Solved

IAS with WPA

Posted on 2007-04-04
5
839 Views
Last Modified: 2012-06-27
I have IAS/Radius set up with a pix and its working fine. I would lke to also use this same IAS server for our wireless network.  

What is the correct way to configure a remote access policy. Do I need to create a new access policy in addition to the one for the PIX?? and how is the policy read? In other words if the first one does not match ... does it check the second?

Thanks
0
Comment
Question by:andrew_89
  • 3
  • 2
5 Comments
 
LVL 1

Author Comment

by:andrew_89
ID: 18854683
Also the wireless AP is an apple airport.... ( not my choice!!)  How do you set up EAP on IAs without using certificates. AP is using WPA..


Thanks
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 18855455
Probably best if you follow this guidance document:  http://www.microsoft.com/technet/security/guidance/cryptographyetc/peap_0.mspx

However, I'm not sure if the airport will support it.

Jeff
TechSoEasy
0
 
LVL 1

Author Comment

by:andrew_89
ID: 18861771
Yes it will support it. But here is a stupid question. I have radius set up with the ap pointing to the IAS server. From the client side do I need to give users a key or is this done dynamically?? This is the part I am not clear on.
0
 
LVL 74

Accepted Solution

by:
Jeffrey Kane - TechSoEasy earned 500 total points
ID: 18861879
The clients get their key automatically when they authenticate to the domain... that's how it should work, which is why it's especially important for you to follow the guidance in the document I linked above, and specifically Chapter 5:  http://www.microsoft.com/technet/security/guidance/cryptographyetc/peap_5.mspx

Jeff
TechSoEasy
0
 
LVL 1

Author Comment

by:andrew_89
ID: 18861935
thanks for the help that clears things up!
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
In-place Upgrading Dirsync to Azure AD Connect
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question