I have a Mac Pro 2,1 and I am stuck on Snow Leopard. The reason is that for a while Apple shipped the operating systems with both a 32-bit and a 64-bit version of the kernel. The Mac Pro 2,1 will never be able to run the 64-bit kernel because the EFFI32 boot rom just won't do it. Note: The headings on this list indicate the Macintosh System bundle names; the bullet points indicate the version of the System File included in that bundle. This is to make it clearer for people searching for specific bundle versions as opposed to System File versions. Finder File versions are not indicated. 1 Classic Mac OS 1.1 Macintosh System Software (0 - 0.3) 1.1.1 System File 1 1.1.2. RADIUS MAC Authentication. When you enable secondary authorization on your network, a wireless user first authenticates on the wireless network, and then the device used to connect to the network is authenticated to determine whether it is an authorized device. Android has support for 802.1X since the release of 1.6 Donut. Chrome OS has supported 802.1X since mid-2011. Mac OS X has offered native support since 10.3. Avenda Systems provides a supplicant for Windows, Linux and Mac OS X. They also have a plugin for the Microsoft NAP framework. Avenda also offers health checking agents. Mac OS X Server v10.2系列の最終バージョンは、10.2.8であり、セキュリティアップデートは2005年1月で終了している。 Mac OS X Server 10.3. 2003年10月 - Mac OS X Server v10.3 (Panther Server) が発売された。.
Published on 7 Dec 2006 · Filed in Tutorial · 1196 words (estimated 6 minutes to read)The idea behind 802.1x is to provide Layer 2 authentication; that is, to authenticate LAN clients at the Ethernet layer. (This is before the client gets a DHCP lease or anything of that nature.) With 802.1x in place, rogue users can’t just tap into a physical connection on the network. In order to gain network connectivity, the device must authenticate before network traffic is allowed.
The idea here is to configure 802.1x authentication on a network switch in such a way as to leverage the existing authentication infrastructure provided by Active Directory. Like it or not, Active Directory is a widely deployed directory service and leveraging it where we can will certainly provide an advantage. This process uses RADIUS to provide an interface between a Cisco Catalyst 3560G switch (the 802.1x authenticator in this scenario) and Active Directory. I could only test Mac OS X as the client (or 802.1x supplicant), but I’m confident that the configuration will work equally well with Windows XP Professional.
The Catalyst switch I used in this configuration was running IOS 12.2(25); please note that the commands listed here may be different in different versions of IOS.
To configure the switch for 802.1x authentication, three steps are involved:
Enable 802.1x authentication on the switch (global configuration).
Configure the RADIUS server(s) to which the switch will communicate for authentication requests.
Enable 802.1x authentication on the individual ports.
(This document from the Cisco web site was tremendously helpful in configuring 802.1x.)
First, to enable 802.1x authentication on the switch, use the following commands in global configuration mode:
This enables 802.1x globally on the switch, but none of the interfaces are enabled for 802.1x authentication. Next, we configure the RADIUS server(s) to which the switch will pass the 802.1x authentication traffic. That’s handled with these commands in global configuration mode:
(This should all be on one line.) Note that the “auth-port” and “acct-port” parameters are only necessary if you are using nonstandard ports. Since Microsoft’s IAS (Internet Authentication Service, which provides the RADIUS interface to Active Directory) uses both sets of standard ports (1645/1812 and 1646/1813) you won’t need to specify these parameters. The “key” parameter is a shared secret key between the RADIUS client (the switch) and the RADIUS server. Obviously, you’ll want to use something other than “Password”.
Finally, to enable 802.1x on the applicable interfaces, you’ll use these commands in interface configuration mode (replace gi0/23
with the interface you want to configure):
That enables 802.1x authentication on that specific port. Repeat the process for all ports that should use 802.1x authentication. Note that some ports can’t be enabled for 802.1x authentication; most notably, trunk ports can’t be used for 802.1x. Refer to the Cisco documentation (or the documentation from your particular vendor) for complete details on the limitations.
