Would you like to learn how to configure the PFsense Active directory authentication using Radius? In this tutorial, we are going to show you how to authenticate PFSense users on the Active Directory database using the Radius protocol.

• Pfsense 2.4.4-p3
• Windows 2012 R2

Tutorial – Radius Server Installation on Windows

• IP – 192.168.15.10.
• Operacional System – Windows 2012 R2
• Hostname – TECH-DC01
• Active Directory Domain: TECH.LOCAL

Open the Server Manager application.

Access the Manage menu and click on Add roles and features.

Windows 2012 add role

Access the Server roles screen, select the Network Policy and Access Service option.

Click on the Next button.

Network Policy and Access Service

On the following screen, click on the Add features button.

network policy features

On the Role service screen, click on the Next Button.

network policy server

On the next screen, click on the Install button.

radius server installation on windows

You have finished the Radius server installation on Windows 2012.

Tutorial Radius Server – Active Directory Integration

Next, we need to create at least 1 account on the Active directory database.

The ADMIN account will be used to login on the Pfsense web interface.

On the domain controller, open the application named: Active Directory Users and Computers

Create a new account inside the Users container.

Zabbix active directory account

Create a new account named: admin

Password configured to the ADMIN user: 123qwe..

This account will be used to authenticate as admin on the Pfsense web interface.

active directory admin account
zabbix active directory admin properties

Congratulations, you have created the required Active Directory accounts.

Next, we need to create at least 1 group on the Active directory database.

On the domain controller, open the application named: Active Directory Users and Computers

Create a new group inside the Users container.

Radius Active directory group

Create a new group named: pfsense-admin

Members of this group will have the Admin permission on the PFsense web interface.

pfsense active directory group

Important! Add the admin user as a member of the pfsense-admin group.

pfsense active directory admin group

Congratulations, you have created the required Active Directory group.

Tutorial – Windows Domain Controller Firewall

We need to create a Firewall rule on the Windows domain controller.

This firewall rule will allow the Pfsense server to query the Active directory database.

On the domain controller, open the application named Windows Firewall with Advanced Security

Create a new Inbound firewall rule.

zabbix active directory

Select the PORT option.

Select the TCP option.

Select the Specific local ports option.

Enter the TCP port 636.

Windows firewall open port 636

Select the Allow the connection option.

zabbix windows firewall allow connection

Check the DOMAIN option.

Check the PRIVATE option.

Check the PUBLIC option.

Enter a description to the firewall rule.

windows firewall active directory

Congratulations, you have created the required firewall rule.

This rule will allow Pfsense to query the Active directory database.

Tutorial Radius Server – Add Client Devices

On the Radius server, open the application named: Network Policy Server

You need to authorize the Radius server on the Active directory database.

Right-click on NPS(LOCAL) and select the Register server in Active Directory option.

authorize radius server on windows

On the confirmation screen, click on the OK button.

Next, you need to configure Radius clients.

Radius clients are devices that will be allowed to request authentication from the Radius server.

Important! Do not confuse Radius clients with Radius users.

Right click on Radius Clients folder and select the New option.

pfsense radius client

Here is an example of a Client configured to allow a Pfsense firewall to connect to the Radius server.

You need to set the following configuration:

• Friendly name to the device – Add a description to you Pfsense
• Device IP Address – IP address of your PFsense firewall
• Device Shared secret – kamisama123

The Shared secret will be used to authorize the device to use the Radius server.

You have finished the Radius client configuration.

Tutorial Radius Server – Configure a Network Policy

Now, you need to create a Network Polity to allow authentication.

Right click on the Network Policies folder and select the New option.

Enter a name to the network policy and click on the Next button.

nps - network policy name

Click on the Add condition button.

We are going to allow members of the PFSENSE-ADMIN group to authenticate.

pfsense radius user group

Select the User group option and click on the Add button.

nps - user group condition

Click on the Add Groups button and locate the PFSENSE-ADMIN group.

pfsense admin radius group

Select the Access granted option and click on the Next button.

This will allow members of the PFSENSE-ADMIN group to authenticate on the Radius server.

