Create Cloud RADIUS Network Policies

How to Create Cloud RADIUS Network Policies - Video Tutorial

Prerequisites

  1. Registering the application in your tenant
  2. Creating Cloud Radius Instance
  3. Being a Subscription Owner or Network Administrator

Introduction - Managing your Cloud RADIUS Network Policies in EZRADIUS

Network policies are used to define the conditions under which a user or device can connect to your network. In this page we will go through how to create network policies in EZRADIUS.

  1. Go to your EZRADIUS portal.
  2. Click on “Policies”. EZRADIUS Cloud RADIUS Network Policies

What are the RADIUS Server Details?

At the top of the page, you will see the server details. This includes the server location, the server IP address, and the server port. You will need this information to configure your network devices to connect to the Cloud RADIUS server. (EZRADIUS uses the standard RADIUS port 1812 for authentication and 1813 for accounting) EZRADIUS Cloud RADIUS Server Details

Create a new RADIUS Network Policy

Before we dive into creating a new RADIUS network policy, let’s understand the different components of a network policy. Each policy has the following components:

  1. Name: A unique name for the policy.
  2. Allowed IP Addresses: The IP addresses that are allowed to connect to your RADIUS server (these are the Public IP addresses of your access points).
  3. Accepted Certificate Authorities: The certificate authorities that are accepted by the RADIUS server. These CAs are used to validate the certificates of the devices connecting to the network.
  4. Server Certificate: EAP-TLS requires the server uses a certificate that the devices trust for identification of the server. This is the server certificate.
  5. Access Policies: The conditions under which a user or device can connect to your network. This includes the authentication methods, the network policies, and the user groups that are allowed to connect as well as VLAN rule assignment. Each policy can have multiple access policies and they are checked in the order they are sorted.

Now that we understand the components of a network policy, let’s create a new policy.

Set up a new RADIUS Network Policy

  1. First we must set the policy Name. Enter the Policy name.
  2. Enter the IP addresses of your access points by entering the IP Address and entering add. When you click “Add” the IP address will be added to the list of allowed IP addresses and a random shared secret will be created, if you want to change the secret, you can change it in the text field for the shared secret. You will need to configure your network devices with the shared secret. EZRADIUS Cloud RADIUS Network Policy IP Addresses
  3. Now we must add the Certificate Authorities we trust to the RADIUS Service, if you are using EZCA our cloud based Certificate Authority, It is a few clicks away, if you are using a different CA, you can upload the CA certificate in PEM format, below you can see the steps to add the CA using each option.
Add Certificate Authorities to RADIUS Using EZCA (Option 1)
  1. If you are using EZCA, Ensure that EZCA is set as the certificate source, then from the dropdown select your EZCA instance (If you are using an EZCA private instance select the private instance checkbox and enter your EZCA URL).
  2. You should now have a dropdown with the CAs you have in your EZCA instance, select the CA you want to add to the RADIUS server. EZRADIUS Cloud RADIUS Network Policy add EZCA Cloud Certificate Authority CA
  3. Select the CAs you want to add and click “Add” (If you have a 2 tier hierarchy please add both your Root CA and your Issuing CA). EZCA and EZRADIUS will take care of the rest. EZRADIUS Cloud RADIUS Network Policy add EZCA Cloud Certificate Authority CA
Add Certificate Authorities to RADIUS Using 3rd Party CA (Option 2)
  1. If you are using a 3rd party CA, ensure that “Local CA” is set as the certificate source.
  2. If you are uploading a Root CA, check the “Root CA” checkbox, if you are uploading an Issuing CA, leave the checkbox unchecked.
  3. Click on “Upload Certificate” and select the CA certificate in PEM format. EZRADIUS Cloud RADIUS Network Policy add CA from Microsoft Cloud PKI, SCEPMAN, or ADCS
  4. Repeat the process for all the CAs you want to add (If you have a 2 tier hierarchy please add both your Root CA and your Issuing CA).

Add Server Certificate to RADIUS

The Next step is to add the server certificate to the RADIUS server. This certificate is used to identify the RADIUS server to the devices connecting to the network. For this, you can use a certificate from EZCA or a 3rd party CA. Below you can see the steps to add the server certificate using each option.

Add Server Certificate to RADIUS Using EZCA (Option 1)
  1. If you are using EZCA, Ensure that EZCA is set as the certificate source, then from the dropdown select your EZCA instance (If you are using an EZCA private instance select the private instance checkbox and enter your EZCA URL).
  2. You should now have a dropdown with the certificates authorities you have in your EZCA instance, select the CA you want to use.

