Type field defines the EAP packet type and is eight bits long.
Type
Description
Identity
Notification
NAK
MD5-Challenge
One-Time password
13
EAP-TLS
21
EAP-TTLS
25
PEAP
26
MS-EAP authentication
29
EAP-MSCHAP-V2
49
MS-IKEv2
Authentication process
When you enable 802.1x authentication, following events occur:
If the identity of the client is valid and 802.1x authentication is successful, the switch
grants the client access to the network
If 802.1x authentication times out and MAC authentication bypass is enabled, the
switch can use the MAC address of the client for authorization
If the client cannot be identified and a restricted VLAN is specified, the switch can
assign the client to the restricted VLAN
The switch re-authenticates the client when one of the following events occurs:
2. Supplicant validates server certificate (check if the FQDN is the same as the name in
the certificate and if the certificate is signed by a trusted CA, or that the certificate is
not revoked
3. Supplicant submits certificate to server
4. Server validates the certificate of the supplicant
PEAP-EAP-MSCHAPv2
PEAP-EAP-MSCHAPv2 requires that the authentication server presents a certificate to the
supplicant. The supplicant must have the Root CA of the CA that signed the authentication
server certificate. It first creates a secure tunnel between the authentication server and the
supplicant. This tunnel is created using a valid server certificate that the authentication
server sends to the supplicant. Within this secure channel, a new EAP negotiation takes
place to authenticate the client.
If the authentication server is unavailable, 802.1x fails and all supplicants will be denied
access.
If the switch is not configured to supports 802.1x authentication and the client sends any
EAPOL frames, these frames are dropped. If the client is configured to supports 802.1x
authentication, and the client does not receive an EAP-request/identity frame after three
Configuring Wired 802.1x Authentication on Windows Server 2012
attempts, the client transmits frames as if the port is in authorized state. A port in
authorized state means that the client has been successfully authenticated.
When the client supplies its identity, the switch passes EAP frames between the client and
authorization server until authorization fails or succeeds.
If the client identity is valid and the 802.1x authentication succeeds, the switch grants the
client access to the network. If the switch gets an invalid identity from an 802.1x capable
client, the switch can assign the client to a restricted VLAN that provides limited services.
The switch can re-authenticate the client at regular times or when the re-authentication
timer expires. You can configure the switch to use timers based on Session-Timeout
(attribute 27) and the Termination-Action (attribute 29). Session-Timeout specifies the time
when re-authentication occurs and Termination-Action specifies the action to take during reauthentication. The action can be Initialize or Re-Authenticate. When you set the Initialize
action, the 802.1x session ends and the client will lose connectivity. When you set ReAuthenticate, the client will not lose the connection and simple re-authenticates.
Do not use Re-authentication and session timers if you are using MAB. The switch does not
re-learn the MAC address but sends the previously learned MAC address to the RADIUS
server. If you use these timers, MAB succeeds when 802.1x authentication fails. So at this
point, the client loses connectivity.
If a client does not support 802.1x authentication and connects to an unauthorized port, the
switch request the clients identity. In this case, the client cannot responds to the request
and the port remains in unauthorized state. The client is not granted access to the network.
When an 802.1x enabled client connects to a port which is not enabled for 802.1x
authentication. The client initiates the authentication process by sending the EAPOL-start
frame. When the client does not receive a response from the switch, then client sends the
request for a number of times.
You can control the port authorization state by using dot1x port-control interface
configuration command:
Force-authorized: Disable 802.1x authentication and causes the port to the authorized state
without any authentication exchange required.
Force-unauthorized: Causes the port to remain in unauthorized state, ignoring all attempts
by the client to authenticate.
Auto: Enable 802.1x authentication and causes the client to begin in the authorized state,
allowing only EAPOL traffic to be sent and receive through the port.
When the client receives an accept frame from the authentication server, the client is
successfully authenticated and the state of the switch port is set to authorized. If the
authentication fails, the switch port remains in unauthorized state, but the client is able to
retry the authentication process.
If the authentication server cannot be reached, the switch will retransmit the request. If the
switch does not receive any responses from the authentication server after a specific
number of attempts, the authentication will fail and the client is not able to access resources
on the local area network.
When a client logs of, the client sends an EAP-logoff message, and the switch changes this
port back to unauthorized state.
10
The RADIUS secret must match the secret key on the NPS server.
RADIUS Attribute
Value
[27] Session-Timeout
Value in seconds
[29] Termination-Action
Value in seconds
11
and connectivity is lost during re-authentication. When you use Re-authenticate the session
is not affected during re-authentication.
