Integrations

Microsoft NPS Integration

36min

Overview

Configuring a Microsoft RADIUS server provides superior authentication security: enables group policy enforcement for network segmentation, and provides record event logs for accounting purposes.

Combining a secure Microsoft RADIUS server with certificate solutions creates a network environment that is strongly protected, and a straightforward experience for users.

Prerequisites

  • Microsoft NPS RADIUS Server
  • Identity Provider
  • Administrator rights to Nile Portal
  • Administrator rights to Microsoft NPS

Configuring Nile Authentication Server (RADIUS)

  • Log onto Nile Portal:
    https://u1.nile-global.cloud/
  • Navigate to
  • Click on the + (add authentication button) to create a new Microsoft NPS RADIUS authentication configuration:



Document image

  • Fill in the Microsoft NPS server information:
    • RADIUS server Name (Any name example SE HQ NPS)
    • Up to three RADIUS IP addresses
    • RADIUS Authentication Port; default 1812/UDP
    • RADIUS Shared secret (pre-shared key that need to same NPS client pre-shard key)
    • Nile Geo scope (Site): Nile supports one RADIUS server per Geo scope.
  • Click on DISPLAY NAS IP’S to get Nile Service Block NAS IP address that need to be added as Microsoft NPS client.



Document image

  • The result is shown in the entry panel:



Document image

  • Click on Save and verify the server added to the Authentication device list



Document image


Configuring NPS Server

  • Go to
  • In the Console, navigate to
  • In the Add/Remove Snap-in window, select
  • In the
  • Click the
  • In the Add/Remove Snap-in window, click the



Document image


  • In the Console, navigate to NPS (Local) side menu
  • In the “Standard Configuration” panel, select “RADIUS server for 802.1x Wireless or Wired Connections” from the pull-down list
  • Click on “+ Configure 8201.X” link: this launches the 802.1x configuration wizard.



Document image

  • Select
  • Add “Nile” to the beginning of the name
  • Click the



Document image

  • Click the



Document image

  • Use “Nile NSB” as the Friendly name
  • Fill in “Address (IP or DNS)” with the NAS IP address provided by the Nile Portal
  • Click the
  • Enter the secret that matches the one in the Nile Portal Authentication settings.
  • Click on



Document image

  • This policy example allows only domain users;, to add these three conditions click the Next button



Document image

  • Select Authentication Type – Microsoft: Protected EAP (PEAP) and click on Next



Document image

  • Windows Groups – select user groups for the policy. In our example, we will select “Domain Users” groups. Then click on Next.



Document image

  • For traffic controls, just click on the



Document image

  • Click on the



Document image


Note: This is just an example. You can modify the policy to meet your requirements.

For Machine Authentication or user authentication using a certificate, please select “Microsoft: Smart Card or other certificates.”

  • In the left-hand menu, under “Policies” select “Connection Request Policies”
  • Click the entry “Nile Secure Wireless Connections”.



Document image

  • In the left-hand menu, under “Policies”, select “Network Policies”.



Document image

  • Verify the information as shown.

RADIUS Service Monitoring and Troubleshooting

  • Nile supports RADIUS transaction monitoring for service availability, For monitoring, Nile will send an authentication request with a dummy user account “user name nile-network-test”, RADIUS will respond with a rejection which confirms RADIUS service is available.
  • An administrator has the option to use an active directory user for monitoring or can run a one-time verification for troubleshooting only, Nile supports MS-CHAPv2 for RADIUS monitoring and requires an NPS policy for verification. Example: to allow Nile account verification, we need to have an NPS policy that allows MS-CHAP for local NPS (127.0.0.1)
  • Create a new connection request policy name Nile_Host_Verifcation



Document image


Document image


Document image


Document image

  • Create a new Network policy name Nile_Host_Verifcation



Document image


Document image


Document image


Document image


Document image

  • To verify RADIUS authentication, log onto Nile Portal:
    https://u1.nile-global.cloud/
  • Navigate to
  • Click on the blue RADIUS hostname (Example SE HQ NPS)



Document image

  • From RADIUS configuration modification page, click on



Document image


A new pop-up window opens.