    EZRADIUS will connect to EZCA and create the certificate. This certificate will be automatically renewed by EZRADIUS.

  3. Click “Add” to add the certificate to the RADIUS server. EZRADIUS Cloud RADIUS Network Policy add RADIUS Certificate for EAP-TLS
  4. You should now see the certificate in the list of certificates. EZRADIUS Cloud RADIUS Network Policy add RADIUS Certificate for EAP-TLS
Add Server Certificate to RADIUS Using 3rd Party CA (Option 2)
  1. If you are using a 3rd party CA, ensure that “Local CA” is set as the certificate source.
  2. Click the Create CSR button. EZRADIUS Cloud RADIUS Network Policy add RADIUS Certificate for EAP-TLS
  3. Download the CSR by clicking the “Save CSR” button. EZRADIUS Cloud RADIUS Network Policy add RADIUS Certificate for EAP-TLS
  4. Submit the CSR to your CA and download the certificate and the certificate of your root CA.
  5. Once you have the certificate, scroll down and either copy and paste the certificate PEM content or click on “Upload Certificate” and select the certificate in PEM format. EZRADIUS Cloud RADIUS Network Policy add RADIUS Certificate for EAP-TLS
  6. After you upload your certificate, you must upload the certificate of the Root CA that signed the certificate. Scroll down and either copy and paste the certificate PEM content or click on “Upload Root CA Certificate” and select the certificate in PEM format. EZRADIUS Cloud RADIUS Network Policy add RADIUS Certificate for EAP-TLS
  7. Now that you have added both the server certificate and the root CA certificate, we can move on to creating the access policies. (Please note that this has not been saved yet, we must add the access policies and click save to save the policy.) EZRADIUS Cloud RADIUS Network Policy add RADIUS Certificate for EAP-TLS

Add Access Policies to RADIUS Network Policy

Now that we have added the IP addresses, the CAs, and the server certificate, we can add the access policies. Access policies define the conditions under which a user or device can connect to your network. Each policy can have multiple access policies and they are checked in the order they are sorted.