This configuration shows how to enable periodic re-authentication and set the number of
seconds between re-authentication attempts to 4800
addevsw01(config)#int fa0/2
addevsw01(config-if)#authentication periodic
addevsw01(config-if)#authentication timer reauthenticate 4800
You can manually re-authenticate the client computer connected to a specific port at any
time by entering the following command:
addevsw01(config)#dot1x re-authenticate int fa0/2
Dot1x max-reauth-req:
The number of times the switch resends the request-identity frame
The default value for dot1x timeout is 30 seconds and dot1xmax-reauth-req is 2. Based on
timeout = (max-reauth-req + 1) x tx-period. It takes 90 seconds for a supplicant to get access
12
through mac authentication bypass on guest vlan. When this timeout expired and MAB is
configured, MAC authentication can takes place.
Authentication timer restart:
If 802.1x timeouts on the fallback mechanism fails or has been configured, the authenticator
will wait a period of time. After this time, the authentication process starts over.
When incorrect VLAN information is supplied by the RADIUS server and 802.1x
authentication is enabled, the switch place the switch port into unauthorized state to
prevents ports to be member of another VLAN.
When VLAN information is supplied correctly by the RADIUS server and 802.1x
authentication is enabled, the switch port is configured with the VLAN after
successful authentication.
If multiple-hosts mode is enabled on the switch port, all hosts are placed in the same
VLAN as the first authenticated host.
13
It is important that VLAN 1 or management VLAN is not the default VLAN. If authentication
fails, the wired client can still access the network. Shutdown all switch ports which you dont
use.
Value
[64] Tunnel-Type
VLAN
[65] Tunnel-Medium-Type
802
[81] Tunnel-Private-Group-ID
VLAN ID
When the client does not send an EAPOL frame or the switch does not receive a response to
an EAP request/identity frame, the switch assigns the 802.1x port to the Guest VLAN. Guest
VLANs are supported on single-host or multiple-hosts mode.
addevsw01(config)#interface fa0/2
addevsw01(config-if)#authentication event no-response action
authorize vlan 100
These clients are 802.1x compliant but fail the authentication process. For example, the
certificate of the client computer has expired.
addevsw01(config)#interface fa0/2
addevsw01(config-if)#authentication event fail action authorize
vlan 99
14
When the client is not able to authenticate within 3 times, the switch places the switch port
into the restricted VLAN. Users for which authentication fails, remains in the restricted VLAN
until the next re-authentication occurs. At configured intervals, the switch port sends a reauthentication message. If re-authentication fails, the switch port remains in the restricted
VLAN. Otherwise the switch port is configured in to configured VLAN or the VLAN ID sent by
the RADIUS Server. Restricted VLANs are only supported in single-host mode.
When the client is authenticated and port security table is not full, the MAC address
of the client is added to the list of secure hosts. The switch port comes up normally.
When the client is authenticated and port security table is full, the switch port shuts
down.
15
When the client logs off, all entries in the secure host table are cleared and the
switch port change to unauthenticated state.
If you administratively shutdown a switch port, all entries are removed from the
secure host table and the switch port becomes unauthenticated.
You can configure 802.1x authentication with port security in single-host or multiple-hosts
mode.
addevsw01(config-if)#switchport port-security mac-address macaddress
If the switch detects an EAPOL frame from an 802.1x capable client, the switch uses 802.1x
authentication instead of MAC authentication bypass.
If the switch already authorized a port using MAC authentication bypass and detects an
802.1x capable client, the switch does not unauthorized the client. When re-authentication
occurs, the switch uses 802.1x authentication as preferred method.
Clients that where authorized with MAC authentication bypassed can be re-authenticated. If
re-authentication is successful, the switch keeps the port in the same VLAN. Otherwise the
switch assigns the port to the Guest VLAN.
You need to create a domain user and password in Active Directory for all your clients which
need to be authenticated via MAB.
16
To be able to authenticate those clients with only the MAC information, you need to create a
policy on NPS which includes the Calling Station ID as condition.
To authenticate users, you need only unencrypted authentication and disable all the others.
17
addevsw01(config)#interface fa0/2
addevsw01(config-if)#mab
Before MAB is in place, the port enabled for MAB must be timeout on 802.1x authentication
first.
IP Address Assignment
After successful authentication, the wired client needs to receive an IP address before
further communication can takes place. The client can receives an IP address from a DHCP
server available on the network or from a DHCP server configured on your switch or other
network device. In this paper, we use a Microsoft DHCP Server and create the necessary
scopes.
18
Creating VLANs
Before you assign VLAN ID attribute via RADIUS you need to configure the required VLANs
on your switch.
