Thursday, 2013-09-05

*** nowen (~nowen@50-194-249-125-static.hfc.comcastbusiness.net) has joined #wikid13:15
*** nowen has quit (Remote host closed the connection)16:03
*** nowen (~nowen@50-194-249-125-static.hfc.comcastbusiness.net) has joined #wikid16:04
*** nowen has quit (Quit: Leaving.)17:34
*** AccentureDan (0cfa9442@gateway/web/freenode/ip.12.250.148.66) has joined #wikid18:03
*** nowen (~nowen@50-194-249-125-static.hfc.comcastbusiness.net) has joined #wikid18:22
nowenhey AccentureDan18:23
nowendid you make any progress?18:23
nowenhey - I have to check out again for about 25 mins.  I'll be back.18:24
*** nowen has quit (Client Quit)18:24
*** nowen (~nowen@99-174-93-102.lightspeed.tukrga.sbcglobal.net) has joined #wikid18:51
nowenback18:52
*** AccentureDan_ (3f7c1664@gateway/web/freenode/ip.63.124.22.100) has joined #wikid19:05
AccentureDan_hey Nick19:05
AccentureDan_sorry got cut off in my other session when I successfully VPNed in remotely19:05
AccentureDan_so good news, everything works, bad news, not the way i want it to19:05
nowenyou got it to work?19:05
AccentureDan_yep it works19:05
nowenhow does it work?19:05
AccentureDan_i figured out what is going on19:05
AccentureDan_so I can VPN in if i have the Route to WiKID set up, it authorizes the passcode, and i can sign on as NewUser1...BUT19:06
*** AccentureDan has quit (Ping timeout: 250 seconds)19:06
AccentureDan_that user has to reside on the VPN jump box, once i added that user on the jump box and added a network policy allowing access to the group that user is a part of, it worked19:06
AccentureDan_problem 1: that computer is not part of the domain, so it really is only authenticating the user against NewUser1, and not whether the user is a part of Active Directory or not...not a HUGE problem but it may be19:07
AccentureDan_problem 2: the user is authenticating locally and I cannot figure out how to push the username to my domain controller for authentication, then allow the connection to complete19:07
nowensounds like NPS isn't really doing it's job19:10
AccentureDan_i mean from a security standpoint this VPN box is in our DMZ, so i cannot allow it to join to the domain...i mean even enforcing NPS from there is a security risk...but i cannot find a way to 1.) run NPS from another machine separate from the VPN box and have it work correctly (even to WiKID)19:10
AccentureDan_yeah man that is where i am sticking19:10
AccentureDan_i mean WiKID is working perfectly19:10
AccentureDan_everything within WiKID is working like a charm19:10
nowenhmm.19:10
nowennps is on the RRAS box?19:11
AccentureDan_and i have GUARANTEED the green thumb is being given by the WiKID server because by adding that user it allows the VPN to complete19:11
AccentureDan_yup19:11
AccentureDan_i tried yesterday to get NPS to work on the domain controller, and have that enforced but was not working19:11
AccentureDan_thinking it wont work because the VPN box is not on the domain19:11
AccentureDan_i know this is more of a Windows question, sorry for bugging you about this19:11
nowenwill the VPN box talk radius to NPS when it is not on the domain?19:12
AccentureDan_its possible it wont, let me check, one sec19:12
nowenwhen I tested this, I used a non-MS VPN or a radius test client19:12
AccentureDan_okay the short of it is YES it will work19:15
nowenok - so you can have RRAS in the DMZ and NPS in the domain?19:16
AccentureDan_so in VPN set up on RRAS, i can select (which i have) to have the VPN point to other RADIUS servers19:16
AccentureDan_i have it set that way, and pointed to WiKID, really cant check right now since i am locked out because i initiated that VPN connection remotely but i will double-check19:16
AccentureDan_but when it comes to VPN set up to work with remote RADIUS servers, do you have any idea which one it should point to initially?  I would assume WiKID19:17
nowenno, I think you should point it to NPS19:17
AccentureDan_basically, which authentication/authorization occurs first?  WiKID or AD?19:17
AccentureDan_yep you are right19:17
nowenNPS does authZ through AD first, then AuthN through WiKID19:17
AccentureDan_okay so have the VPN point directly to the NPS19:17
AccentureDan_ohhhhhhhhhhhhhhhhhhhhh19:17
AccentureDan_okayyyyyy19:17
AccentureDan_so if i had the NPS sitting on the DC, and had my VPN point directly to that NPS, then had the route to WiKID set, it should work19:19
nowenit should19:19
AccentureDan_theoretically that is19:19
AccentureDan_okay i am going to give it a shot once my coworker disconnects the VPN19:19
AccentureDan_ill keep ya posted ma man19:19
nowenok19:20
*** AccentureDan_ has quit (Ping timeout: 250 seconds)19:28
*** Accenture_Dan (a689d192@gateway/web/freenode/ip.166.137.209.146) has joined #wikid19:39
Accenture_DanSorry just going over this in my head19:39
Accenture_Danso once the RADIUS request is forwarded to my RADIUS (NPS) on my domain controller, it will immediately try an verify the authenticity of the user name, then forward to WiKID to authorize the passcode, then initiate the VPN connection correct?19:40
nowenyes19:40
Accenture_Danfantastic...i am gonna work on this and let you know19:46
*** coolacid has quit (Read error: Connection reset by peer)19:57
*** coolacid (~CoolAcid@unaffiliated/coolacid) has joined #wikid19:57
*** Accenture_Dan has quit (Ping timeout: 250 seconds)20:41
*** nowen has quit (Quit: Leaving.)22:16

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!