Solved

IAS for WLAN authentication with certificate

Posted on 2010-08-15
3
1,005 Views
Last Modified: 2012-05-10
Hello,

I am installing IAS on a Windows 2003 SP2 domain controller to authenticate wireless users connecting via a Ruckus wireless Zone Defender.We will be using PEAP MS-CHAP v2.  I was told to set up the system for testing purposes and after it is working, we will buy a server certificate. When I look at the documentation, it appears that the server cert is necessary to get the system working. Am I wrong and if so, how can IAS be made to work without the cert?

Thanks
0
Comment
Question by:srfergus
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
TechnicallyMaybe earned 500 total points
ID: 33440833
You do need a cert, but you can used a self-signed cert for testing purposes.  Use SelfSSL to generate.
http://www.somacon.com/p42.php
When/If you go live, you can buy a trusted cert from Go Daddy or Verisign.
0
 

Author Comment

by:srfergus
ID: 33441068
Thanks! One other question: when I'm using SelfSSL to generate the cert, should I use the port switch (/P:port) to switch from the default (443)? If so, should I change it to 1812 or 1645 (the RADIUS ports) or can SelfSSL generate one cert for both ports?
0
 
LVL 5

Expert Comment

by:TechnicallyMaybe
ID: 33441232
The port switch automatically adds it to port 443 but the cert can be put on any port. SelfSSL was designed to create a cert and add it to IIS automatically but you can use it for anything needing a certificate.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
This may not be a text book method to resolve VSS backup issues but it seemed to have worked on few of the Windows 2003 servers we had issues while performing a Volume Shadow Copy backup. If you have issues while performing a shadow copy backup usin…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question