Solved

Wireless to a Radius server from a computer not on the domain.

Posted on 2012-04-13
5
347 Views
Last Modified: 2013-12-27
My company would like to have a login for guests to be able to use so they can connect their laptops to wireless and access the internet and nothing else on the network.

Our Authentication is WPA and the Encryption is TKIP. When I set these settings on my test laptop I get an error stating " Windows was unable to find a certificate to log you on to the network".

Ultimately I would prefer not to do certificates for our guests and preferably give them a login to connect to our network wirelessly. I've read that in the Authentication tab for Wireless Networks I can uncheck the "Enable IEEE 802.1x authentication for this network" to bypass certificates but that option is grayed out for me.

Any suggestions or ideas? If you need more information please let me know.
0
Comment
Question by:Winsoup
  • 3
  • 2
5 Comments
 
LVL 17

Expert Comment

by:Anuroopsundd
ID: 37844469
can you try to use different authentication method than WPA and the Encryption is TKIP
0
 
LVL 3

Author Comment

by:Winsoup
ID: 37844536
I'd prefer not to. We have a bunch of iPad's, iPhone's, Droids, etc. that connect to the Radius server and are able to use wireless without issue as long as they have sufficient rights. I fear that by changing security I'll knock down the devices that already work.

Laptops (as long as they're on the domain and the user or computer has privileges to connect wirelessly) work fine.

I created a user called "wireless" and gave the wireless user privileges to use wireless. I want a guest to be able to see our wireless, connect to it and sign in as the wireless user so they're able to use our WAN.
0
 
LVL 17

Accepted Solution

by:
Anuroopsundd earned 500 total points
ID: 37844617
Ok.. so you are using Same SSID for the guest network?
May be another thought you may think of is having different SSID of guest with different subnet and just give them access to Internet.
This simplifies and adds security.
0
 
LVL 3

Author Comment

by:Winsoup
ID: 37845040
At least I'm on the right path now, thanks Anuroopsundd.

I've created a new SSID and subnet for guest wireless. I'll have to play around on Monday to get everything configured since I haven't had a chance to yet. I'll update you on Monday!
0
 
LVL 3

Author Closing Comment

by:Winsoup
ID: 37853267
Your comments definitely got me rolling down the right path. I'll have to wait until off hours to do more testing and change the encapsulation on the switches to trunk instead of access but I believe I should be fine from here on out. Thanks.
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Clarification on Network "Usage" for ESXi host. 13 68
Looking for open port with Telnet 5 59
md5 password 3 62
Home network with two AP's dropping WiFi connectivity 12 48
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question