Now that the switch is configured, we move on to configuring Active Directory.
I suppose that saying we need to “configure Active Directory” isn’t entirely accurate, since no configuration changes and no schema extensions are necessary to make this work. All that really needs to be done is to enable reversible password encryption (which can be done on a per-user basis) and setup Internet Authentication Service (IAS).
First, regarding reversible password encryption: The configuration described here uses MD5 hashes (passwords) to authenticate clients to the network. There are other methods, such as digital certificates, to accomplish the same thing, and I’ll probably revisit this configuration again at a later date to look at using those. For now, though, the use of MD5 for authentication means that we have to enable reversible password encryption for every user that will need to authenticate via 802.1x, and those users will need to change their passwords after that change is made. A pain, yes, and a potential security concern, yes, but necessary at this point. (I won’t bother going through the details of enabling reversible password encryption here; there are plenty of resources available on the Internet, like this one, that provide that information.)
Configuring IAS is really pretty straightforward. I’ve discussed the use of IAS before (here in discussing Cisco PIX-AD integration and here regarding WatchGuard Firebox-AD integration), and I’ll refer you back to those articles for some of the basics on setting up and configuring IAS.
To configure IAS in this instance (once it has been installed and registered with Active Directory), we’ll do the following:
Add the Cisco Catalyst switch as a RADIUS client. We’ll need to be sure to specify the same shared secret as used in the switch configuration.
We’ll create a new remote access policy. The conditions on the policy should be “NAS-Port-Type” (set to Ethernet) and “Windows-Groups” (set to whatever group should be allowed to authenticate via 802.1x; I used Domain Users).
The profile associated with this policy should be edited to note only the EAP MD5 authentication type (under “EAP Methods” on the Authentication tab); all other authentication types should be unchecked. In addition, all encryption types on the Encryption tab should be unchecked except for “No encryption”.
At this point, the IAS configuration should be complete. Now for the final step: configuring the client to use 802.1x.
As mentioned earlier, I didn’t have a physical Windows XP Professional-based machine to test with, but I did do some testing with Mac OS X. Although the software used to configure the operating system is different, the overall configuration is similar and should work without any major hitches on Windows XP.
To configure Mac OS X, launch the Internet Connect software in the Applications folder and follow these steps:
From the File menu, choose “New 802.1X Connection…'.
Specify a description and choose the appropriate network port (typically “Built-in Ethernet”).
Specify a username and password.
For authentication types, click to enable MD5 and move it to the top of the list. Uncheck all other authentication types.
Click OK to save the connection.
Once the connection has been defined, you can plug your OS X-based system into one of the 802.1x-enabled ports and click “Connect” in the Internet Connect window. If everything is configured correctly, you should be connected and be able to pass network traffic without any issues. If things don’t work, go back and check the switch configuration and the logs on the IAS/RADIUS server. In particular, the logs may indicate that an incorrect password was used, or you may be able to determine that the switch isn’t even talking to the IAS/RADIUS server (perhaps a typo in the server address?).
By the way, configuring Mac OS X to use 802.1x for wireless connections is equally easy and done the same way (using Internet Connect). I used to regularly use my MacBook Pro in an environment that used 802.1x and EAP-FAST/LEAP for wireless authentication with no problems.
Future enhancements to this configuration include switching from EAP-MD5 to something like EAP-TLS or PEAP; this will avoid the need to enable reversible password encryption on the domain.
Be social and share this post!
Sub-menu:/radius
Standards:RADIUS RFC 2865
RADIUS, short for Remote Authentication Dial-In User Service, is a remote server that provides authentication and accounting facilities to various network apliances. RADIUS authentication and accounting gives the ISP or network administrator ability to manage PPP user access and accounting from one server throughout a large network. The MikroTik RouterOS has a RADIUS client which can authenticate for HotSpot, PPP, PPPoE, PPTP, L2TP and ISDN connections. The attributes received from RADIUS server override the ones set in the default profile, but if some parameters are not received they are taken from the respective default profile.
