Right-click on NPS and select Register server in Active Directory:Ĭollapse the Radius menu and right-click on RADIUS Clients: Procced with the configuration of the Radius server selecting NAP, then right-click on the server name and press Network Policy Server: Press Install to start the installation of the role: Select the role Network Policy and Access Services: Select the server where to install the role: Launch Server Manager and select Add Roles and Features:
To facilitate the management of the users with the permission to access through VPN, we are going to create a specific group called VpnAuthorizedUsers:Īssign the user who needs the VPN access to the group VpnAuthorizedUsers: The setup includes a Cisco 1801 router, configured with a Road Warrior VPN, and a server with Windows Server 2012 R2 where we installed and activated the domain controller and Radius server role. In this post we’ll see how you can allow Active Directory users to perform the login to a VPN, configured on a Cisco router. It may be very helpful to business users willing to access from outside the internal resources of their company. A Virtual Private Network (VPN) allows to connect to a private network through the Internet, from anywhere in the world.