The following creates a VLAN 5
addevsw01(config)#vlan 5
Assigning IP address
Assign an IP address to the interface of VLAN 5
addevsw01(config)#interface vlan 5
addevsw01(config-if)#ip address 10.32.5.254 255.255.255.0
addevsw01(config-if)#no shutdown
19
addevsw01(config-if)#no shutdown
Schematic Design
For this lab, I use a Cisco Catalyst 3560 switch which also provides inter-VLAN routing
between the various networks.
Name
Software
Role
ADDEVDC01
DC,DNS,CA
ADDEVDC04
NPS, DHCP
ADDEVWKS01
Windows 7
Client
ADDEVSW01
Switch
20
Domain Controller
NPS/DHCP
Native VLAN 5
Clients
fa0/1
Wired Computers
VLAN 10
fa0/2
Wired Computers
VLAN 20
fa0/2
Restricted VLAN 99
Clients
The IP address of addevdc01 is 10.32.5.3, the IP address of addevdc04 is 10.32.5.15 and the
addevwks01 is configured as a DHCP client.
VLAN ID
Default Gateway
Description
10.32.5.0/24
10.32.5.254
Native vlan
10.32.10.0/24
10
10.32.10.254
Clients vlan
10.32.20.0/24
20
10.32.20.254
Clients vlan
10.32.99.0/24
99
10.32.99.254
Restricted vlan
10.32.100.0/24
100
10.32.100.254
Guest vlan
21
On the NewGroup window, type the name of the group AutoEnroll Server
Authentication Certificate, and click OK
On the New Group window, type the name of the group AutoEnroll Client
Authentication Certificate, and click OK
On the New Group window, type the name of the group Wired Computers VLAN
10, and click OK
22
Right click on RAS and IAS Server certificate Template and select Duplicate
Template.
On the Duplicate Template dialog box, select Windows 2003 Server and click OK
On the General tab, in the Template display name field, type 2012 Server
Authentication Certificate.
23
Click on the Subject Name tab, select Build from this Active Directory information.
Ensure that the Subject name format is set to Common name and that only DNS
Name is selected under Include this information in subject alternative name.
24
Click on the Security tab, click on the Add button and add AutoEnroll Server
Authentication Certificate group, assign Enroll and Autoenroll permissions and click
OK.
25
You should remove any of the other security groups that have permissions to enroll and/or
autoenroll this certificate template.
Click on the General tab, in the Template display name, type Workstation
Authentication Certificate.
26
Click on the Subject Name tab, ensure to select Built from this Active Directory
Information. Under Subject name format select Common Name. Ensure that DNS
name is the only option selected under Include this information in subject alternate
name
27
Click on the Security tab, click on the Add button and add AutoEnroll Client
Authentication Certificate group, assign Enroll and Autoenroll permissions and click
OK
28
You should remote any of the other security groups that have permissions to enroll and/or
autoenroll this certificate template.
From the Certificate Authority snap-in, right click on Certificate Templates, select
New Certificate Template to Issue.
29
Add the NPS Server account to the AutoEnroll Server Authentication Certificate
group
In the Select Users, Contacts, Computers, or Groups dialog box, in the Enter the
object names to select add ADDEVSRV01 computer account and click OK.
In the Select Users, Contacts, Computers, or Groups dialog box, in the Enter the
object names to select add ADDEVWKS01 computer account and click OK.
In the Select Users, Contacts, Computers, or Groups dialog box, in the Enter the
object names to select add ADDEVWKS01 computer account and click OK.
Expand Domain, expand Group Policy Objects, and select New Group Policy Objects.
On the New Group Policy dialog box, type Autoenroll Server Certificate and click OK
30
Right click on Autoenroll Server Certificate, select GPO Status, and select User
Configuration Settings Disabled
Link group policy to the organizational unit which contains the computer account of
your NPS server.
On the NPS server, open command prompt and run launch gpupdate.exe or restart
the server.
