![]() |
Table Of Contents
Prerequisites for MSCHAP Version 2
Restrictions for MSCHAP Version 2
Information About MSCHAP Version 2
How to Configure MSCHAP Version 2
Configuring MSCHAP V2 Authentication
Verifying MSCHAP V2 Configuration
Configuring Password Aging for Crypto-Based Clients
Configuring Local Authentication: Example
Configuring RADIUS Authentication: Example
Configuring Password Aging with Crypto Authentication: Example
Feature Information for MSCHAP Version 2
MSCHAP Version 2
First Published: January 23, 2003Last Updated: April 17, 2006The MSCHAP Version 2 feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to utilize Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAP V2) authentication for PPP connections between a computer using a Microsoft Windows operating system and a network access server (NAS).
For Cisco IOS Release 12.4(6)T, MSCHAP V2 now supports a new feature: AAA Support for MSCHAPv2 Password Aging. Prior to Cisco IOS Release 12.4(6)T, when Password Authentication Protocol (PAP)-based clients sent username and password values to the authentication, authorization, and accounting (AAA) subsystem, AAA generated an authentication request to the RADIUS server. If the password expired, the RADIUS server replied with an authentication failure message. The reason for the authentication failure was not passed back to AAA subsystem; thus, users were denied access because of authentication failure but were not informed why they were denied access.
The Password Aging feature, available in Cisco IOS Release 12.4(6)T, notifies crypto-based clients that the password has expired and provides a generic way for the user to change the password. The Password Aging feature supports only crypto-based clients.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the "Feature Information for MSCHAP Version 2" section.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Contents
This document includes the following sections:
•
Prerequisites for MSCHAP Version 2
•
Restrictions for MSCHAP Version 2
•
Information About MSCHAP Version 2
•
How to Configure MSCHAP Version 2
•
Feature Information for MSCHAP Version 2
Prerequisites for MSCHAP Version 2
•
Configure an interface type and enter interface configuration mode by using the interface command.
•
Configure the interface for PPP encapsulation by using the encapsulation command.
•
Be sure that the client operating system supports all MSCHAP V2 capabilities.
•
For Cisco IOS Release 12.4(6)T, the Password Aging feature only supports RADIUS authentication for crypto-based clients.
•
To ensure that the MSCHAP Version 2 features correctly interpret the authentication failure attributes sent by the RADIUS server, you must configure the ppp max-bad-auth command and set the number of authentication retries at two or more.
•
In order for the MSCHAP Version 2 feature to support the ability to change a password, the authentication failure attribute, which is sent by the RADIUS server, must be correctly interpreted as described in "Configuring MSCHAP V2 Authentication" section.
In addition, the radius server vsa send authentication command must be configured, allowing the RADIUS client to send a vendor-specific attribute to the RADIUS server. The Change Password feature is supported only for RADIUS authentication.
•
The Microsoft Windows 2000, Microsoft Windows XP, and Microsoft Windows NT operating systems have a known caveat that prevents the Change Password feature from working. You must download a patch from Microsoft at the following URL:
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q326770
For more information on completing these tasks, see the section "PPP Configuration" in the
Cisco IOS Dial Technologies Configuration Guide, Release 12.2. The RADIUS server must be configured for authentication. Refer to vendor-specific documentation for information on configuring RADIUS authentication on the RADIUS server.Restrictions for MSCHAP Version 2
•
MSCHAP V2 authentication is not compatible with MSCHAP V1 authentication.
•
The change password option is supported only for RADIUS authentication and is not available for local authentication.
Information About MSCHAP Version 2
MSCHAP V2 authentication is the default authentication method used by the Microsoft Windows 2000 operating system. Cisco routers that support this authentication method enable Microsoft Windows 2000 operating system users to establish remote PPP sessions without configuring an authentication method on the client.
MSCHAP V2 authentication introduced an additional feature not available with MSCHAP V1 or standard CHAP authentication: the Change Password feature. This features allows the client to change the account password if the RADIUS server reports that the password has expired.
Note
MSCHAP V2 authentication is an updated version of MSCHAP that is similar to but incompatible with MSCHAP Version 1 (V1). MSCHAP V2 introduces mutual authentication between peers and a Change Password feature.
How to Configure MSCHAP Version 2
See the following sections for configuration tasks for the MSCHAP Version 2 feature.
