?
Solved

PEAP Wireless Access - Faster way?

Posted on 2009-04-03
1
Medium Priority
?
214 Views
Last Modified: 2013-11-17
Hi

We have recently setup up wireless access for staff and students laptops using PEAP, lightweight access points (cisco) and connecting to a Cisco 4400.

We have found that PEAP seems to be very slow to login and were wondering if there were a better or faster way for us.

Any help or pointers will be appreciated.
0
Comment
Question by:alumwell
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 3

Accepted Solution

by:
0ttaRulez earned 1500 total points
ID: 24059998
Peap security is by far the safest of them all. Are the access points in the same subnet and/or location of the Radius server. with peap authentication the device authenticates directly o the Radius server instead of the AP authenticating the device.

If this causes large delays you can easily switch to LEAP authentication, then the AP's communicate with the Radius server and the AP authenticate the devices immediately. this goes allot faster but is less secure.

here u can find the way to set ip up.

http://supportwiki.cisco.com/ViewWiki/index.php/How_to_configure_LEAP_authentication_with_a_local_RADIUS_server_on_Access_Points_and_bridges
0

Featured Post

Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question