Configuring Steel-Belted RADIUS Proxy to Send
Grou
Attributes
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
Copyright 2007 Sophos Group. All rights
reserved. No part of this publication
may be reproduced, stored in retrieval
system, or transmitted, in any form or
by any means electronic, mechanical,
photocopying, recording or otherwise
unless you are either a valid licensee
where the documentation can be
reproduced in accordance with the license
terms or you otherwise have the prior
permission in writing of the copyright
owner.
All other product and company names
are trademarks or registered trademarks
of their respective owners.
Document version 3.0
Published July 2007
2
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
Table of Contents
About this Document.....................................................................................................................4
Configuring the Steel-Belted RADIUS Proxy.................................................................................4
Using the Sophos NAC Agent.....................................................................................................15
3
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
About this Document
The purpose of this document is to configure Steel-Belted RADIUS to pull group information from a remote directory
server and forward that information to Sophos NAC so that the group can be given a Sophos NAC policy without
the Sophos NAC application server having a direct connection to Active Directory or LDAP.
This document requires you to already configured IAS for Remote Proxy as described in the Post-Installation
Requirements in the Sophos NAC Installation Guide. This document also a ssu mes that Steel-Belted RADIUS is
already setup and installed on the server and is running on ports 1812, 1813, 1645 and 1646 (default port s for
Steel-Belted RADIUS). If it is not setup/running on these ports, you must modify these instructions to accommodate
for the changes.
If you plan on using Steel-Belted RADIUS to connect to an Active Directory Domain Controller to pull user/group
information, make sure the Steel-Belted RADIUS server is on the domain or is in a trusted domain for the
account/group information it will be pulling from. Also, make sure to use an account that is a member of the Domain
Admins Group so that you will have access to pull user/group information from AD.
Configuring the Steel-Belted RADIUS Proxy
1. Go to http://localhost:1812 and click the Launch link to start Steel-Belted RADIUS.
4
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
2. Login to Steel-Belted RADIUS.
3. Right-click RADIUS Clients and select Add.
5
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
4. Type the appropriate information in the fields.
▪ Name (1)
▪ Description (2)
▪ IP Address for the remote RADIUS client (3) (IP of the Sophos NAC application server)
▪ Shared Secret (4) (This must be the same password that was used in IAS when setting up the RADIUS
Proxy.)
5. Select Standard RADIUS from the Make or model (5) list box.
6. Click OK (6) to save your changes.
6
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
7. Select RADIUS Clients to verify the new entry.
8. Open c:\program files\Juniper Networks\Steel-Belted RADIUS\Service. This is the default location for radius.dct
file.
9. Open the radius.dct file.
7
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
10. In the radius.dct file, add the following lines for the following Sophos Dictionary attributes.
You can add all of the vendor-specific attributes, as shown below, but the one Sophos requires for configuration
is shown in this step.
11. Save the radius.dct file.
12. Restart the Steel-Belted RADIUS Service for the changes to take effect.
8
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
13. Log into the Steel-Belted RADIUS Admin application.
14. Right-click Profiles and select Add.
15. Type a name (1) and description (2) for the profile in the appropriate fields.
a
9
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
16. Click the Return List tab (3).
Note: You complete this step because you want RADIUS to send back the group attribute to the Sophos NAC
application server.
17. Click Add (4).
18. Locate and select the EF-Group Response (5).
19. Type in the group name that you want to pull for this profile (6), and click Add to add the Return List Attribute
20. Click Close. Note: That attribute is not a Multi-valued Attribute. Sophos NAC Advanced only supports single-valued
attributes.
21. Verify that your new Return List Attribute displays, and click OK.
22. Verify that the new profile displays in the profiles section.
10
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
23. Map the new profile to the domain group that the users are apart of in Active Directory. To do this, expand the
Users section, right-click Domains and click Add.
24. Click Browse to look for the possible users/groups to add (1).
11
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
25. Select the domain (2).
26. Click the Groups tab (3).
27. Select the appropriate group from the list (4) and click OK (5) to add the new group.
28. Verify that the Domain (1), User (2), and Name (3) are correct.
29. Type a description (4), and select the Use Profile check box (5).
12
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
30. Select the name of the profile you just created from the list box (6), and click OK (7).
Note: You can see the added Group and its corresponding profile. By configuring groups/profiles in this
manner, you can apply policies to whole groups of users, and then send the group attribute back to the Sophos
NAC application server using IAS so that a NAC policy can be applied to that group.
31. Open the radius.ini file located in c:\program files\Juniper Networks\Steel-B elted RADIUS\Service and add
authenticate only=0 in the configuration settings.
Note: This step forces Steel-Belted RADIUS to pass the attributes you created back to IAS.
13
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
32. Remove the null termination in the radius.ini file by setting the NoNullTermination = 1.
Note: Null termination must be turned off for NAC to map the policy with the group correctly.
33. Restart the Steel-Belted RADIUS service for the changes to take effect.
14
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes
Using the Sophos NAC Agent
When you use the Sophos NAC Agent with a valid username and password that exists in the domain users group in
Active Directory, an entry for this user appears in the Manage > Endpoints area of the Sophos NAC Web interface.
15
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.