SlideShare a Scribd company logo
Implementasi 802.1x  EAP-TLS & PEAP-MSCHAPv2 , FreeRADIUS + dialupadmin + MySQL Hardware : Wireless Client Adapter ( USB Senao SL-2511UB4 ) Access Point ( Compex WP11B+)  PCMCIA Samsung SWL-2100N dengan hostap daemon ( sebagai Access Point )  Laptop DellC400 ( Server Autentikasi )
Software OS Linux Mandrake 10.0 Official dengan FreeRADIUS + dialupadmin, Apache+mod_php, MySQL-server, OpenSSL sebagai Authentikasi Server. OS Windows XP SP2 digunakan sebagai Supplicant ( Client ) Software Administrasi AP berbasis Web dari Compex WP11B+
Gambar Demo I KABEL UTP   1. Wireless Client Windows XP sebagai Supplicant 2. Wireless Access Point WP11B+ sebagai Authenticator 3. Laptop dengan freeRadius Sebagai Authentication Server
Gambar Demo 2 1. Wireless Client Windows XP sebagai Supplicant 2. Linux dengan PCMCIA Card  yang berfungsi sebagai AP authenticator ( hostAP ) dan menyediakan freeRadius sebagai Authentication Server
Tahap-tahap : Instalasi Server Autentikasi 1. Install MySQL server dan library MySQL-devel  ( CD Mandrake 10.0 Official )  Nama paket RPM :  - MySQL-client-4.0.18-1mdk   - MySQL-4.0.18-1mdk   - MySQL-common-4.0.18-1mdk   - libmysql12-4.0.18-1mdk    - php-mysql-4.3.4-1mdk   - perl-Mysql-1.22_19-9mdk   - libmysql12-devel-4.0.18-1mdk    Pastikan paket paket diatas sudah terinstall dengan mengetik :  rpm -qa |grep sql rpm -qa |grep SQL
Tahap-tahap : Instalasi Server Autentikasi 2. Install Apache + mod_php ( CD Mandrake 10.0 Official ) Nama paket RPM :  - apache2-common-2.0.48-6mdk     - apache2-modules-2.0.48-6mdk   - apache-conf-2.0.48-2mdk   - apache2-2.0.48-6mdk   - apache2-mod_php-2.0.48_4.3.4-1mdk   - php-ini-4.3.4-1mdk  Pastikan paket paket diatas sudah terinstall dengan mengetik :  rpm -qa |grep apache rpm -qa |grep php
Tahap-tahap : Instalasi Server Autentikasi 3. Install OpenSSL ( CD Mandrake 10.0 Official ) Nama paket RPM : - openssl-0.9.7c-3mdk - libopenssl0.9.7-0.9.7c-3mdk - libopenssl0.9.7-devel-0.9.7c-3mdk Pastikan paket paket diatas sudah terinstall dengan mengetik :  rpm -qa |grep ssl
Tahap-tahap : Instalasi Server Autentikasi 4. Install FreeRadius ( tarball )  Nama Paket tarball : - freeradius-1.0.0.tar.gz    http://www.freeradius.org Tahap Instalasi FreeRadius  [root@lognight root]# mv freeradius-1.0.0.tar.gz /usr/local/ [root@lognight root]# cd /usr/local/ [root@lognight local]# tar -zxvf freeradius-1.0.0.tar.gz [root@lognight local]# cd freeradius-1.0.0 [root@lognight freeradius-1.0.0]# ./configure --prefix=/usr/local/radius [root@lognight freeradius-1.0.0]# make [root@lognight freeradius-1.0.0]# make install
Tahap-tahap : Instalasi Server Autentikasi Menyiapkan database radius di mysql server dengan cara : Pastikan mySQL server aktif [root@lognight freeradius-1.0.0]# /etc/init.d/mysql restart Stopping MySQL Server (pid 1638)  [  OK  ] Starting MySQL Server  [  OK  ] [root@lognight freeradius-1.0.0]# mysql -uroot -p<passwordrootsql> radius  < src/modules/rlm_sql/drivers/rlm_sql_mysql/db_mysql.sql Untuk mempermudah gunakan MySQL admin seperti phpMyAdmin untuk membuat user khusus menangani database radius.. Misal dengan phpMyAdmin create user &quot;radius&quot; dengan password &quot;radius&quot;, maka untuk menyiapkan database radius dengan cara :  [root@lognight freeradius-1.0.0]# mysql -uradius -pradius radius < src/modules/rlm_sql/drivers/rlm_sql_mysql/db_mysql.sql
Tahap-tahap : Instalasi Server Autentikasi 5. Instalasi DialAdmin ( dari source FreeRadius diatas )  [root@lognight freeradius-1.0.0]# ls acconfig.h  configure*  INSTALL  Makefile  README aclocal.m4  configure.in  install-sh*  Make.inc  redhat/ config.cache  COPYRIGHT  libltdl/  Make.inc.in  scripts/ config.guess*  CREDITS  libtool*  man/  share/ config.log  debian/  LICENSE  mibs/  src/ config.status*  dialup_admin/  ltconfig*  missing*  suse/ config.sub*  doc/  ltmain.sh*  raddb/  todo/ [root@lognight freeradius-1.0.0]# mv dialup_admin /usr/local/dialup_admin
Tahap-tahap : Instalasi Server Autentikasi Menyiapkan table-table database radius untuk dapat menggunakan dialupadmin [root@lognight freeradius-1.0.0]# cd /usr/local/dialup_admin/ [root@lognight dialup_admin]# ls bin/  Changelog  conf/  doc/  htdocs/  html/  lib/  README  sql/ [root@lognight dialup_admin]# mysql -uradius -pradius radius < sql/badusers.sql [root@lognight dialup_admin]# mysql -uradius -pradius radius < sql/mtotacct.sql [root@lognight dialup_admin]# mysql -uradius -pradius radius < sql/totacct.sql [root@lognight dialup_admin]# mysql -uradius -pradius radius < sql/userinfo.sql
Tahap-tahap : Instalasi Server Autentikasi 6 .   Setting konfigurasi FreeRadius untuk Implementasi EAP-TLS dan PEAP-MSCHAPv2 dengan MySQL sebagai database cd /usr/local/radius/etc/raddb/ vi radiusd.conf user = nobody group = nobody port = 1812
radiusd.conf authorize { preprocess auth_log chap mschap suffix sql eap } accounting { detail sql radutmp }
sql.conf sql { driver = &quot;rlm_sql_mysql&quot; server = &quot;localhost&quot; port = &quot;3306&quot; login = &quot;radius&quot; password = &quot;radius&quot; radius_db = &quot;radius&quot; acct_table1 = &quot;radacct&quot; acct_table2 = &quot;radacct&quot; postauth_table = &quot;radpostauth&quot; authcheck_table = &quot;radcheck&quot; authreply_table = &quot;radreply&quot; groupcheck_table = &quot;radgroupcheck&quot; groupreply_table = &quot;radgroupreply&quot; usergroup_table = &quot;usergroup&quot; sql_user_name = &quot;%{User-Name}“   …  dst …
clients.conf client 127.0.0.1 { secret  = rahasia shortname  = DellC400 nastype  = other  # localhost isn't usually a NAS... } client 172.20.2.62 { secret  = 1234rahas14 shortname  = cisco nastype  = cisco } client 172.20.2.0/26 { secret  = rahasia shortname  = compex nastype   = other } client 172.16.1.0/24 { secret  = rahasia shortname  = DellC400 nastype  = other }
naslist # NAS Name  Short Name  Type #----------------  ----------  ---- localhost  local  portslave 172.20.2.59  compex  other 127.0.0.1  local  portslave lognight.te.ugm.ac.id  DellC400  other 172.20.2.62  cisco  cisco
eap.conf ( untuk EAP-TLS ) eap { default_eap_type = tls timer_expire  = 60 ignore_unknown_eap_types = no tls { private_key_password = rahasiaeuy private_key_file = ${raddbdir}/certs/cert-srv.pem certificate_file = ${raddbdir}/certs/cert-srv.pem #  Trusted Root CA list CA_file = ${raddbdir}/certs/demoCA/cacert.pem dh_file = ${raddbdir}/certs/dh random_file = ${raddbdir}/certs/random } }
eap.conf ( untuk PEAP-MSCHAPv2 ) eap { default_eap_type = peap timer_expire  = 60 ignore_unknown_eap_types = no tls { private_key_password = rahasiaeuy private_key_file = ${raddbdir}/certs/cert-srv.pem certificate_file = ${raddbdir}/certs/cert-srv.pem #  Trusted Root CA list CA_file = ${raddbdir}/certs/demoCA/cacert.pem dh_file = ${raddbdir}/certs/dh random_file = ${raddbdir}/certs/random }   peap { default_eap_type = mschapv2 } }
Membuat Sertifikat FreeRADIUS menyediakan script CA.all ( Interactive Script)  dan CA.cert ( Non-Interactive Script ) cp /path/to/freeradius-1.0.0/scripts/CA.cert /usr/local/radius/etc/raadb/cert/ cd /usr/local/radius/etc/raddb/certs/ vi CA.certs
CA.certs COUNTRY=&quot;ID&quot; PROVINCE=&quot;D.I.Yogyakarta&quot; CITY=&quot;Yogyakarta&quot; ORGANIZATION=&quot;Gadjah Mada University&quot; ORG_UNIT=&quot;Teknik.Elektro.UGM&quot; PASSWORD=&quot;rahasia&quot; COMMON_NAME_CLIENT=&quot;KPLI-Jogja&quot; EMAIL_CLIENT=&quot;jogja-linux@yahoogroups.com&quot; PASSWORD_CLIENT=$PASSWORD COMMON_NAME_SERVER=&quot;nightlogin&quot; EMAIL_SERVER=&quot;nightlogin@gmail.com&quot; PASSWORD_SERVER=$PASSWORD COMMON_NAME_ROOT=&quot;Teknik Elektro UGM&quot; EMAIL_ROOT=&quot;josh@ugm.ac.id&quot; PASSWORD_ROOT=$PASSWORD
xpextensions [root@lognight certs]# vi xpextensions [ xpclient_ext] extendedKeyUsage = 1.3.6.1.5.5.7.3.2.2.2 [ xpserver_ext ] extendedKeyUsage = 1.3.6.1.5.5.7.3.1.2.1
Create Certs sh CA.certs or ./CA.certs ################## create private key name : name-root CA.pl -newcert ################## Generating a 1024 bit RSA private key ..................++++++ .....................................................++++++ … . dst
Create Certs
Hasil Sertifikat  [root@lognight certs]# ls CA.certs*  cert-clt.p12  cert-srv.der  cert-srv.pem  newcert.pem  root.der  root.pem cert-clt.der  cert-clt.pem  cert-srv.p12  demoCA/  newreq.pem  root.p12  xpextensions [root@lognight certs]# Siap di gunakan untuk Radius Server dan Client/Supplicant
Mengaktifkan Radiusd Mode debugging #/usr/local/radius/sbin/radiusd –Xxx Mode Background #/usr/local/radius/sbin/radiusd
 
 
 
Setting DialupAdmin 7. Setting DialupAdmin  cd /usr/local/dialup_admin/conf ls accounting.attrs  auth.request  default.vals  sql.attrmap  user_edit.attrs admin.conf  captions.conf  extra.ldap-attrmap  sql.attrs  username.mappings admin.conf.default  config.php3  naslist.conf  sql.attrs.default
admin.conf general_base_dir: /usr/local/dialup_admin general_radiusd_base_dir: /usr/local/radius/sbin/ general_radius_server: localhost general_domain: te.ugm.ac.id general_radius_server_port: 1812 sql_type: mysql sql_server: localhost sql_port: 3306 sql_username: radius sql_password: radius sql_database: radius sql_accounting_table: radacct sql_badusers_table: badusers sql_check_table: radcheck sql_reply_table: radreply sql_user_info_table: userinfo sql_groupcheck_table: radgroupcheck sql_groupreply_table: radgroupreply sql_usergroup_table: usergroup sql_total_accounting_table: totacct sql_nas_table: nas sql_command: /usr/bin/mysql
naslist.conf #nas1_name: lantai_1.%{general_domain} #nas1_model: Compex WP11B+ #nas1_ip: 172.16.0.201 #nas1_community: public #nas2_name: lantai_2.%{general_domain} #nas2_model: Compex WP11B+ #nas2_ip: 172.16.80.201 #nas2_community:public #nas2_type: cisco #nas3_name: lantai_3.%{general_domain} #nas3_model: Compex WP11B+ #nas3_ip: 172.16.160.201 #nas3_community: public nas4_name: DellC400 nas4_model: HostAP nas4_type: other nas4_ip: 172.16.1.1 nas4_community: public nas5_name: compex nas5_model: Compex WP11B+ nas5_type: other nas5_ip: 172.20.2.59 nas5_community: public
Setting Apache untuk dialupadmin # grep DocumentRoot /etc/httpd/conf/httpd2.conf DocumentRoot /var/www/html # ln -s /usr/local/dialupadmin/htdocs /var/www/html/dialadmin # /etc/init.d/httpd restart Shutting down httpd2:  [  OK  ] Starting httpd2:  [  OK  ]
DialupAdmin interface
Menambah User
Setting Authenticator Access Point Compex WP11B+
Setting Authenticator Access Point Compex WP11B+
Setting Authenticator Access Point Compex WP11B+
Setting Authenticator Access Point Compex WP11B+
Setting Authenticator Access Point Compex WP11B+
Setting Authenticator Access Point Compex WP11B+
Setting Authenticator Access Point Compex WP11B+
Setting Supplicant WinXP SP2 menggunakan 802.1x EAP-TLS Untuk menggunakan EAP-TLS, Supplicant Windows XP membutuhkan sertifikat public (root.der) dan sertifikat private client ( cert-clt.p12 ) Sedangkan Server authentikasi menggunakan private key, sertifikat public dan private server ( cert-srv.pem ) dan CA ( cacert.pem )
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install root.der Install ROOT Sertificate Public File : root.der
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install root.der Klik NEXT
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install root.der Klik NEXT
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install root.der
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12 KLIK KANAN Private Key Client File : cert-clt.p12
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12 Klik NEXT
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12 Klik NEXT
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12 Masukkan Kunci  Private Client Lalu Klik NEXT
Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12
 
 
 
 
 
 
Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2 Untuk menggunakan PEAP-MSCHAPv2, Supplicant Windows XP hanya membutuhkan sertifikat public root (root.der)  Sedangkan Server authentikasi menggunakan private key, sertifikat public dan private server (cert-srv.pem) dan CA (cacert.pem)
Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
Setting Client selesai.. Berikut ini hasil debugging radiusd  :
 
 
 
Jika terdapat Error/Failed
Jika terdapat Error/Failed
 
 
 
 
 
 
Implementasi 802.1x EAP-TLS dan PEAP MSCHAPv2   by Josua M Sinambela Email :  [email_address] Pengguna OpenSource [email_address]

More Related Content

PDF
在Oel5上安装配置oracle gird control 10.2.0.5
PDF
Rac on NFS
PDF
OpenStack networking-sfc flow 분석
PDF
Kea DHCP – the new open source DHCP server from ISC
PDF
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
PDF
Install Solaris 11.1 on a Virtualbox VM
PDF
OpenStack Icehouse Over IPv6
PDF
Developing MIPS Exploits to Hack Routers
在Oel5上安装配置oracle gird control 10.2.0.5
Rac on NFS
OpenStack networking-sfc flow 분석
Kea DHCP – the new open source DHCP server from ISC
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
Install Solaris 11.1 on a Virtualbox VM
OpenStack Icehouse Over IPv6
Developing MIPS Exploits to Hack Routers

What's hot (18)

PDF
Oracle 12c r1 installation on solaris 11.1
PDF
What is new in BIND 9.11?
PDF
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
PDF
OpenStack Havana over IPv6
PDF
Erp installation r12.2
PDF
Keeping DNS server up-and-running with “runit
PDF
Apache Httpd and TLS certificates validations
PDF
Automating Network Infrastructure : Ansible
DOCX
Securing the tunnel with Raccoon
PDF
BIND 9 logging best practices
PDF
Linux Networking Explained
PDF
DNSSEC signing Tutorial
PDF
Computer network (4)
PDF
Yeti DNS - Experimenting at the root
PDF
DNS High-Availability Tools - Open-Source Load Balancing Solutions
PDF
Software Packaging with RPM
PDF
Step by Step to Install oracle grid 11.2.0.3 on solaris 11.1
PPTX
Oracle 12c r1 installation on solaris 11.1
What is new in BIND 9.11?
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
OpenStack Havana over IPv6
Erp installation r12.2
Keeping DNS server up-and-running with “runit
Apache Httpd and TLS certificates validations
Automating Network Infrastructure : Ansible
Securing the tunnel with Raccoon
BIND 9 logging best practices
Linux Networking Explained
DNSSEC signing Tutorial
Computer network (4)
Yeti DNS - Experimenting at the root
DNS High-Availability Tools - Open-Source Load Balancing Solutions
Software Packaging with RPM
Step by Step to Install oracle grid 11.2.0.3 on solaris 11.1
Ad

Viewers also liked (17)

PPTX
Cuidados del medio ambiente
PPTX
Transparent Data Encryption for SharePoint Content Databases
PPTX
Enhancements to High Availability, Disaster Recovery and Replication
PPTX
Project Server 2016 New Features
PPTX
Securing your Windows Network with the Microsoft Security Baselines
PPTX
Securing SQL Server with TLS 1.2
PPTX
Transport layer security (tls)
PDF
Microsoft SharePoint & Project Server are Better Together
PDF
PMO and Project Server 2013 main features
PDF
D2 domain driven-design
PDF
SSL/TLS
PPTX
Transport Layer Security
PPTX
Docker and Microsoft - Windows Server 2016 Technical Deep Dive
PPTX
What's new in SQL Server 2016
PPTX
Deploying and Managing Project Online and Project Server 2016
PPTX
What’s New in Project 2016, Project Server 2016, Project Online and Office 36...
PPTX
BizTalk roadmap and Biztalk 2016 (Sam Vanhoutte @ Codit's BizTalk 2016 Launch)
Cuidados del medio ambiente
Transparent Data Encryption for SharePoint Content Databases
Enhancements to High Availability, Disaster Recovery and Replication
Project Server 2016 New Features
Securing your Windows Network with the Microsoft Security Baselines
Securing SQL Server with TLS 1.2
Transport layer security (tls)
Microsoft SharePoint & Project Server are Better Together
PMO and Project Server 2013 main features
D2 domain driven-design
SSL/TLS
Transport Layer Security
Docker and Microsoft - Windows Server 2016 Technical Deep Dive
What's new in SQL Server 2016
Deploying and Managing Project Online and Project Server 2016
What’s New in Project 2016, Project Server 2016, Project Online and Office 36...
BizTalk roadmap and Biztalk 2016 (Sam Vanhoutte @ Codit's BizTalk 2016 Launch)
Ad

Similar to Presentation iv implementasi 802x eap tls peap mscha pv2 (20)

PDF
Linux administration ii-parti
PDF
KEY
fog or: How I Learned to Stop Worrying and Love the Cloud
KEY
fog or: How I Learned to Stop Worrying and Love the Cloud (OpenStack Edition)
PPT
Capistrano
PPT
Introduction to JumpStart
DOCX
How to install squid proxy on server or how to install squid proxy on centos o
PPTX
Running Docker in Development & Production (#ndcoslo 2015)
PPTX
Docker Security workshop slides
PDF
Tested install-isp config3-ubuntu-16-04
PDF
Networking lab
PPT
Capistrano Overview
PDF
Painless Perl Ports with cpan2port
PPTX
Introction to docker swarm
PDF
PuppetConf 2016: Building Nano Server Images with Puppet and DSC – Michael Sm...
PDF
Cutting through the fog of cloud
PDF
Automating the Network
PDF
Openstack 101
PDF
Free radius billing server with practical vpn exmaple
PPTX
Monkey man
Linux administration ii-parti
fog or: How I Learned to Stop Worrying and Love the Cloud
fog or: How I Learned to Stop Worrying and Love the Cloud (OpenStack Edition)
Capistrano
Introduction to JumpStart
How to install squid proxy on server or how to install squid proxy on centos o
Running Docker in Development & Production (#ndcoslo 2015)
Docker Security workshop slides
Tested install-isp config3-ubuntu-16-04
Networking lab
Capistrano Overview
Painless Perl Ports with cpan2port
Introction to docker swarm
PuppetConf 2016: Building Nano Server Images with Puppet and DSC – Michael Sm...
Cutting through the fog of cloud
Automating the Network
Openstack 101
Free radius billing server with practical vpn exmaple
Monkey man

Presentation iv implementasi 802x eap tls peap mscha pv2

  • 1. Implementasi 802.1x EAP-TLS & PEAP-MSCHAPv2 , FreeRADIUS + dialupadmin + MySQL Hardware : Wireless Client Adapter ( USB Senao SL-2511UB4 ) Access Point ( Compex WP11B+) PCMCIA Samsung SWL-2100N dengan hostap daemon ( sebagai Access Point ) Laptop DellC400 ( Server Autentikasi )
  • 2. Software OS Linux Mandrake 10.0 Official dengan FreeRADIUS + dialupadmin, Apache+mod_php, MySQL-server, OpenSSL sebagai Authentikasi Server. OS Windows XP SP2 digunakan sebagai Supplicant ( Client ) Software Administrasi AP berbasis Web dari Compex WP11B+
  • 3. Gambar Demo I KABEL UTP 1. Wireless Client Windows XP sebagai Supplicant 2. Wireless Access Point WP11B+ sebagai Authenticator 3. Laptop dengan freeRadius Sebagai Authentication Server
  • 4. Gambar Demo 2 1. Wireless Client Windows XP sebagai Supplicant 2. Linux dengan PCMCIA Card yang berfungsi sebagai AP authenticator ( hostAP ) dan menyediakan freeRadius sebagai Authentication Server
  • 5. Tahap-tahap : Instalasi Server Autentikasi 1. Install MySQL server dan library MySQL-devel ( CD Mandrake 10.0 Official ) Nama paket RPM : - MySQL-client-4.0.18-1mdk - MySQL-4.0.18-1mdk - MySQL-common-4.0.18-1mdk - libmysql12-4.0.18-1mdk - php-mysql-4.3.4-1mdk - perl-Mysql-1.22_19-9mdk - libmysql12-devel-4.0.18-1mdk Pastikan paket paket diatas sudah terinstall dengan mengetik : rpm -qa |grep sql rpm -qa |grep SQL
  • 6. Tahap-tahap : Instalasi Server Autentikasi 2. Install Apache + mod_php ( CD Mandrake 10.0 Official ) Nama paket RPM : - apache2-common-2.0.48-6mdk - apache2-modules-2.0.48-6mdk - apache-conf-2.0.48-2mdk - apache2-2.0.48-6mdk - apache2-mod_php-2.0.48_4.3.4-1mdk - php-ini-4.3.4-1mdk Pastikan paket paket diatas sudah terinstall dengan mengetik : rpm -qa |grep apache rpm -qa |grep php
  • 7. Tahap-tahap : Instalasi Server Autentikasi 3. Install OpenSSL ( CD Mandrake 10.0 Official ) Nama paket RPM : - openssl-0.9.7c-3mdk - libopenssl0.9.7-0.9.7c-3mdk - libopenssl0.9.7-devel-0.9.7c-3mdk Pastikan paket paket diatas sudah terinstall dengan mengetik : rpm -qa |grep ssl
  • 8. Tahap-tahap : Instalasi Server Autentikasi 4. Install FreeRadius ( tarball ) Nama Paket tarball : - freeradius-1.0.0.tar.gz http://www.freeradius.org Tahap Instalasi FreeRadius [root@lognight root]# mv freeradius-1.0.0.tar.gz /usr/local/ [root@lognight root]# cd /usr/local/ [root@lognight local]# tar -zxvf freeradius-1.0.0.tar.gz [root@lognight local]# cd freeradius-1.0.0 [root@lognight freeradius-1.0.0]# ./configure --prefix=/usr/local/radius [root@lognight freeradius-1.0.0]# make [root@lognight freeradius-1.0.0]# make install
  • 9. Tahap-tahap : Instalasi Server Autentikasi Menyiapkan database radius di mysql server dengan cara : Pastikan mySQL server aktif [root@lognight freeradius-1.0.0]# /etc/init.d/mysql restart Stopping MySQL Server (pid 1638) [ OK ] Starting MySQL Server [ OK ] [root@lognight freeradius-1.0.0]# mysql -uroot -p<passwordrootsql> radius < src/modules/rlm_sql/drivers/rlm_sql_mysql/db_mysql.sql Untuk mempermudah gunakan MySQL admin seperti phpMyAdmin untuk membuat user khusus menangani database radius.. Misal dengan phpMyAdmin create user &quot;radius&quot; dengan password &quot;radius&quot;, maka untuk menyiapkan database radius dengan cara : [root@lognight freeradius-1.0.0]# mysql -uradius -pradius radius < src/modules/rlm_sql/drivers/rlm_sql_mysql/db_mysql.sql
  • 10. Tahap-tahap : Instalasi Server Autentikasi 5. Instalasi DialAdmin ( dari source FreeRadius diatas ) [root@lognight freeradius-1.0.0]# ls acconfig.h configure* INSTALL Makefile README aclocal.m4 configure.in install-sh* Make.inc redhat/ config.cache COPYRIGHT libltdl/ Make.inc.in scripts/ config.guess* CREDITS libtool* man/ share/ config.log debian/ LICENSE mibs/ src/ config.status* dialup_admin/ ltconfig* missing* suse/ config.sub* doc/ ltmain.sh* raddb/ todo/ [root@lognight freeradius-1.0.0]# mv dialup_admin /usr/local/dialup_admin
  • 11. Tahap-tahap : Instalasi Server Autentikasi Menyiapkan table-table database radius untuk dapat menggunakan dialupadmin [root@lognight freeradius-1.0.0]# cd /usr/local/dialup_admin/ [root@lognight dialup_admin]# ls bin/ Changelog conf/ doc/ htdocs/ html/ lib/ README sql/ [root@lognight dialup_admin]# mysql -uradius -pradius radius < sql/badusers.sql [root@lognight dialup_admin]# mysql -uradius -pradius radius < sql/mtotacct.sql [root@lognight dialup_admin]# mysql -uradius -pradius radius < sql/totacct.sql [root@lognight dialup_admin]# mysql -uradius -pradius radius < sql/userinfo.sql
