Solved

IAS with WPA

Posted on 2007-04-04
5
836 Views
Last Modified: 2012-06-27
I have IAS/Radius set up with a pix and its working fine. I would lke to also use this same IAS server for our wireless network.  

What is the correct way to configure a remote access policy. Do I need to create a new access policy in addition to the one for the PIX?? and how is the policy read? In other words if the first one does not match ... does it check the second?

Thanks
0
Comment
Question by:andrew_89
  • 3
  • 2
5 Comments
 
LVL 1

Author Comment

by:andrew_89
ID: 18854683
Also the wireless AP is an apple airport.... ( not my choice!!)  How do you set up EAP on IAs without using certificates. AP is using WPA..


Thanks
0
 
LVL 74

Expert Comment

by:Jeffrey Kane - TechSoEasy
ID: 18855455
Probably best if you follow this guidance document:  http://www.microsoft.com/technet/security/guidance/cryptographyetc/peap_0.mspx

However, I'm not sure if the airport will support it.

Jeff
TechSoEasy
0
 
LVL 1

Author Comment

by:andrew_89
ID: 18861771
Yes it will support it. But here is a stupid question. I have radius set up with the ap pointing to the IAS server. From the client side do I need to give users a key or is this done dynamically?? This is the part I am not clear on.
0
 
LVL 74

Accepted Solution

by:
Jeffrey Kane - TechSoEasy earned 500 total points
ID: 18861879
The clients get their key automatically when they authenticate to the domain... that's how it should work, which is why it's especially important for you to follow the guidance in the document I linked above, and specifically Chapter 5:  http://www.microsoft.com/technet/security/guidance/cryptographyetc/peap_5.mspx

Jeff
TechSoEasy
0
 
LVL 1

Author Comment

by:andrew_89
ID: 18861935
thanks for the help that clears things up!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Installing a printer using group policy preferences is not that hard let’s take a look at it. First lets open up your group policy console and edit the policy you want to add it to. I recommend creating a new policy for each printer makes it a l…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now