•
"Configuring MSCHAP V2 Authentication" section (required)
•
"Verifying MSCHAP V2 Configuration" section (optional)
•
"Configuring Password Aging for Crypto-Based Clients" section (optional)
Configuring MSCHAP V2 Authentication
To configure the NAS to accept MSCHAP V2 authentication for local or RADIUS authentication and to allow proper interpretation of authentication failure attributes and vendor-specific RADIUS attributes for RADIUS authentication, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
radius-server vsa send authentication
4.
interface type number
5.
ppp max-bad-auth number
6.
ppp authentication ms-chap-v2
7.
end
Verifying MSCHAP V2 Configuration
To verify that the MSCHAP Version 2 feature is configured properly, perform the following steps.
SUMMARY STEPS
1.
show running-config interface type number
2.
debug ppp negotiation
3.
debug ppp authentication
DETAILED STEPS
Configuring Password Aging for Crypto-Based Clients
The AAA security services facilitate a variety of login authentication methods. Use the aaa authentication login command to enable AAA authentication no matter which of the supported login authentication methods you decide to use. With the aaa authentication login command, you create one or more lists of authentication methods that are tried at login. These lists are applied using the login authentication line configuration command.
After the RADIUS server requests a new password, AAA queries the crypto client, which in turn prompts the user to enter a new password.
To configure login authentication and password aging for crypto-based clients, use the following commands beginning in global configuration mode.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
aaa new-model
4.
aaa authentication login {default | list-name} passwd-expiry method1 [method2...]
5.
crypto map map-name client authentication list list-name
Configuration Examples
This section provides the following configuration examples:
•
"Configuring Local Authentication: Example" section
•
"Configuring RADIUS Authentication: Example" section
•
"Configuring Password Aging with Crypto Authentication: Example" section
Configuring Local Authentication: Example
The following example configures PPP on an asynchronous interface and enables MSCHAP V2 authentication locally:
interface Async65ip address 10.0.0.2 255.0.0.0encapsulation pppasync mode dedicatedno peer default ip addressppp max-bad-auth 3ppp authentication ms-chap-v2username client password secretConfiguring RADIUS Authentication: Example
The following example configures PPP on an asynchronous interface and enables MSCHAP V2 authentication via RADIUS:
interface Async65ip address 10.0.0.2 255.0.0.0encapsulation pppasync mode dedicatedno peer default ip addressppp max-bad-auth 3ppp authentication ms-chap-v2exitaaa authentication ppp default group radiusradius-server host 10.0.0.2 255.0.0.0radius-server key secretradius-server vsa send authenticationConfiguring Password Aging with Crypto Authentication: Example
The following example configures password aging by using AAA with a crypto-based client:
aaa authentication login userauthen passwd-expiry group radius!aaa session-id common!crypto isakmp policy 3encr 3desauthentication pre-sharegroup 2!crypto isakmp client configuration group 3000clientkey cisco123dns 10.1.1.10wins 10.1.1.20domain cisco.compool ippoolacl 153!crypto ipsec transform-set myset esp-3des esp-sha-hmac!crypto dynamic-map dynmap 10set transform-set myset!crypto map clientmap client authentication list userauthen!radius-server host 10.140.15.203 auth-port 1645 acct-port 1646radius-server domain-stripping prefix-delimiter $radius-server key cisco123radius-server vsa send authenticationradius-server vsa send authentication 3gpp2!endAdditional References
The following sections provide references related to the MSCHAP Version 2 feature.
Related Documents
Related Topic Document TitleConfiguring PPP interfaces
The section "PPP Configuration" in the Cisco IOS Dial Technologies Configuration Guide, Release 12.2.
Descriptions of the tasks and commands necessary to configure and maintain Cisco networking devices
Lists of IOS Security Commands
Configuring PPP authentication using AAA
The section "Configuring PPP Authentication Using AAA" in the chapter "Configuring Authentication" in the Cisco IOS Security Configuration Guide, Release 12.2
Configuring RADIUS Authentication
The chapter "Configuring RADIUS" in the Cisco IOS Security Configuration Guide, Release 12.2
Standards
MIBs
RFCs
RFC TitleRFC 1661
Point-to-Point Protocol (PPP)
RFC 2548
Microsoft Vendor-specific RADIUS Attributes
RFC 2759
Microsoft PPP CHAP Extensions, Version 2
Technical Assistance
Command Reference
This section documents modified commands only.
