Domain auth before issuing IP address via DHCP

Posted on 2011-03-21
Medium Priority
Last Modified: 2012-05-11
I'm trying to see if it's possible to lock down DHCP (running on a Windows 2003 Server R2) so that before a DHCP lease is issued, the computer has to be a member of the domain. I've seen a few posts on EE and on the interweb at large that mention 802.1x and a RADIUS server, but at the moment we don't have a RADIUS server running (only AD/ LDAP.)

I realize that without being a member of the domain and having the proper rights a rouge machine/ user couldn't access any network resources (easily, anyway), I'd still like to avoid and "visitors" to the company who just jack in from causing havoc via malware. (And yes, we do have a guest wifi AP setup on a DMZ, it's just sometimes people see a port and plug in.)
Any thoughts or answers are greatly appreciated on the issue.
Question by:biofishfreak
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3

Expert Comment

ID: 35184613

Check out this article

Wireless networking in Windows Server 2003

Author Comment

ID: 35184670
AD man, would this sort of setup translate to a wired network? The recent issue we've had is a consultant was asked to sign onto our DMZ wireless network, but instead they plugged into our ethernet network. This is what we are trying to avoid right now. It's kind of looking like MAC address filtering is the way to go.

Accepted Solution

ActiveDirectoryman earned 1400 total points
ID: 35184921

Yea, there is

here you go :

Deployment of IEEE 802.1X for Wired Networks Using Microsoft Windows

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

LVL 46

Assisted Solution

by:Craig Beck
Craig Beck earned 600 total points
ID: 35199208
You can make a RADIUS server using a Windows Server by installing IAS (2003) or NPS (2008).

However, Microsoft are a bit twitchy when it comes to supporting clients using 802.1X.
This would be the way to do it though, and I have deployed this in some big sites without any problems.

Of course, your switches will need to support 802.1X too.

Expert Comment

ID: 35199260

It explains that in the article.  It is very straight-forward.

Author Comment

ID: 35200901
Awesome, thanks you two. I'm going to wait to double check with my network guy on this when he gets back in on Monday. I'll update everyone then.

Author Closing Comment

ID: 35796991
Wow, I suck at responding fast. So after talking with my Network Admin, we've decided to use some network monitoring software to detect when a new system comes onto the network, alert us, and we roll out ASAP to fix things. I appreciate both of your help, and assigned points to the both of you.

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question