Solved

Have 2003 Radius server for Wireless need to setup new 2012 server need help

Posted on 2014-01-22
1
407 Views
Last Modified: 2014-02-03
Hello EE,
I had someone setup a Radius configuration on Windows 2003 and they are no longer here.  I now have to configure a new domain controller 2012 R2 with Radius to replace the original server.  It is running as a DC now, but I need step by step on configuring the Radius Authentication.  Does anyone have a good step by step guide?  I can reference existing for some of the settings though big difference between the two.
0
Comment
Question by:bergquistcompany
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 31

Accepted Solution

by:
Gareth Gudger earned 500 total points
ID: 39801873
How about an easy to follow video.
http://www.youtube.com/watch?v=1yYywwPWXys

:)
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Make the most of your online learning experience.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question