Solved

Wireless to a Radius server from a computer not on the domain.

Posted on 2012-04-13
5
348 Views
Last Modified: 2013-12-27
My company would like to have a login for guests to be able to use so they can connect their laptops to wireless and access the internet and nothing else on the network.

Our Authentication is WPA and the Encryption is TKIP. When I set these settings on my test laptop I get an error stating " Windows was unable to find a certificate to log you on to the network".

Ultimately I would prefer not to do certificates for our guests and preferably give them a login to connect to our network wirelessly. I've read that in the Authentication tab for Wireless Networks I can uncheck the "Enable IEEE 802.1x authentication for this network" to bypass certificates but that option is grayed out for me.

Any suggestions or ideas? If you need more information please let me know.
0
Comment
Question by:Winsoup
  • 3
  • 2
5 Comments
 
LVL 17

Expert Comment

by:Anuroopsundd
ID: 37844469
can you try to use different authentication method than WPA and the Encryption is TKIP
0
 
LVL 3

Author Comment

by:Winsoup
ID: 37844536
I'd prefer not to. We have a bunch of iPad's, iPhone's, Droids, etc. that connect to the Radius server and are able to use wireless without issue as long as they have sufficient rights. I fear that by changing security I'll knock down the devices that already work.

Laptops (as long as they're on the domain and the user or computer has privileges to connect wirelessly) work fine.

I created a user called "wireless" and gave the wireless user privileges to use wireless. I want a guest to be able to see our wireless, connect to it and sign in as the wireless user so they're able to use our WAN.
0
 
LVL 17

Accepted Solution

by:
Anuroopsundd earned 500 total points
ID: 37844617
Ok.. so you are using Same SSID for the guest network?
May be another thought you may think of is having different SSID of guest with different subnet and just give them access to Internet.
This simplifies and adds security.
0
 
LVL 3

Author Comment

by:Winsoup
ID: 37845040
At least I'm on the right path now, thanks Anuroopsundd.

I've created a new SSID and subnet for guest wireless. I'll have to play around on Monday to get everything configured since I haven't had a chance to yet. I'll update you on Monday!
0
 
LVL 3

Author Closing Comment

by:Winsoup
ID: 37853267
Your comments definitely got me rolling down the right path. I'll have to wait until off hours to do more testing and change the encapsulation on the switches to trunk instead of access but I believe I should be fine from here on out. Thanks.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question