31
Open Server Manager from the Administrative Tools, expand Roles and select Add
Roles
On the Select Server Role page, select DHCP Server and click Next
32
On the Select Network Connection Binding page, select the Network Connection
and click Next
On the Specify IPv4 DNS Server Settings page, type the IP address of your preferred
DNS server and click Next
On the Specify IPv4 WINS Server Settings page, select WINS is not required and click
Next
33
On the Configure DHCPv6 Stateless Mode page, select Disable and click Next
On the Authorize DHCP Server page, select use Current Credentials and click Next
34
35
On the Scope Name page, type a name for the scope and click Next
On the IP Address Range page, specify Start and End IP address. Also specify the
correct subnet mask and click Next
36
On the Lease Duration page, specify a lease duration and click Next
37
On the Configure DHCP Option page, select No, I will configure these options later
and click Next
38
Expand Scope, right click on Scope Options and select Configure Options
On the Scope Options dialog box, select the following: 003 Router 10.32.10.254, 006
DNS Server 10.32.5.3, 015 DNS Domain Name addev.local and click OK
39
On the Scope Name page, type a name for the scope and click Next
On the IP Address Range page, specify Start and End IP address. Also specify the
correct subnet mask and click Next
40
On the Lease Duration page, specify a lease duration and click Next
On the Configure DHCP Option page, select No, I will configure these options later
and click Next
41
Expand Scope, right click on Scope Options and select Configure Options
On the Scope Options dialog box, select the following: 003 Router 10.32.20.254, 006
DNS Server 10.32.5.3, 015 DNS Domain Name addev.local and click OK
42
Configure DHCP Server with a scope for VLAN 99 (Authentication Fail VLAN)
On the Scope Name page, type a name for the scope and click Next
On the IP Address Range page, specify Start and End IP address. Also specify the
correct subnet mask and click Next
43
On the Lease Duration page, specify a lease duration and click Next
44
On the Configure DHCP Option page, select No, I will configure these options later
and click Next
45
Expand Scope, right click on Scope Options and select Configure Options
On the Scope Options dialog box, select the following: 003 Router 10.32.99.254, 006
DNS Server 10.32.5.3, 015 DNS Domain Name addev.local and click OK
Configure DHCP Server with a scope for VLAN 100 (Guest VLAN)
46
On the Scope Name page, type a name for the scope and click Next
On the IP Address Range page, specify Start and End IP address. Also specify the
correct subnet mask and click Next
47
On the Lease Duration page, specify a lease duration and click Next
On the Configure DHCP Option page, select No, I will configure these options later
and click Next
48
Expand Scope, right click on Scope Options and select Configure Options
On the Scope Options dialog box, select the following: 003 Router 10.32.100.254,
006 DNS Server 10.32.5.3, 015 DNS Domain Name addev.local and click OK
49
On the Select Server Role page, select Network Policy and Access Services, and click
Next
50
51
Configure Accounting
Expand RADIUS Clients and Servers, right click on RADIUS Clients and select New
RADIUS Client
On the New RADIUS Client dialog box, specify a friendly name and IP address
From the Vendor list box, select Cisco and specify a Shared Secret
52
53
Click OK
From the Network Policy Server Console, right click on Connection Request Policies
and select New
On the Specify Connection Request Policy Name and Connection Type page, type a
name for the policy and click Next
54
On the Specify Conditions page, click Add. Select NAS Port Type (Ethernet)
On the Select conditions dialog box, select NAS IPv4 Address and click Add
On the NAS IPv4 Address dialog box, type the management IP address of the switch.
55
From the Network Policy Server Console, right click on Network Policies and select
New
On the Specify Network Policy Name and Connection Type page, type a name for
your policy and click Next
56
From the Select Conditions dialog box, select NAS Port Type (Ethernet) and click Add
From the Select Condition dialog box, add the following Windows Groups Domain
Computers, Domain Users , and click Next
On the Specify Access Permissions page, select Access Granted and click Next
57
On the Select EAP dialog box, select Microsoft: Smart card or other Certificate and
click OK
58
Click on Vendor Specific attributes and add Microsoft Tunnel-Tag equal to 1, click OK
and click Next
59
From the Network Policy Server Console, right click on Network Policies and select
New
On the Specify Network Policy Name and Connection Type page, type a name for
your policy and click Next
60
From the Select Conditions dialog box, select NAS Port Type (Ethernet) and click Add
From the Select Condition dialog box, add the following Windows Groups Domain
Computers, Domain Users and click Next
On the Specify Access Permissions page, select Access Granted and click Next
On the Select EAP dialog box, select Microsoft: Protected EAP (PEAP)
61
62
Click on Vendor Specific attributes and add Microsoft Tunnel-Tag equal to 1, click OK
and click Next
63
From the Network Policy Server Console, right click on Network Policies and select
New
On the Specify Network Policy Name and Connection Type page, type a name for
your policy and click Next
64
From the Select Conditions dialog box, select NAS Port Type (Ethernet) and click Add
From the Select Condition dialog box, add the following Windows Groups Domain
Computers, Domain Users and click Next
On the Specify Access Permissions page, select Access Granted and click Next
65
On the Select EAP dialog box, select Microsoft: Protected EAP (PEAP)
66
67
Click on Vendor Specific attributes and add Microsoft Tunnel-Tag equal to 1, click OK
and click Next
68
You need to add the RADIUS attribute into your Network Policy.
