?
Solved

IAS with WPA

Posted on 2007-04-04
5
Medium Priority
?
843 Views
Last Modified: 2012-06-27
I have IAS/Radius set up with a pix and its working fine. I would lke to also use this same IAS server for our wireless network.  

What is the correct way to configure a remote access policy. Do I need to create a new access policy in addition to the one for the PIX?? and how is the policy read? In other words if the first one does not match ... does it check the second?

Thanks
0
Comment
Question by:andrew_89
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 1

Author Comment

by:andrew_89
ID: 18854683
Also the wireless AP is an apple airport.... ( not my choice!!)  How do you set up EAP on IAs without using certificates. AP is using WPA..


Thanks
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 18855455
Probably best if you follow this guidance document:  http://www.microsoft.com/technet/security/guidance/cryptographyetc/peap_0.mspx

However, I'm not sure if the airport will support it.

Jeff
TechSoEasy
0
 
LVL 1

Author Comment

by:andrew_89
ID: 18861771
Yes it will support it. But here is a stupid question. I have radius set up with the ap pointing to the IAS server. From the client side do I need to give users a key or is this done dynamically?? This is the part I am not clear on.
0
 
LVL 74

Accepted Solution

by:
Jeffrey Kane - TechSoEasy earned 2000 total points
ID: 18861879
The clients get their key automatically when they authenticate to the domain... that's how it should work, which is why it's especially important for you to follow the guidance in the document I linked above, and specifically Chapter 5:  http://www.microsoft.com/technet/security/guidance/cryptographyetc/peap_5.mspx

Jeff
TechSoEasy
0
 
LVL 1

Author Comment

by:andrew_89
ID: 18861935
thanks for the help that clears things up!
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses
Course of the Month11 days, 16 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question