Document image

  • User Id: MS Windows AD User account
  • Password: User account password
  • Save credentials for monitoring (Optional to use the account for Nile availability monitoring) if the testing account is not saved, Nile will use a dummy account for monitoring.
  • Click on the



Document image

  • If authentication is successful, a green circle with an arrow will display beside RADIUS host IP.



Document image

  • You can verify Windows NPS logs for success or failure authentication.



Document image

Document image


Configuring Nile Segments and Wireless SSIDs (RADIUS)

  • Log onto Nile Portal:
    https://u1.nile-global.cloud/
  • Navigate to
  • Click on  button; this opens a new Segment configuration panel
  • In the
  • Navigate to
  • Click the
  • Select (1) all sites, (2) one site, or (3) one zone, using the radio buttons and associated lists
  • Select the authentication server from the Authentication pull-down list.
  • Select the DHCP server from the DHCP pull-down list.
  • Select the subnet(s) from the Subnet pull-down list — you may select one or more
  • Click the



Document image

  • Navigate to
  • Click on ? button; this creates a new SSID
  • Click the Enterprise radio button
  • Enter the Name for the SSID: this will be what the APs will use as a beacon
  • Select the security type from the Security pull-down list
  • Select the segment created earlier. (Example ND_Employee segment)
  • Verify that you have entered the correct information



Document image

  • Press the

Microsoft NPS Wireless 802.1x Connection Test

  • From a Wireless-capable client device, select Nile 802.1x SSID; log in using a domain user member; and, verify that device connects to the SSID.Note: First-time clients need to accept the certificate and connect to the network using 802.1x; user needs to click on the



Document image

  • Verify sign-in info and IP address. IP needs to be from segment subnet range; in our example 192.168.112.0/26 for ND_Employee



Document image


Verify NPS logs:

  • Open Event Viewer, and then, under Custom views, select
  • If needed, filter for events that have Event ID 6273 or 6274. Most authentication failures produce these events.



Document image


Nile Segment mapping with Microsoft NPS Radius Server

  • Log onto Nile Portal:
    https://u1.nile-global.cloud/
  • Navigate to
  • Click on the ? (edit) icon next to the name of the SSID, to edit the wireless SSID
  • Add an additional segment from the drop-down list.



You may need to go back at look at the definitions of the segments in your list. In this example (Nile Portal ® Settings button → Segments tab → edit ssidND_Employee” ® Service area subtab), “segment ND_Employee” is configured with Microsoft NPS as an authentication server and IP address Subnet 192.168.112.0/26:

Document image




Document image


and (Nile Portal ® Settings button ® Segments tab ® edit ssidND_Contractor” ® Service area subtab) segment “ND_Contractor” is configured with Microsoft NPS as an authentication server and IP address Subnet 192.168.116.0/26:



Document image

  • In the Console, navigate to NPS (Local)
  • Click on the Edit button.
  • Select Setting
  • click on the



Document image

  • From the
  • Click on attribute
  • This will use the tunnel group ID RADIUS standard attribute to assign Nile segment name to policy members.



Document image

  • In Attribute Information, click the
  • Enter the segment name into the value field for the attribute. The segment name is case sensitive.



Document image

  • Click on the



Document image

  • Click the



Document image

  • Verify RADIUS standard attributes.
  • Click the



Document image

  • Verify sign-in info and IP address. IP needs to be from segment subnet rang (in our example 192.168.116.0/26 for ND_Contractor)



Note: NPS is a Microsoft Windows service. Adding or changing configs might require restarting the service. To restart, in the Console, navigate to NPS (Local), right-click on NPS (local), select Stops NPS Service to stop NPS and then select Start NPS Service.

Document image




Document image