Right click on the Network Policy, select Properties and click Settings
On the Add Standard RADIUS Attribute page, select Filter-Id and click Add
69
On the Attribute Information page, click String and type the ACL number
Click OK
70
Click OK
You need to add the Vendor attribute into your Network Policy.
Right click on the Network Policy, select Properties and click Settings
On the Add Vendor Specific Attribute page, select Cisco and click on Cisco-AV-Pair
and click Add
71
Click OK
72
Click OK
Configure Windows 7 client computers for 802.1x authentication via Group Policies
and PEAP-EAP-TLS
73
Configure Windows 7 client computers for 802.1x authentication via Network Sharing
Center and PEAP-EAP-MSCHAPv2
Configure Windows 7 client computers for 802.1x authentication via Network Sharing
Center and EAP-TLS
Configure Windows 7 client computers for 802.1x authentication via Network Sharing
Center and PEAP-EAP-TLS
Expand, Domain | Group Policy Objects | Group Policy, and select New Group Policy
Object. Type Secure Baseline Client Computers
Right click on Secure Baseline Client Computers, select GPO Status and select User
Configuration Settings Disabled.
74
Select Renew expired certificates, select Update certificates and click OK.
Select Define this Policy Setting, and change service startup mode to Automatic.
75
Click OK.
Right click on Wired Network Policies and select Create a New Windows Vista
Policy.
On the New Vista Wired Network Policy Properties dialog box, type a policy name
76
Click on the Security tab. Select Enable use of IEEE 802.1x authentication for
network access.
From the Select a network authentication method list box, select Smart Card or
certificate.
77
78
Open Network and sharing Center, and select Change adapter settings
79
Click OK
Clear Remember my credentials for this connection each time Im logged on and
enable Fallback to unauthorized network access
80
Click Additional Settings, select Specify authentication mode and select Computer
authentication from the list
81
Click OK
Open Network and sharing Center, and select Change adapter settings
On the Choose a network authentication method list box, select Microsoft: Smart
Card or other Certificate
Clear Remember my credentials for this connection each time Im logged on and
enable Fallback to unauthorized network access
82
Click Additional Settings, select Specify authentication mode and select Computer
authentication from the list
83
Click OK
Open Network and sharing Center, and select Change adapter settings
84
From the Select Authentication Method list box, select Smart Card or other
certificate and click OK
85
Clear Remember my credentials for this connection each time Im logged on and
enable Fallback to unauthorized network access
86
Click Additional Settings, select Specify authentication mode and select User or
Computer authentication from the list
87
Click OK
88
How to test
Power-on your Windows 7 client computer and configure the correct authentication method. When
restart your Windows 7 client, the client sends an authentication request. If authentication is
successful, the client computer receives an IP address from your DHCP server. If the client computer
is a member of Wired Computers VLAN 10, the client receives an IP address from the network range
10.32.10.50-60.
If authentication fails, the client becomes a member of VLAN 99 and receives an IP address in the
range of 10.32.99.50-60
89
If the client computer is successfully authenticated, you receive an IP address from VLAN 10
VLAN database
90
If the client computer fails authentication, you receive an IP address from VLAN 99
If the authentication method is not compatible, the client becomes a member of the
authentication fail VLAN
91
92
Description
Members of this group receive a certificate with the
purpose of server authentication
Members of this group receive a certificate with the
purpose of client authentication
Members of this group are placed into VLAN 10
Members of this group are placed into VLAN 20
93
F70D0101
6E65642D
30333031
06035504
74652D31
818D0030
64211110
C7573A55
BC3E8946
5061306E
030101FF
2E6C6F63
04050030
43657274
30303031
03132649
30383138
81890281
15FD804F
684B9F77
7AE41C17
921D0A44
30200603
616C301F
94
8B693799
69379998
5DBA2B67
B116D74C
D99F6422
83784498
98893530
8935300D
DF48378D
E943DA73
AA67F077
0788ACFD
100
95
interface Vlan99
ip address 10.32.99.254 255.255.255.0
ip helper-address 10.32.5.15
!
interface Vlan100
ip address 10.32.100.254 255.255.255.0
ip helper-address 10.32.5.15
!
ip http server
ip http secure-server
!
!
!
logging esm config
access-list 101 deny
tcp any host 10.32.5.3 eq www
access-list 101 permit ip any any
!
!
radius server addevdc01
address ipv4 10.32.5.15 auth-port 1812 acct-port 1813
key accessdenied
!
!
!
!
line con 0
line vty 0 4
password cisco
transport input ssh
line vty 5 15
password cisco
transport input ssh
!
end
addevsw01#
96