The RADIUS server database is consulted only if no matching user acces record is found in router's local database.
Traffic is accounted locally with MikroTik Traffic Flow and Cisco IP pairs and snapshot image can be gathered using Syslog utilities. If RADIUS accounting is enabled, accounting information is also sent to the RADIUS server default for that service.
This sub-menu allows to add/remove RADIUS clients.
Note: The order of added items in this list is significant.
Property | Description |
---|---|
accounting-backup (yes no; Default: no) | Whether configuration is for backup RADIUS server |
accounting-port (integer [1..65535]; Default: 1813) | RADIUS server port used for accounting |
address (IPv4/IPv6 address; Default: 0.0.0.0) | IPv4 or IPv6 address of RADIUS server. |
authentication-port (integer [1..65535]; Default: 1812) | RADIUS server port used for authentication. |
called-id (string; Default: ) | Value depends on Point-to-Point protocol: PPPoE - service name, PPTP - server's IP address, L2TP - server's IP address. |
certificate (string; Default: ) | Certificate file to use for communicating with RADIUS Server with RadSec enabled. |
comment (string; Default: ) | |
disabled (yes no; Default: no) | |
domain (string; Default: ) | Microsoft Windows domain of client passed to RADIUS servers that require domain validation. |
protocol (radsec udp; Default: udp) | Specifies the protocol to use when communicating with RADIUS Server. |
realm (string; Default: ) | Explicitly stated realm (user domain), so the users do not have to provide proper ISP domain name in user name. |
secret (string; Default: ) | Shared secret used to access the RADIUS server. |
service (ppp login hotspot wireless dhcp; Default: ) | Router services that will use this RADIUS server:
|
src-address (ipv4/ipv6 address; Default: 0.0.0.0) | Source IP/IPv6 address of the packets sent to RADIUS server |
timeout (time; Default: 100ms) | Timeout after which the request should be resend |
Note: Microsoft Windows clients send their usernames in form domainusername
Note: When RADIUS server is authenticating user with CHAP, MS-CHAPv1, MS-CHAPv2, it is not using shared secret, secret is used only in authentication reply, and router is verifying it. So if you have wrong shared secret, RADIUS server will accept request, but router won't accept reply. You can see that with /radius monitor command, 'bad-replies' number should increase whenever somebody tries to connect.
Warning: If RadSec is enabled, make sure your RADIUS Server is using 'radsec' as the shared secret, otherwise RADIUS Server will not be able to decrypt data correctly (unprintable characters). With RadSec RouterOS forces the shared secret to 'radsec' regardless of what has been set manually (RFC6614). You can find configuration example with FreeRADIUS 3.x in the following link: https://wiki.geant.org/display/H2eduroam/freeradius3-flr
Note: Make sure the specified certificate is trusted.
Sub-menu:/radius incoming
This facility supports unsolicited messages sent from RADIUS server. Unsolicited messages extend RADIUS protocol commands, that allow to terminate a session which has already been connected from RADIUS server. For this purpose DM (Disconnect-Messages) are used. Disconnect messages cause a user session to be terminated immediately.
Note: RouterOS doesn't support POD (Packet of Disconnect) the other RADIUS access request packet that performs a similar function as Disconnect Messages
Property | Description |
---|---|
accept (yes no; Default: no) | Whether to accept the unsolicited messages |
port (integer; Default: 1700) | The port number to listen for the requests on |
Here you can download the RADIUS reference dictionary, which incorporates all the needed RADIUS attributes. This dictionary is the minimal dictionary, which is enough to support all features of MikroTik RouterOS. It is designed for FreeRADIUS, but may also be used with many other UNIX RADIUS servers (eg. XTRadius).
Note: it may conflict with the default configuration files of RADIUS server, which have references to the Attributes, absent in this dictionary. Please correct the configuration files, not the dictionary, as no other Attributes are supported by MikroTik RouterOS.
There is also the RADIUS MikroTik specific dictionary that can be included in an existing dictionary to support MikroTik vendor-specific Attributes.
