When MD5 challenge. Reason-Code=19 Reason=The user could not be authenticated using Challenge Handshake Authentication Protocol(CHAP). Areversibly encrypted password does not exist for this user account. To ensure that reversibly encrypted passwords are enabled, check either the domain password policy or the password settings on the user account. ===================================================================== Issue: Solution: Windows 2000/2003 Server uses the new Active Directory security database. This is very different to the Windows NT Domain security structure. If the Perle is configured to use "NT Domain" Security with Windows 2000 servers or Windows Server 2003 servers then it will fail to authenticate. The solution is to use a security application, such as RADIUS/IAS that can interact with the Active Directory as the Perle 833's does support RADIUS authentication. IAS is also used by Windows Routing and Remote Access Service for authentication. Administrators to the Perle 833AS or 833IS products (connections via the Perle Management software or CLI) will be looked up on the RADIUS host and not with the local database unless the RADIUS server is offline then the Perle Manager will retry the authentication and then timeout after 5 minutes, then perform a local database lookup). Configure the Perle to use RADIUS security. The example is a simple setup based on a new installation of IAS. Note that if an there is an existing IAS setup then these instructions may not apply exactly as shown. Using Internet Authentication Service / RADIUS for security:
Set IAS to access the Active Directory (if using a Domain Controller) Add the Perle to the client list:
Create a policy to allow Domain Admin users to administer the Perle 833AS/IS ... NOTE: Admin user is not needed in RADIUS for the 833RAS unit:
Move this policy so that it appears as the first (top) policy in the Policy List. Create a policy to allow dialup access to all users that are members of a group (note that Windows may have a default Policy already that will permit any user with Dial In enabled, so this new policy would be optional. If you wish to use a new Policy then ensure that it appears above the default policy): The below example uses access based on a Group. Only those user's that are members of the Group are allowed access:
Ensure that the service is started. Additional NOTES: Reversibly Encrypted Passwords (CHAP) ... The current user passwords are not stored in a reversibly encrypted form by default and are not automatically changed. You must either manually reset the user password or set the user passwords to be changed the next time the user logs on to the LAN. This must be done for each user who will be authenticating via IAS. Once the password is changed, it is stored in a reversibly encrypted form. If you set user passwords to be changed the next time a user logs on, the user must log on by using a LAN connection and change the password before they attempt to log on with a remote access connection using CHAP. Users cannot change passwords during the authentication process when using CHAP. The logon attempt will fail. If the RADIUS configuration in the Perle has CHAP enabled then it will be the preferred method. To enable reversibly encrypted passwords for a specific user you can modify their User Properties -> Account options -> enable Store Password using Reversible Encryption. You must then reset their password. To enable reversibly encrypted passwords (CHAP) in a domain (Active Directory server) Group Policy:
To enable reversibly encrypted passwords (CHAP) in a domain (stand-alone server) Local Security Policy
Reversibly Encrypted Passwords can also be enabled on a Per-User basis by enabling it in the User Account profile also. Check with the Windows Event Viewer -> System Log for troubleshooting. example message:
In this example one of two problems is detected. Note: if the shared secret is mismatched then IAS may record a "User Is Granted Access" event or deny access with an "Unknown user or bad password" message. The Manager/Dial in Client will fail to connect; with reason of an unknown user or a bad password. If the Active Directory user account does not have Dial In enabled then IAS will deny access and record a message stating "Unknown user or bad password" If something goes wrong and you cannot access the 833IS or 833AS unit via Manager then you disable the IAS service and the Perle will timeout after 5 minutes and then perform a local user list lookup (this access is only available from LAN management and does not apply to dial in connnections). On the 833IS you can also telnet to the unit:
** In the most extreme case some Perle customers have reported that the IAS service had to be reinstalled due to a system problem where IAS was not returning the correct information to the Perle **
Related Articles:
|
公告版位
大家好,我是小雷,喜歡上網,分享生活的點點滴滴。若有什麼問題,可以留言給我。歡迎來參觀哦...
- Sep 30 Fri 2011 17:05
802.1x MD5 Windows IAS Problem
全站熱搜
留言列表
發表留言