  1. You will see an empty new access policy, under the red “No Access Policies” text. EZRADIUS Cloud RADIUS Network Policy Access Policies
  2. Enter the name of the access policy. This is just for your records. In this example I will set our RADIUS server as if it was for a school, so I will name the access policy “Students”. EZRADIUS Cloud RADIUS Network Policy Access Policies for Students
  3. For this policy we only want to enable EAP-TLS, so we will leave the “Enable PAP Authentication” checkbox unchecked.
  4. EZRADIUS check CRLs (Certificate Revocations Lists) by default, if in addition to CRLs you want to check OCSP, you can check the “Enable OCSP” checkbox. you can read more about the difference between CRL and OCSP here
  5. Now we must select how we are going to validate that the certificate is from a student the options are:
    • CA Matching: If you only issue certificates for students from these CAs, then you can leave everything unchecked. and just assign the VLAN if required.
    • Entra ID User Matching: EZRADIUS can extract the user UPN or user ID from a field of the certificate and validate with Entra ID that the user exists and even assign VLAN based on the groups the user is a member of.
    • Entra ID Device Matching: EZRADIUS can extract the Entra ID device ID from a field of the certificate and validate with Entra ID that the device exists and even assign VLAN based on the groups the device is a member of.
    • Intune Device Matching: EZRADIUS can extract the Intune device ID from a field of the certificate and validate with Intune that the device exists and is compliant with your Intune policies.
  6. Below we will explain how to set up each of the matching options. Once you are adding your policies, scroll up to the top and click “Save Changes” to save the policy. EZRADIUS Cloud RADIUS Network Policy Access Policies for EAP-TLS and PAP Authentication
CA Matching
  1. If you want to only use CA matching and allow any certificate from the CAs you have added to the policy, you can leave the “Match With Entra ID Objects” checkbox unchecked.
  2. If you want to assign a VLAN to this policy, jump to the VLAN assignment section of this document. Else click “Add Policy” to add the policy to the list of access policies. EZRADIUS Cloud RADIUS Network Policy Access Policies for Students add basic EAP-TLS policy
Entra ID User Matching
  1. If you want to match the user UPN or user ID from the certificate with an Entra ID user, check the “Match With Entra ID Objects” checkbox.
  2. Select “User” from the in the Certificate Type radio buttons.
  3. Select the field in the certificate that contains the user UPN or user ID.
  4. This will now validate that the user exists in Entra ID, if you want to also check if the user is a member of a group, check the “Check Group Membership” checkbox. and enter the group ID. You can get the group ID from the Azure portal. Entra ID Group ID
  5. If you want to assign a VLAN to this policy, jump to the VLAN assignment section of this document. Else click “Add Policy” to add the policy to the list of access policies. EZRADIUS Cloud RADIUS Network Policy Access Policies for Students add basic EAP-TLS policy with Entra ID User Validation
Entra ID Device Matching
  1. If you want to match the device ID from the certificate with an Entra ID device, check the “Match With Entra ID Objects” checkbox.
  2. Select “Device” from the in the Certificate Type radio buttons.
  3. Select “AAD Device ID” from the in the Device Identifier dropdown.
  4. Select the certificate field in the certificate that contains the device ID.
  5. If you are using a Subject alternative name, it will also give you de ability to remove the prefix from the device ID (for example if your certificate has deviceid:// you enter deviceid:// as the prefix and EZRADIUS knows to ignore that when validating your certificates).
  6. This will now validate that the device exists in Entra ID, if you want to also check if the device is a member of a group, check the “Check Group Membership” checkbox. and enter the group ID. You can get the group ID from the Azure portal. Note that the device must be a member of the group in Entra ID, nested groups are not supported Entra ID Group ID
  7. If you want to assign a VLAN to this policy, jump to the VLAN assignment section of this document. Else click “Add Policy” to add the policy to the list of access policies. EZRADIUS Cloud RADIUS Network Policy Access Policies for Students EAP-TLS policy with Entra ID Device Validation
Intune Device Matching
  1. If you want to match the Intune Device ID from the certificate with an Intune device, check the “Match With Entra ID Objects” checkbox.
  2. Select “Device” from the in the Certificate Type radio buttons.
  3. Select “Intune Device ID” from the in the Device Identifier dropdown.
  4. Select certificate the field in the certificate that contains the Intune device ID.
  5. If you are using a Subject alternative name, it will also give you de ability to remove the prefix from the device ID (for example if your certificate has IntuneDeviceId:// you enter IntuneDeviceId:// as the prefix and EZRADIUS knows to ignore that when validating your certificates).
  6. This will now validate that the device exists in Intune, if you want to also check if the device is compliant with your Intune policies, check the “Check Device Compliance in Intune” checkbox.
  7. If you also want to check if the device is a member of a group, check the “Check Group Membership” checkbox. and enter the group ID. You can get the group ID from the Azure portal. Note that the device must be a member of the group in Intune, nested groups are not supported Entra ID Group ID
  8. If you want to assign a VLAN to this policy, jump to the VLAN assignment section of this document. Else click “Add Policy” to add the policy to the list of access policies. EZRADIUS Cloud RADIUS Network Policy Access Policies for Students EAP-TLS policy with Intune Device Validation

VLAN Assignment

The default setting will not set a VLAN, however, if you want to assign a VLAN based on the access policy, you can do so in two ways:

  1. Static VLAN Assignment: If you want to assign a static VLAN to the policy, you can select “Assign Static VLAN” from the drop down and you can enter the VLAN ID in the VLAN Name field. EZRADIUS Cloud RADIUS Network Policy Access Policies for Students EAP-TLS policy with VLAN Assignment
  2. Dynamic VLAN Assignment Based on Certificate Value: If you want to assign a VLAN based on a value in the certificate, you can do so by selecting the “Assign Dynamic VLAN (From Certificate Value)” from the VLAN management dropdown selecting the field in the certificate that contains the VLAN ID. Same as with the device ID, if you are using a Subject alternative name, it will also give you de ability to remove the prefix from the VLAN ID (for example if your certificate has vlan:// you enter vlan:// as the prefix and EZRADIUS knows to ignore that when assigning your VLANs). EZRADIUS Cloud RADIUS Network Policy Access Policies for Students EAP-TLS policy with Dynamic VLAN Assignment
  3. Once you have added the access policies and the VLAN assignment, scroll up to the top and click “Save Changes” to save the policy.

Access Policy Order

The access policies are checked in the order they are sorted, you can change the order of the access policies by clicking on the up and down arrows on the right side of the access policy. EZRADIUS Cloud RADIUS Network Policy Access Policies for Students EAP-TLS policy with Dynamic VLAN Assignment

  1. Once your policy is ready, click “Save Changes” at the top to save the policy changes.