
Lets start by adding a new RADIUS Client...




2. In the right pane, right-click the default policy, and select Delete.
3. Right-click, and select New Remote Access Policy.
4. In the Remote Access Policy Wizard, click Next.
5. Click Set Up A Custom Policy, name it Cisco MARS, and click Next.
6. Click Add, select Windows-Groups, and click Add

Specifiy a Windows group, and click OK. This takes you to the Policy Conditions screen of the New Remote Access Policy Wizard


1. Click Next, select Grant Remote Access Permission, and click Next.
2. Click Edit Profile, and select the Authentication tab.
3. Only select the Unencrypted Authentication (PAP/SPAP) check box


- Next, select the Advanced tab.
- Select Service-Type, and click Edit.
- In the Enumerable Attribute Information dialog box, select Login from the Attribute Value drop-down list.

Back on the Advanced tab, select Framed-Protocol, and click Remove.

Click OK, and its done!

Now the MARS Bit....
Now the first thing i would do is create user accounts in MARS, for the users you want AAA access. I know this seems weird, but you will see why later! Also make sure you create these case perfect to your windows accounts.
Once done, you can configure the MS IAS Server in MARS...
This is quite simple, go to Admin/Authentication Configuration...

Now under AAA Server Configuration select ADD...

And, Add AAA Server on a new host..

Fill in the IP`s etc, then click Next. Now click, ADD again for a Generic AAA Server..

Now specify the name, and Shared Key we specified earlier in the IAS Config, along with the Radius Server ports. I used, 1812 and 1813.



Once done, we can then set MARS to use AAA for logins...
Under Admin/Authentication Configuration, specify the IAS Server as the authentication method, and optionally set a lock out.


This will create an incident...

And thats it, all the MARS configuration done.
Now there are a couple of bits of note, to tell you about. To remove the IAS Server, you cannot do this via the normal Security and Monitor devices. If you try you will get this error...

Instead, delete the IAS Server, via the Authentication Configuration screen.
Logging on the Microsoft IAS is pretty poor...

So you could run a query with the PNMARS device, for account logins...


And err....

This does not effect the AAA function in anyway, and should be fixed in the next release.
Now this method worked fine in the lab, if you make a complete hash of the above dont blame me! :-)
In the next article i show you some CLI commands, to unlock user accounts.