?
Solved

PEAP authentication problems with Cisco Wireless

Posted on 2008-10-15
2
Medium Priority
?
1,246 Views
Last Modified: 2013-12-09
Hi,
We have just purchased a cisco WLC 4402 with Cisco 1252 LWAP's
We have an existing Cisco ACS server running version 3.3 that we use for TACACs authentication for existing network devices. This authenticates into AD and has been working fine for ages.
i am trying to set up a wireless network. We have done the basics and set up the WLC to connect to a cisco switch which connects to the ACS, this is all ok. The WLC is configured with one wireless vlan. We connected one AP ti the WLC and it all works fine. WIreless PC with no authentication connects to the AP, WLC etc. We can access the network and all works fine. The part we are struggling with is the Username password authentication  and encryption settings to run PEAP with Chap username and passwords.So far i have not managed to find any Doco's on this type of setup.
0
Comment
Question by:daveyp32
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 44

Expert Comment

by:Darr247
ID: 22738196
Have you setup a RADIUS server in IAS yet?
0
 
LVL 1

Accepted Solution

by:
ITSMA earned 1000 total points
ID: 22999452
If your client keeps getting the message attempting to authenticate you probably need this hotfix from Microsoft.  We had this issue as well and it was the answer our problem.

http://support.microsoft.com/kb/885453/en-us

0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question