Solved

PEAP Wireless Access - Faster way?

Posted on 2009-04-03
1
206 Views
Last Modified: 2013-11-17
Hi

We have recently setup up wireless access for staff and students laptops using PEAP, lightweight access points (cisco) and connecting to a Cisco 4400.

We have found that PEAP seems to be very slow to login and were wondering if there were a better or faster way for us.

Any help or pointers will be appreciated.
0
Comment
Question by:alumwell
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 3

Accepted Solution

by:
0ttaRulez earned 500 total points
ID: 24059998
Peap security is by far the safest of them all. Are the access points in the same subnet and/or location of the Radius server. with peap authentication the device authenticates directly o the Radius server instead of the AP authenticating the device.

If this causes large delays you can easily switch to LEAP authentication, then the AP's communicate with the Radius server and the AP authenticate the devices immediately. this goes allot faster but is less secure.

here u can find the way to set ip up.

http://supportwiki.cisco.com/ViewWiki/index.php/How_to_configure_LEAP_authentication_with_a_local_RADIUS_server_on_Access_Points_and_bridges
0

Featured Post

Turn Insights into Action

Communication across every corner of your business is essential to increase the velocity of your application delivery and support pipeline. Automate, standardize, and contextualize your communication processes with xMatters.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we have discussed about the OS X EI Capitan and how to fix Wi-Fi issue in OS X El Capitan. We have explained how to delete system level preferences and create a new Wi-Fi location to resolve Wi-Fi issue.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question