Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2885
  • Last Modified:

Which Win2K registry key enables or disables IEEE 802.1x authentication?

Which Win2K registry key enables or disables IEEE 802.1x authentication? The checkbox is found in the LAN Properties, Authentication tab.

Thank You
0
JulieDickson
Asked:
JulieDickson
2 Solutions
 
Rob WilliamsCommented:
You could download a well know free little utility from Sysinternals called RegMon. Install and run it, and then make the change. It will show you which key was accessed.
http://www.sysinternals.com/Utilities/Regmon.html

RegMon will display a lot of activity, you can right click on unnecessary activities and filter them out to simplify the display.
0
 
SchurinkCommented:
You can also use regshot, makes a snapshot before an action and compare afterwards. Doing this for your option gives the following result:

Keys deleted:2
HKLM\SYSTEM\ControlSet001\Control\Network\NetCfgLockHolder
HKLM\SYSTEM\CurrentControlSet\Control\Network\NetCfgLockHolder
 

Keys added:2
HKLM\SOFTWARE\Microsoft\EAPOL\Parameters\Interfaces
HKLM\SOFTWARE\Microsoft\EAPOL\Parameters\Interfaces\{DE2CBE4C-F87B-4FE8-A4FA-6E867C2A5AC6}
 

Values deleted:2
HKLM\SYSTEM\ControlSet001\Control\Network\NetCfgLockHolder\: "Local Network Connection Properties"
HKLM\SYSTEM\CurrentControlSet\Control\Network\NetCfgLockHolder\: "Local Network Connection Properties"
 

Values added:3
HKLM\SOFTWARE\Microsoft\EAPOL\Parameters\Interfaces\{DE2CBE4C-F87B-4FE8-A4FA-6E867C2A5AC6}\1: 03 00 00 00 00 00 00 00 00 00 00 40 0D 00 00 00 20 00 00 00 11 22 33 11 22 33 11 22 33 11 22 33 11 22 33 11 22 33 11 22 33 11 22 33 11 22 33 11 22 33 11 22 0D 00 00 00 28 00 00 00 00 00 00 00 28 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
HKLM\SYSTEM\ControlSet001\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\{DE2CBE4C-F87B-4FE8-A4FA-6E867C2A5AC6}\Connection\ShowIcon: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\{DE2CBE4C-F87B-4FE8-A4FA-6E867C2A5AC6}\Connection\ShowIcon: 0x00000000
 

Values modified:3
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed: 1F 51 38 FE 2F 5E 62 DD 3E B9 26 77 D8 D6 E8 4E 28 20 F7 50 5F F5 E2 31 9B 7F E0 67 A6 1F 5F 23 C2 38 0C 5F 60 D5 AA BA 90 89 8B 70 E3 87 36 00 C8 10 ED 2D 0D 3E B4 C2 52 50 3E ED 4E 72 4F 35 A7 92 ED D7 F8 5E D1 47 68 ED 78 F7 9E D4 2F 68
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed: 62 4C 0B A4 2F 14 71 E5 9D B6 B9 79 AF D0 F5 BB 82 C0 3D 68 4A A6 EB 72 CA A9 1E A5 38 77 48 60 BA 84 9C C1 B6 2A 99 B9 31 C7 F6 26 00 03 2F BC 9C 24 61 02 3F B1 3A 8F BB 85 F7 5B 13 22 09 60 84 4D 2D 0F F0 33 9F 2A 60 77 7B 1A 83 67 93 67
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\LastAliveUptime: 0x00000015
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\LastAliveUptime: 0x00000051
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\LastAliveStamp: D6 07 04 00 01 00 0A 00 0F 00 24 00 26 00 2B 01
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Reliability\LastAliveStamp: D6 07 04 00 01 00 0A 00 0F 00 25 00 25 00 B5 02
 
0
 
Rob WilliamsCommented:
Julie, were you able to disable the IEEE 802.1x authentication ?
--Rob
0
[Webinar] Cloud and Mobile-First Strategy

Maybe you’ve fully adopted the cloud since the beginning. Or maybe you started with on-prem resources but are pursuing a “cloud and mobile first” strategy. Getting to that end state has its challenges. Discover how to build out a 100% cloud and mobile IT strategy in this webinar.

 
JulieDicksonAuthor Commented:
Thanks for pointing me in the right direction. The information allowed me to determine which keys changed when disabling IEEE 802.x Authentication. However, I was not able to apply the information to solve my problem. I appreciate the assistance.

Julie
0
 
Rob WilliamsCommented:
Too bad you couldn't apply the reg changes. Thanks for the points Julie.
--Rob
0
 
itenginerdCommented:
So it's two years after the fact, but it's still a relevant question.  The 802.1x authentication settings appear to be part of a service.  For wired connections, the service is called EAPHOST in XPSP2.  In XPSP3, another service was added, Wired AutoConfig.  The Wired AutoConfig service depends on the EAPHost service, but you have to have both started to make the checkbox appear.

Conversely, stopping these services makes the Authentication tab go away.  I'm not 100% sure whether this works for wireless, but it may.  Also not 100% sure on the behavior in Win2K.

(j)
James
0
 
Smart_ManCommented:
well to be honest, I have conducted the same search myself and that is what got me here.
I hope my conclusions are good for anyone get to this point


A.      Automated IEEE 802.1x group policy configuration
 
Regarding the .1xautomated configuration, kindly note it is supported for OS starting of XP sp3 and domain controllers starting of 2k3.(with schema extensions required for DC prior to 2k8).
 
Below is the URLfor the (required schema extensions)
http://technet.microsoft.com/en-us/bb727029.aspx
 
Group policy .1x
http://technet.microsoft.com/en-us/magazine/2008.02.cableguy.aspx
 

0

Featured Post

[Webinar] Cloud and Mobile-First Strategy

Maybe you’ve fully adopted the cloud since the beginning. Or maybe you started with on-prem resources but are pursuing a “cloud and mobile first” strategy. Getting to that end state has its challenges. Discover how to build out a 100% cloud and mobile IT strategy in this webinar.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now