•
ppp authentication ms-chap-v2
aaa authentication login
To set authentication, authorization, and accounting (AAA) authentication at login, use the aaa authentication login command in global configuration mode. To disable AAA authentication, use the no form of this command.
aaa authentication login {default | list-name} passwd-expiry method1 [method2...]
no aaa authentication login {default | list-name} passwd-expiry method1 [method2...]
Syntax Description
default
Uses the listed authentication methods that follow this argument as the default list of methods when a user logs in.
list-name
Character string used to name the list of authentication methods activated when a user logs in.
passwd-expiry
Enables password aging on a local authentication list.
method1 [method2...]
At least one of the keywords described in Table 1.
Defaults
If the default list is not set, only the local user database is checked. This has the same effect as the following command:
aaa authentication login default local
Note
On the console, login will succeed without any authentication checks if default is not set.
Command Modes
Global configuration
Command History
Usage Guidelines
The default and optional list names that you create with the aaa authentication login command are used with the login authentication command.
Create a list by entering the aaa authentication login list-name method command for a particular protocol, where list-name is any character string used to name this list (such as MIS-access). The method argument identifies the list of methods that the authentication algorithm tries, in the given sequence. Method keywords are described in Table 1.
To create a default list that is used if no list is assigned to a line, use the login authentication command with the default argument followed by the methods you want to use in default situations.
The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line.
If authentication is not specifically set for a line, the default is to deny access and no authentication is performed. Use the more system:running-config command to display currently configured lists of authentication methods.
Note
In Table 1, the group radius, group tacacs+, and group group-name methods refer to a set of previously defined RADIUS or TACACS+ servers. Use the radius-server host and tacacs+-server host commands to configure the host servers. Use the aaa group server radius and aaa group server tacacs+ commands to create a named group of servers.
Examples
The following example creates an AAA authentication list called MIS-access. This authentication first tries to contact a TACACS+ server. If no server is found, TACACS+ returns an error and AAA tries to use the enable password. If this attempt also returns an error (because no enable password is configured on the server), the user is allowed access with no authentication.
aaa authentication login MIS-access group tacacs+ enable noneThe following example creates the same list, but it sets it as the default list that is used for all login authentications if no other list is specified:
aaa authentication login default group tacacs+ enable noneThe following example sets authentication at login to use the Kerberos 5 Telnet authentication protocol when using Telnet to connect to the router:
aaa authentication login default krb5The following example configures password aging by using AAA with a Crypto client:
aaa authentication login userauthen passwd-expiry group radiusRelated Commands
Command Descriptionaaa new-model
Enables the AAA access control model.
login authentication
Enables AAA authentication for logins.
ppp authentication ms-chap-v2
To enable Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAP V2) authentication on a network access server (NAS), use the ppp authentication ms-chap-v2 command in interface configuration mode. To disable MSCHAP V2 authentication, use the no form of this command.
ppp authentication ms-chap-v2
no ppp authentication ms-chap-v2
Syntax Description
This command has no arguments or keywords.
Defaults
MSCHAP V2 authentication is disabled.
Command Modes
Interface configuration
Command History
Release Modification12.2(2)XB5
This command was introduced.
12.2(13)T
This command was integrated into Cisco IOS Release 12.2(13)T.
Usage Guidelines
To enable MSCHAP V2 authentication, first configure PPP on the NAS. For the NAS to properly interpret authentication failure attributes and vendor-specific attributes, the ppp max-bad-auth command must be configured to allow at least two authentication retries and the radius-server vsa send command and authentication keyword must be enabled. The NAS must be able to interpret authentication failure attributes and vendor-specific attributes to support the ability to change an expired password.
Examples
The following example configures PPP on an asynchronous interface and enables MSCHAP V2 authentication locally:
interface Async65ip address 10.0.0.2 255.0.0.0encapsulation pppasync mode dedicatedno peer default ip addressppp max-bad-auth 3ppp authentication ms-chap-v2username client password secretThe following example configures PPP on an asynchronous interface and enables MSCHAP V2 authentication via RADIUS:
interface Async65ip address 10.0.0.2 255.0.0.0encapsulation pppasync mode dedicatedno peer default ip addressppp max-bad-auth 3ppp authentication ms-chap-v2exitaaa authentication ppp default group radiusradius-server host 10.0.0.2 255.0.0.0radius-server key secretradius-server vsa send authenticationRelated Commands
Feature Information for MSCHAP Version 2
Table 2 lists the release history for this feature.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Cisco IOS software images are specific to a Cisco IOS software release, a feature set, and a platform. Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Note
Table 2 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2006 Cisco Systems, Inc. All rights reserved.