Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

RADIUS Authentication w/ Microsoft NPS- Starter Connection Request Policy?

Hi all!

 

Background:

I'm looking at Sophos UTM 9 as a remote access (SSL) VPN server w/ RADIUS authentication. The RADIUS server is Windows Server 2016 running NPS. I've added NPS as an authentication server in WebAdmin and test server settings passes.

However, authenticate example user fails. Looking at the Windows NPS logs, each example user attempt results in an error code 49- incorrect Connection Request policy.

Question:

Is there a bare-bones Connection Request policy out there to test with? I'm new to RADIUS and Sophos' documentation was less than helpful (could be my skill level though, too).

Thank you in advance!



This thread was automatically locked due to age.
Parents Reply Children
  • Thank y'all for your prompt replies :) I failed to include in my initial post I do have test policies in place.

    Despite the policies being the most permissive, the Windows NPS logs throw errors 48/49- no applicable policies were found to permit the request received from Sophos.

    Connection Request Policy:

    * Enabled

    * Type of network access server: unspecified

    * Conditions: Day and time restrictions- permit all

    * Authentication Methods: override network policy authentication settings; all EAP allowed

    Network Policy:

    * Enabled

    * Grant access

    * Type of network access server: unspecified

    * Conditions: Day and time restrictions - permit all

    * Constraints: All EAP types enabled, all Less secure authentication methods enabled except Allow clients to connect without negotiating an authentication method

    * Settings: None

  • As I said, have you tried a real VPN connection, rather than the SOPHOS radius test?

  • Funny, Andrew, I don't know why I copied that section about the HTTP Proxy from my list of Community Links.  It does address Backend Groups based on AD, but ???

    All of my clients that have AD use AD Backend Groups to authenticate SSL VPN Remote Access.  I only recommend RADIUS for IPsec, PPTP and WPA2 Enterprise auth with Wireless Protection - otherwise, it's just a hassle to use this "ancient" (eight+ years older than AD) method that, in essence, rides on top of AD.

    Cheers  Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA