I setup RADIUS authentication on a Cisco router and pointed it to a Windows NPS. Now I can ssh into the router my with AD account YAY.
But now that I got it working I'm going over the settings to make sure everything is secure.
On my router the config is pretty simple:
aaa new-model
aaa group server radius WINDOWS_NPS
server-private 123.123.123.123 auth-port 1812 acct-port 1813 key mykey
aaa authentication login default local group WINDOWS_NPS
ip domain-name MyDom
crypto key generate rsa
(under vty and console)# login authentication default
On the Windows NPS:
- I created a new RADIUS client for the router.
- Created a shared secret and specified Cisco as Vendor Name.
- Created a new Network Policy with my desired conditions.
- And now the part of the Network Policy config that worries me:
I read that Cisco only supports the unencrypted method, but I thought that using any authenticate method here that does NOT use certificates is incredibly insecure (even MS-CHAP-v2 is said to be super insecure).
So are my AD credentials being sent over the wire in plain text?
My other question is that if a hacker gets my RADIUS shared secret what do they really have? If the shared secret gets compromised must I generate a new one on all of my routers?