Radius Nokia Router – Use daloRadius to authenticate access for 7750SR (SROS)

Radius Nokia Router - Use daloRadius to authenticate access for 7750SR (SROS)

Centralized authentication is really important in managing and decentralizing the administration and operation of the network. The radius protocol is the commonly used solution these days. This article, I will introduce how to use daloRadius to authenticate access for router nokia 7750SR (SROS) and/or Configure radius on router nokia 7750 SR with daloRadius

Equipment and connection models

We use the following simple model:

  • User in PC want to telnet/ssh to router 7750SR
  • Router 7750SR uses radius for authentication and authorization
  • Radius server use DaloRadius with ip login 10.18.8.95 (Same subnet with my lab, You can install it according to your lab environment).

You need to install the following tools:

Refer to the article How to emulate Nokia Service Router (TiMOS SROS). All resources you can download at the end of the article.

Configuration on router nokia 7750

I will skip the basic interface configuration. This is the important configuration when setting the radius. To enable radius validation on nokia router we need 2 steps:

Step 1: Need to define parameters to shake hands with radius server like IP Server and Secret. In this lab, we enable authorization radius server with address 10.1.2.1 and secret test123

/configure system security radius
authorization
server 1 address 10.1.2.1 secret test123

Step 2: Turn on the priority of radius validation to the top, to authenticate through the local router in the second. In case the radius server cannot be verified, you can use the information authentication through the internal router.

/configure system security password authentication-order radius local

In addition, to be able to telnet to the device we need to enable telnet on the router. The default SSH is enabled.

/configure system security telnet-server

We can set up profiles for each account group such as: Administrator, Operation or only for View. In this lab we will use the default profile. You can create your own for testing.

#Default profile administrator
A:h2ttool.com# configure system security profile "administrative" 
A:h2ttool.com>config>system>security>profile# info 
----------------------------------------------
                netconf
                    base-op-authorization
                        action
                        cancel-commit
                        close-session
                        commit
                        copy-config
                        create-subscription
                        delete-config
                        discard-changes
                        edit-config
                        get
                        get-config
                        get-data
                        get-schema
                        kill-session
                        lock
                        validate
                    exit
                exit
                entry 10
                    match "configure system security"
                    action permit
                exit
                entry 20
                    match "show system security"
                    action permit
                exit
                entry 30
                    match "tools perform security"
                    action permit
                exit
                entry 40
                    match "tools dump security"
                    action permit
                exit
                entry 50
                    match "admin system security"
                    action permit
                exit
                entry 100
                    match "configure li"
                    action deny
                exit
                entry 110             
                    match "show li"
                    action deny
                exit
                entry 111
                    match "clear li"
                    action deny
                exit
                entry 112
                    match "tools dump li"
                    action deny
                exit
----------------------------------------------
A:h2ttool.com>config>system>security>profile# 

To check radius is working or not, we use debug and send information to log-id 88.

#Enable log
/configure log
        log-id 88 name "88"
            from debug-trace
            to memory
            no shutdown
        exit

#Enable debug
/debug
    router "Base"
        radius
            packet-type authentication
            detail-level medium
        exit
    exit
exit

Configuration on daloRadius

We start installing daloRadius to shake hands with router 7750. Use Secret is test123

Connect daloRadius with router Nokia 7750 SR
Connect daloRadius with router Nokia 7750 SR

Step 1: Setting Up Network Access Server (NAS) on daloRADIUS

Management >>Nas >> New NAS >> Fill in the required information >> Apply

  • NAS IP/Host: IP of router. In this case is 10.1.2.2
  • NAS Secret: The same with secret of router for authentication. In this case is test123
  • NAS Type: Choose other
  • NAS Shortname: Type whatever you want, this for eazy remember.
Setting Up Network Access Server (NAS) on daloRADIUS
Setting Up Network Access Server (NAS) on daloRADIUS

!!! Important Note !!!: After doing this step, you must restart daloRadius Server for this function to work correctly.

Step 2: Create new attribute on daloRadius

Some attributes of Nokia Router are not common so default will not be available. We need to add it to be able to use it. You can refer to the list of attributes of Nokia SROS in Nokia Document or download it at the end of this article.