Depending on authentication methods (NOTE: HotSpot uses CHAP by default and may use also PAP if unencrypted passwords are enabled, it can not use MSCHAP):
NOTE: if Framed-IP-Address or Framed-Pool is specified it overrides remote-address in default configuration
Note: the received attributes override the default ones (set in the default profile), but if an attribute is not received from RADIUS server, the default one is to be used.
Rate-Limit takes precedence over all other ways to specify data rate for the client. Ascend data rate attributes are considered second; and WISPr attributes takes the last precedence.
Here are some Rate-Limit examples:
The accounting request carries the same attributes as Access Request, plus these ones:
Additionally to the accounting start request, the following messages will contain the following attributes:
These packets will, additionally to the Interim Update packets, have:
RADIUS disconnect and Change of Authorization (according to RFC3576) are supported as well. These attributes may be changed by a CoA request from the RADIUS server:
Note that it is not possible to change IP address, pool or routes that way - for such changes a user must be disconnected first.
Click here to get plain text attribute list of MikroTik specific attributes (FreeRadius comaptible) .
Name | VendorID | Value | RFC |
---|---|---|---|
MIKROTIK_RECV_LIMIT | 14988 | 1 | |
MIKROTIK_XMIT_LIMIT | 14988 | 2 | |
MIKROTIK_GROUP | 14988 | 3 | |
MIKROTIK_WIRELESS_FORWARD | 14988 | 4 | |
MIKROTIK_WIRELESS_SKIPDOT1X | 14988 | 5 | |
MIKROTIK_WIRELESS_ENCALGO | 14988 | 6 | |
MIKROTIK_WIRELESS_ENCKEY | 14988 | 7 | |
MIKROTIK_RATE_LIMIT | 14988 | 8 | |
MIKROTIK_REALM | 14988 | 9 | |
MIKROTIK_HOST_IP | 14988 | 10 | |
MIKROTIK_MARK_ID | 14988 | 11 | |
MIKROTIK_ADVERTISE_URL | 14988 | 12 | |
MIKROTIK_ADVERTISE_INTERVAL | 14988 | 13 | |
MIKROTIK_RECV_LIMIT_GIGAWORDS | 14988 | 14 | |
MIKROTIK_XMIT_LIMIT_GIGAWORDS | 14988 | 15 | |
MIKROTIK_WIRELESS_PSK | 14988 | 16 | |
MIKROTIK_TOTAL_LIMIT | 14988 | 17 | |
MIKROTIK_TOTAL_LIMIT_GIGAWORDS | 14988 | 18 | |
MIKROTIK_ADDRESS_LIST | 14988 | 19 | |
MIKROTIK_WIRELESS_MPKEY | 14988 | 20 | |
MIKROTIK_WIRELESS_COMMENT | 14988 | 21 | |
MIKROTIK_DELEGATED_IPV6_POOL | 14988 | 22 | |
MIKROTIK_DHCP_OPTION_SET | 14988 | 23 | |
MIKROTIK_DHCP_OPTION_PARAM_STR1 | 14988 | 24 | |
MIKROTIK_DHCP_OPTION_PARAM_STR2 | 14988 | 25 | |
MIKROTIK_WIRELESS_VLANID | 14988 | 26 | |
MIKROTIK_WIRELESS_VLANIDTYPE | 14988 | 27 | |
MIKROTIK_WIRELESS_MINSIGNAL | 14988 | 28 | |
MIKROTIK_WIRELESS_MAXSIGNAL | 14988 | 29 |
Note: FreeRadius already has these attributes predefined. If you are using other radius server then use table below to create dictionary file