  • 12. Tahap-tahap : Instalasi Server Autentikasi 6 . Setting konfigurasi FreeRadius untuk Implementasi EAP-TLS dan PEAP-MSCHAPv2 dengan MySQL sebagai database cd /usr/local/radius/etc/raddb/ vi radiusd.conf user = nobody group = nobody port = 1812
  • 13. radiusd.conf authorize { preprocess auth_log chap mschap suffix sql eap } accounting { detail sql radutmp }
  • 14. sql.conf sql { driver = &quot;rlm_sql_mysql&quot; server = &quot;localhost&quot; port = &quot;3306&quot; login = &quot;radius&quot; password = &quot;radius&quot; radius_db = &quot;radius&quot; acct_table1 = &quot;radacct&quot; acct_table2 = &quot;radacct&quot; postauth_table = &quot;radpostauth&quot; authcheck_table = &quot;radcheck&quot; authreply_table = &quot;radreply&quot; groupcheck_table = &quot;radgroupcheck&quot; groupreply_table = &quot;radgroupreply&quot; usergroup_table = &quot;usergroup&quot; sql_user_name = &quot;%{User-Name}“ … dst …
  • 15. clients.conf client 127.0.0.1 { secret = rahasia shortname = DellC400 nastype = other # localhost isn't usually a NAS... } client 172.20.2.62 { secret = 1234rahas14 shortname = cisco nastype = cisco } client 172.20.2.0/26 { secret = rahasia shortname = compex nastype = other } client 172.16.1.0/24 { secret = rahasia shortname = DellC400 nastype = other }
  • 16. naslist # NAS Name Short Name Type #---------------- ---------- ---- localhost local portslave 172.20.2.59 compex other 127.0.0.1 local portslave lognight.te.ugm.ac.id DellC400 other 172.20.2.62 cisco cisco
  • 17. eap.conf ( untuk EAP-TLS ) eap { default_eap_type = tls timer_expire = 60 ignore_unknown_eap_types = no tls { private_key_password = rahasiaeuy private_key_file = ${raddbdir}/certs/cert-srv.pem certificate_file = ${raddbdir}/certs/cert-srv.pem # Trusted Root CA list CA_file = ${raddbdir}/certs/demoCA/cacert.pem dh_file = ${raddbdir}/certs/dh random_file = ${raddbdir}/certs/random } }
  • 18. eap.conf ( untuk PEAP-MSCHAPv2 ) eap { default_eap_type = peap timer_expire = 60 ignore_unknown_eap_types = no tls { private_key_password = rahasiaeuy private_key_file = ${raddbdir}/certs/cert-srv.pem certificate_file = ${raddbdir}/certs/cert-srv.pem # Trusted Root CA list CA_file = ${raddbdir}/certs/demoCA/cacert.pem dh_file = ${raddbdir}/certs/dh random_file = ${raddbdir}/certs/random } peap { default_eap_type = mschapv2 } }
  • 19. Membuat Sertifikat FreeRADIUS menyediakan script CA.all ( Interactive Script) dan CA.cert ( Non-Interactive Script ) cp /path/to/freeradius-1.0.0/scripts/CA.cert /usr/local/radius/etc/raadb/cert/ cd /usr/local/radius/etc/raddb/certs/ vi CA.certs
  • 20. CA.certs COUNTRY=&quot;ID&quot; PROVINCE=&quot;D.I.Yogyakarta&quot; CITY=&quot;Yogyakarta&quot; ORGANIZATION=&quot;Gadjah Mada University&quot; ORG_UNIT=&quot;Teknik.Elektro.UGM&quot; PASSWORD=&quot;rahasia&quot; COMMON_NAME_CLIENT=&quot;KPLI-Jogja&quot; EMAIL_CLIENT=&quot;jogja-linux@yahoogroups.com&quot; PASSWORD_CLIENT=$PASSWORD COMMON_NAME_SERVER=&quot;nightlogin&quot; EMAIL_SERVER=&quot;nightlogin@gmail.com&quot; PASSWORD_SERVER=$PASSWORD COMMON_NAME_ROOT=&quot;Teknik Elektro UGM&quot; EMAIL_ROOT=&quot;josh@ugm.ac.id&quot; PASSWORD_ROOT=$PASSWORD
  • 21. xpextensions [root@lognight certs]# vi xpextensions [ xpclient_ext] extendedKeyUsage = 1.3.6.1.5.5.7.3.2.2.2 [ xpserver_ext ] extendedKeyUsage = 1.3.6.1.5.5.7.3.1.2.1
  • 22. Create Certs sh CA.certs or ./CA.certs ################## create private key name : name-root CA.pl -newcert ################## Generating a 1024 bit RSA private key ..................++++++ .....................................................++++++ … . dst
  • 24. Hasil Sertifikat [root@lognight certs]# ls CA.certs* cert-clt.p12 cert-srv.der cert-srv.pem newcert.pem root.der root.pem cert-clt.der cert-clt.pem cert-srv.p12 demoCA/ newreq.pem root.p12 xpextensions [root@lognight certs]# Siap di gunakan untuk Radius Server dan Client/Supplicant
  • 25. Mengaktifkan Radiusd Mode debugging #/usr/local/radius/sbin/radiusd –Xxx Mode Background #/usr/local/radius/sbin/radiusd
  • 26.  
  • 27.  
  • 28.  