In this article, we need to create 3 attributes as follows:

Attribute NameTypeDescription
Timetra-Accessinteger– Specifies the type of access (FTP, console access or both) the user is permitted.
– 1=ftp, 2=console (serial port, Telnet and SSH(SCP)), 3=both
Timetra-ProfilestringThe user profile(s) that the user has access to and refers to pre-configured user-profile-name’s (configure system security profile <user-profile-name>).
Timetra-Default-Actioninteger– Specifies the default action (permit-all, deny-all or none) when the user has entered a command and none of the commands-strings in [26-6527-6]Timetra-Cmd resulted in a match condition.
The attribute is mandatory and required even if the [36-6527-6] Timetra-Cmd’s are not used.
– 1=permit-all, 2=deny-all, 3=none
Some CLI User Authentication and Authorization Attributes of Nokia SROS

Create 3 new attributes on daloRadius by following step:

Management >>Attributes >> New Vendor Attribute >> Fill in the required information >> Apply

  • Vendor Name: Nokia
  • Attribute: Attribute Name
  • Type: Type
  • Recommended OP: =
  • Recommended Table: reply
Create new attribute on daloRadius

You can check the attributes you have entered in the Search Attribute or List Attributes for Vendor menu.

Step 3: Create new Profiles in daloRadius

Creating profiles for each administrative group is necessary to make it easier to manage. In this article, we create a profile for the administrator to have full control over a router.

Management >> Profiles >> New Profile >> Fill in the required information

  • Profile Name: Name of profile, this example is FULL-ADMIN
  • Tick to Quick Locate attribute with autocomplete input. Let’s type timetra… and add 3 attributes like bellow picture.
Create new Profiles in daloRadius
Create new Profiles in daloRadius

After adding all 3 items (Timetra-Access, Timetra-Default-Action and Timetra-Profile), please scroll down and fill in all the information, then scroll up and click apply.

  • Timetra-Access: 3 – Both FTP and Console (SSH,TELNET) allow
  • Timetra-Profile: administrator (Profile in /configure system security in router, must have)
  • Timetra-Default-Action: 1=permit-all
Set values for Attribute daloRadius
Set values for Attribute daloRadius

Once done, you can click on List Profiles to check if it’s done correctly or not.

Step 4: Create new Uses for access to router

To create a user account to access the nokia sros router device, follow these steps:

Management >> Users >> New User >> Fill in the required information >> Apply

  • Username: test – account to console
  • Password: test123 – password to console
  • Group: FULL-ADMIN – Profile in step 3
Create new Uses for access to router
Create new Uses for access to router

Select List Users to display the accounts that have been created.

Check radius validation

Perform telnet or ssh from PC to 7750SR with username/password: test/test123. Perform operations with the highest privileges such as configuring system security. Checking debug logs like bellow:

A:h2ttool.com# show log log-id 88 

===============================================================================
Event Log 88 log-name 88
===============================================================================
Description : (Not Specified)
Memory Log contents  [size=100   next event=5  (not wrapped)]

4 2021/08/02 23:47:35.394 UTC MINOR: DEBUG #2001 Base RADIUS
"RADIUS: Receive
  Access-Accept(2) id 231 len 66 from 10.1.2.1:1812 vrid 1 pol AAAPolicy
    VSA [26] 6 Nokia(6527)
      ACCESS [1] 4 ftp console(3)
    VSA [26] 16 Nokia(6527)
      PROFILE [4] 14 administrative
    VSA [26] 6 Nokia(6527)
      DEFAULT ACTION [5] 4 permit all(1)

"

3 2021/08/02 23:47:35.392 UTC MINOR: DEBUG #2001 Base RADIUS
"RADIUS: Transmit
  Access-Request(1) 10.1.2.1:1812 id 231 len 69 vrid 1 pol AAAPolicy
    USER NAME [1] 4 test              
    PASSWORD [2] 16 sMiWwdhUg4rfDCFY808jVk
    NAS IP ADDRESS [4] 4 1.1.1.1
    CALLING STATION ID [31] 11 192.168.1.2
    NAS PORT TYPE [61] 4 Virtual(5)

"
Check configure radius on router nokia 7750 SR with daloRadius
Check configure radius on router nokia 7750 SR with daloRadius

References and Download

You can download resources for practice below:

  • DaloRadius qcow2 file for UNL or PNETLAB
  • Document: SROS_RADIUS_Attrib_CLI part User Authentication and Authorization
  • Document: Virtual Machine – daloRADIUS Administrator Guide
  • Configuration and UNL files.

Feel free to ask questions or discuss in the comments section below. Good luck.

Để lại một bình luận