Name | VendorID | Value | RFC |
---|---|---|---|
Acct-Authentic | 45 | RFC 2866 | |
Acct-Delay-Time | 41 | RFC 2866 | |
Acct-Input-Gigawords | 52 | RFC 2869 | |
Acct-Input-Octets | 42 | RFC 2866 | |
Acct-Input-Packets | 47 | RFC 2866 | |
Acct-Interim-Interval | 85 | RFC 2869 | |
Acct-Output-Gigawords | 53 | RFC 2869 | |
Acct-Output-Octets | 43 | RFC 2866 | |
Acct-Output-Packets | 48 | RFC 2866 | |
Acct-Session-Id | 44 | RFC 2866 | |
Acct-Session-Time | 46 | RFC 2866 | |
Acct-Status-Type | 40 | RFC 2866 | |
Acct-Terminate-Cause | 49 | RFC 2866 | |
Ascend-Client-Gateway | 529 | 132 | |
Ascend-Data-Rate | 529 | 197 | |
Ascend-Xmit-Rate | 529 | 255 | |
Called-Station-Id | 30 | RFC 2865 | |
Calling-Station-Id | 31 | RFC 2865 | |
CHAP-Challenge | 60 | RFC 2866 | |
CHAP-Password | 3 | RFC 2865 | |
Class | 25 | RFC 2865 | |
Filter-Id | 11 | RFC 2865 | |
Framed-Compression | 53 | RFC 2865 | |
Framed-IP-Address | 8 | RFC 2865 | |
Framed-IP-Netmask | 9 | RFC 2865 | |
Framed-IPv6-Prefix | 97 | RFC 3162 | |
Framed-Mtu | 52 | RFC 2869 | |
Framed-Pool | 88 | RFC 2869 | |
Framed-Protocol | 7 | RFC 2865 | |
Framed-Route | 22 | RFC 2865 | |
Framed-Routing | 50 | RFC 2865 | |
Idle-Timeout | 28 | RFC 2865 | |
MS-CHAP-Challenge | 311 | 11 | RFC 2548 |
MS-CHAP-Domain | 311 | 10 | RFC 2548 |
MS-CHAP-Response | 311 | 1 | RFC 2548 |
MS-CHAP2-Response | 311 | 25 | RFC 2548 |
MS-CHAP2-Success | 311 | 26 | RFC 2548 |
MS-MPPE-Encryption-Policy | 311 | 7 | RFC 2548 |
MS-MPPE-Encryption-Types | 311 | 8 | RFC 2548 |
MS-MPPE-Recv-Key | 311 | 17 | RFC 2548 |
MS-MPPE-Send-Key | 311 | 16 | RFC 2548 |
NAS-Identifier | 32 | RFC 2865 | |
NAS-Port | 5 | RFC 2865 | |
NAS-IP-Address | 4 | RFC 2865 | |
NAS-Port-Id | 87 | RFC 2869 | |
NAS-Port-Type | 61 | RFC 2865 | |
Port-Limit | 62 | RFC 2865 | |
Redback-Agent-Remote-Id | 2352 | 96 | |
Redback-Agent-Circuit-Id | 2352 | 97 | |
Service-Type | 6 | RFC 2865 | |
Session-Timeout | 27 | RFC 2865 | |
User-Name | 1 | RFC 2865 | |
User-Password | 2 | RFC 2865 | |
WISPr-Bandwidth-Max-Down | 14122 | 8 | wi-fi.org |
WISPr-Bandwidth-Max-Up | 14122 | 7 | wi-fi.org |
WISPr-Bandwidth-Min-Down | 14122 | 6 | wi-fi.org |
WISPr-Bandwidth-Min-Up | 14122 | 5 | wi-fi.org |
WISPr-Location-Id | 14122 | 1 | wi-fi.org |
WISPr-Location-Name | 14122 | 2 | wi-fi.org |
WISPr-Logoff-URL | 14122 | 3 | wi-fi.org |
WISPr-Redirection-URL | 14122 | 4 | wi-fi.org |
WISPr-Session-Terminate-Time | 14122 | 9 | wi-fi.org |
WISPr-Session-Terminate-End-Of-Day | 14122 | 10 | wi-fi.org |
WISPr-Billing-Class-Of-Service | 14122 | 11 | wi-fi.org |
[Top Back to Content]