Solved

setting up radius with IAS outside AD, possible?

Posted on 2008-09-30
2
431 Views
Last Modified: 2013-11-12
i am trying to authenticate a siemens wireless client through a siemens access point using IAS on a windows 2003 with sp2.

i need to authenticate the clients with 802.1x but the problem i have is setting up radius with IAS.
i have set this up with freeradius, but i can not get a lynux box in to our server farm (dont ask), so i have been forced to set this up with windows, but the problem i have is our CA is set up as a standalone root and not in AD. all the how to's like the one below only tell me how to set it up in AD. and when i set it up outside of AD i can get a signed certificate to the used by the radius server.
http://www.windowsnetworking.com/kbase/WindowsTips/Windows2000/AdminTips/Security/SettingupWindows2000Radiustoauthenticatewireless802.1xclients.html


i have found this, which looks like it will do the job, but it would be better if we could set this up with win 2003
http://xperiencetech.com/server/radius.asp
0
Comment
Question by:CraigShag
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 250 total points
ID: 22665442
how about using a virtualized linux box on a windows machine ?


I hope this helps !
 
0
 

Author Comment

by:CraigShag
ID: 22673988
humm never thought of that!

ill pass it by the managers and see where i get with it
0

Featured Post

Are Your IoT Devices Out to Get You?

IoT business is booming, with manufacturers connecting any and every “thing” to the Internet. But as pressure grows to release new products faster and faster, we’re all left to wonder: is security a priority? Join our webinar on June 29th for the answer.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question