NPS Access granted

On the Authentication Methods screen, select the Unencrypted authentication (PAP, SPAP) option.

Radius server authentication method

If the following warning is presented, click on the No button.

NPS Warning message

On the Radius configuration screen, select the Standard radius attribute option and click on the Add button

pfsense radius nps configure settings

Select the Class attribute and click on the Add button.

pfsense radius nps class

Select the String option and enter ten name of the Active group that we created before.

In our example, we created an Active Directory group named PFSENSE-ADMIN.

pfsense active directory radius attribute information

The NPS Radius server will pass the class information back to the PFsense firewall.

The Pfsense firewall will use the class information to set the user as a member of the pfsense-admin group.

Keep in mind that the pfsense-admin group must exist on the active directory and also on the Pfsense firewall.

pfsense radius network policy settings nps

Verify the Radius server configuration summary and click on the Finish button.

pfsense active directory authentication summary

Congratulations! You have finished the Radius server configuration.

PFSense – PFSense Radius Authentication on Active Directory

Open a browser software, enter the IP address of your Pfsense firewall and access web interface.

In our example, the following URL was entered in the Browser:

• https://192.168.15.11

The Pfsense web interface should be presented.

Pfsense login

On the prompt screen, enter the Pfsense Default Password login information.

• Username: admin
• Password: pfsense

After a successful login, you will be sent to the Pfsense Dashboard.

Pfsense dashboard

Access the Pfsense System menu and select the User manager option.

pfsense user manager menu

On the User manager screen, access the Authentications servers tab and click on the Add button.

pfsense authentication servers

On the Server settings area, perform the following configuration:

• Description name: ACTIVE DIRECTORY
• Type: RADIUS

pfsense radius authentication server

On the RADIUS Server settings area, perform the following configuration:

• Protocol  – PAP
• Hostname or IP address – 192.168.15.10
• Shared Secret – The Radius Client shared secret (kamisama123)
• Services Offered – Authentication and Accounting
• Authentication Port – 1812
• Acconting Port –  1813
• Authentication Timeout – 5

You need to change IP address of the Radius server.

You need to change the Shared secret to reflect your Radius client shared secret.

pfsense radius server settings

Click on the Save button to finish the configuration.

In our example, we configured the Radius server authentication on the PFSense firewall.

PFSense Radius – Testing Active Directory Authentication

Access the Pfsense Diagnostics menu and select the Authentication option.

pfsense diagnostics authentication

Select the Active directory authentication server.

Enter the Admin username, its password and click on the Test button.

pfsense ldap authentication test

If your test succeeds, you should see the following message.

pfsense active directory login test

Congratulations! Your PFsense Radius server authentication on Active Directory was sucessfully configured.

PFSense – Active Directory Group Permission

Access the Pfsense System menu and select the User manager option.

pfsense user manager menu

On the User manager screen, access the Groups tab and click on the Add button.

pfsense group manager

On the Group creation screen, perform the following configuration:

• Group name – pfsense-admin
• Scope – Remote
• Description – Active Directory group

Click on the Save button, you will be sent back to the Group configuration screen.

pfsense group creation

Now, you need to edit the permissions of the pfsense-admin group.

On the pfsense-admin group properties, locate the Assigned Privileges area and click on the Add button.

On the Group privilege area, perform the following configuration:

• Assigned privileges – WebCfg – All pages

pfsense active directory group permission

Click on the Save button to finish the configuration.

PFSense – Enable the Active Directory Authentication

Access the Pfsense System menu and select the User manager option.

pfsense user manager menu

On the User manager screen, access the Settings tab.

pfsense authentication settings menu

On the Settings screen, select the Active directory authentication server.

Click on the Save and test button.

pfsense active directory authentication settings

After finishing your configuration, you should log off the Pfsense web interface.

Try to login using the admin user and the password from the Active Directory database.

On the login screen, use the admin user and the password from the Active Directory database.

• Username: admin
• Password: Enter the Active directory password.

Pfsense login

Congratulations! You have configured the PFSense authentication to use the Active Directory database.