  • 29. Setting DialupAdmin 7. Setting DialupAdmin cd /usr/local/dialup_admin/conf ls accounting.attrs auth.request default.vals sql.attrmap user_edit.attrs admin.conf captions.conf extra.ldap-attrmap sql.attrs username.mappings admin.conf.default config.php3 naslist.conf sql.attrs.default
  • 30. admin.conf general_base_dir: /usr/local/dialup_admin general_radiusd_base_dir: /usr/local/radius/sbin/ general_radius_server: localhost general_domain: te.ugm.ac.id general_radius_server_port: 1812 sql_type: mysql sql_server: localhost sql_port: 3306 sql_username: radius sql_password: radius sql_database: radius sql_accounting_table: radacct sql_badusers_table: badusers sql_check_table: radcheck sql_reply_table: radreply sql_user_info_table: userinfo sql_groupcheck_table: radgroupcheck sql_groupreply_table: radgroupreply sql_usergroup_table: usergroup sql_total_accounting_table: totacct sql_nas_table: nas sql_command: /usr/bin/mysql
  • 31. naslist.conf #nas1_name: lantai_1.%{general_domain} #nas1_model: Compex WP11B+ #nas1_ip: 172.16.0.201 #nas1_community: public #nas2_name: lantai_2.%{general_domain} #nas2_model: Compex WP11B+ #nas2_ip: 172.16.80.201 #nas2_community:public #nas2_type: cisco #nas3_name: lantai_3.%{general_domain} #nas3_model: Compex WP11B+ #nas3_ip: 172.16.160.201 #nas3_community: public nas4_name: DellC400 nas4_model: HostAP nas4_type: other nas4_ip: 172.16.1.1 nas4_community: public nas5_name: compex nas5_model: Compex WP11B+ nas5_type: other nas5_ip: 172.20.2.59 nas5_community: public
  • 32. Setting Apache untuk dialupadmin # grep DocumentRoot /etc/httpd/conf/httpd2.conf DocumentRoot /var/www/html # ln -s /usr/local/dialupadmin/htdocs /var/www/html/dialadmin # /etc/init.d/httpd restart Shutting down httpd2: [ OK ] Starting httpd2: [ OK ]
  • 35. Setting Authenticator Access Point Compex WP11B+
  • 36. Setting Authenticator Access Point Compex WP11B+
  • 37. Setting Authenticator Access Point Compex WP11B+
  • 38. Setting Authenticator Access Point Compex WP11B+
  • 39. Setting Authenticator Access Point Compex WP11B+
  • 40. Setting Authenticator Access Point Compex WP11B+
  • 41. Setting Authenticator Access Point Compex WP11B+
  • 42. Setting Supplicant WinXP SP2 menggunakan 802.1x EAP-TLS Untuk menggunakan EAP-TLS, Supplicant Windows XP membutuhkan sertifikat public (root.der) dan sertifikat private client ( cert-clt.p12 ) Sedangkan Server authentikasi menggunakan private key, sertifikat public dan private server ( cert-srv.pem ) dan CA ( cacert.pem )
  • 43. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install root.der Install ROOT Sertificate Public File : root.der
  • 44. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install root.der Klik NEXT
  • 45. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install root.der Klik NEXT
  • 46. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install root.der
  • 47. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12 KLIK KANAN Private Key Client File : cert-clt.p12
  • 48. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12 Klik NEXT
  • 49. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12 Klik NEXT
  • 50. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12 Masukkan Kunci Private Client Lalu Klik NEXT
  • 51. Tahap tahap setting Supplicant EAP-TLS di WinXP SP2 : Install client.p12
  • 52.  
  • 53.  
  • 54.  
  • 55.  
  • 56.  
  • 57.  
  • 58. Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2 Untuk menggunakan PEAP-MSCHAPv2, Supplicant Windows XP hanya membutuhkan sertifikat public root (root.der) Sedangkan Server authentikasi menggunakan private key, sertifikat public dan private server (cert-srv.pem) dan CA (cacert.pem)
  • 59. Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
  • 60. Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
  • 61. Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
  • 62. Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
  • 63. Setting Supplicant WinXP SP2 menggunakan 802.1x PEAP-MSCHAPv2
  • 64. Setting Client selesai.. Berikut ini hasil debugging radiusd :
  • 65.  
  • 66.  
  • 67.  
  • 70.  
  • 71.  
  • 72.  
  • 73.  
  • 74.  
  • 75.  
  • 76. Implementasi 802.1x EAP-TLS dan PEAP MSCHAPv2 by Josua M Sinambela Email : [email_address] Pengguna OpenSource [email_address]