• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1452
  • Last Modified:

how to configure windows 2008 nps (ra with cisco aironet wireless

i have windows 2008 dc with 5 wireless access point and cisco controller i need to configure radius server to authenticate domain user to connect to wireless connection.
0
leganti
Asked:
leganti
  • 6
  • 3
1 Solution
 
Jakob DigranesSenior ConsultantCommented:
on NPS - do the following:

Choose 802.1X connection from drop down in main menu (see picture)
Give the connection a name
create Radius Clients for all APs - with correct shared key
Select EAP type - for establishing connection to NPS server. Try with Protected EAP first
Choose configure - choose certificate and choose EAP type, try MS-Chap V2 - clients authenticating using usernames and passwords
Select User Groups that are granted access, depending on how you want to grant access, to computers, users or both ...

nps start
Here's some good step-by-step guide
http://techblog.mirabito.net.au/?p=87
http://www.fatofthelan.com/technical/using-windows-2008-for-radius-authentication/
0
 
legantiAuthor Commented:
thanx jakob_di i will check it and let you know.
0
 
legantiAuthor Commented:
regarding policy properties ----setting    what i have to change if i have cisco aironet
for example : radius attributes , nap,routing and remote acccess
0
Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

 
legantiAuthor Commented:
do i have to configure any thing Active directory group policy for wireless users , or not.
0
 
legantiAuthor Commented:
find attached doc if this is oky to implement windows 2008 nps radiusWINDOWS-2008-NPS-WITH-CISCO-AIRO.doc with cisco wireless
0
 
Jakob DigranesSenior ConsultantCommented:
you can use a special windows group if you want only a few users to have access, or you can use domain computers/users ---

That document covers some - but it uses EAP-TLS (Certificate and smart card) for inner authentication - but says nothing on how to deploy certificates to users and computers.
It doesn't say anything on how to deploy RAS/IAS certificate to NPS server.

For start - it would be easier to deploy MsChapV2 as inner authentication method rather than EAP-TLS - to avoid enrolling certificates to all clients

Otherwise it looks okay
0
 
legantiAuthor Commented:
thanx jakob_di but i have doubt regarding for lap top not member of the AD domain will it work this.
0
 
Jakob DigranesSenior ConsultantCommented:
if it's not domain joined - then you should deploy a user group and either certificates (export and import to user computer) or user EAP-MsChap V2 - and remove Use Windows Login Credentials;
http://www.codealias.info/technotes/caching_domain_logon_credentials_for_eap_peap_mschap_authentication
0
 
legantiAuthor Commented:
kindly check the error below  as you can see it is displaying   mac address not user name i don't why

1- can you i configure the nps not to check the certificate and is required to install certificate for nps

2-how to configure it to use only user name and password from AD.

----------------------------------------------------------------------------------------------

Network Policy Server denied access to a user.

Contact the Network Policy Server administrator for more information.

User:
    Security ID:            NULL SID
    Account Name:            001cbf22157f
    Account Domain:            abc
    Fully Qualified Account Name:    abc\001cbf22157f

Client Machine:
    Security ID:            NULL SID
    Account Name:            -
    Fully Qualified Account Name:    -
    OS-Version:            -
    Called Station Identifier:        00-1a-6c-3c-ef-30:abc-WL
    Calling Station Identifier:        00-1c-bf-22-15-7f

NAS:
    NAS IPv4 Address:        192.168.1.2
    NAS IPv6 Address:        -
    NAS Identifier:            abc-WLC
    NAS Port-Type:            Wireless - IEEE 802.11
    NAS Port:            1

RADIUS Client:
    Client Friendly Name:        ciscowl
    Client IP Address:            192.168.1.2

Authentication Details:
    Connection Request Policy Name:    wl
    Network Policy Name:        -
    Authentication Provider:        Windows
    Authentication Server:        nps.abc.local
    Authentication Type:        Unauthenticated
    EAP Type:            -
    Account Session Identifier:        -
    Logging Results:            Accounting information was written to the local log file.
    Reason Code:            8
    Reason:                The specified user account does not exist.
0

Featured Post

Making Bulk Changes to Active Directory

Watch this video to see how easy it is to make mass changes to Active Directory from an external text file without using complicated scripts.

  • 6
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now