Solved

IAS with WPA

Posted on 2007-04-04
5
835 Views
Last Modified: 2012-06-27
I have IAS/Radius set up with a pix and its working fine. I would lke to also use this same IAS server for our wireless network.  

What is the correct way to configure a remote access policy. Do I need to create a new access policy in addition to the one for the PIX?? and how is the policy read? In other words if the first one does not match ... does it check the second?

Thanks
0
Comment
Question by:andrew_89
  • 3
  • 2
5 Comments
 
LVL 1

Author Comment

by:andrew_89
ID: 18854683
Also the wireless AP is an apple airport.... ( not my choice!!)  How do you set up EAP on IAs without using certificates. AP is using WPA..


Thanks
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 18855455
Probably best if you follow this guidance document:  http://www.microsoft.com/technet/security/guidance/cryptographyetc/peap_0.mspx

However, I'm not sure if the airport will support it.

Jeff
TechSoEasy
0
 
LVL 1

Author Comment

by:andrew_89
ID: 18861771
Yes it will support it. But here is a stupid question. I have radius set up with the ap pointing to the IAS server. From the client side do I need to give users a key or is this done dynamically?? This is the part I am not clear on.
0
 
LVL 74

Accepted Solution

by:
Jeffrey Kane - TechSoEasy earned 500 total points
ID: 18861879
The clients get their key automatically when they authenticate to the domain... that's how it should work, which is why it's especially important for you to follow the guidance in the document I linked above, and specifically Chapter 5:  http://www.microsoft.com/technet/security/guidance/cryptographyetc/peap_5.mspx

Jeff
TechSoEasy
0
 
LVL 1

Author Comment

by:andrew_89
ID: 18861935
thanks for the help that clears things up!
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Learn about cloud computing and its benefits for small business owners.
Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now