Solved

How do I transfer IAS (RADIUS) to a different server?

Posted on 2008-10-14
1
631 Views
Last Modified: 2010-08-05
Hi,

I'm in the process of retiring one of our old domain controllers.  I have installed DNS and transferred the FSMO roles to the new server, but now need to migrate IAS.  We are using IAS to authenticate VPN users that are coming through the Cisco ASA firewall.

What is the best way to transfer IAS (RADIUS) to the new server?
0
Comment
Question by:usom
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 18

Accepted Solution

by:
sk_raja_raja earned 500 total points
ID: 22713392
1.Here is a MS document that describes how you can export and import the settings for IAS:
http://www.microsoft.com/technet/security/prodtech/windowsserver2003/pkiwire/BGCH08.mspx?mfr=true
Have a look neer the bottom of the page.

2.Chech the middel of this table on this page for a link to the how to page:
http://technet2.microsoft.com/WindowsServer/en/Library/60fa5de5-58a0-4673-be1e-dd24fb1014a41033.mspx?mfr=true
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question