Setting up Wireless 802.1x with Windows Server 2008 and NPS
来源:互联网 发布:h3c snmp网络管理软件 编辑:程序博客网 时间:2024/04/29 05:06
Setting up Wireless 802.1x with Windows Server 2008 and NPS
Filed Under (Windows Networking) byJust An Admin on 25-11-2010
Setting up a more advanced Wireless network within a business, school or other large organization network quickly brings you to use 802.1x for security reasons, allowing you to connect to a LDAP, RADIUS or Active Directory (AD) service. My brand new wireless network, consisting of a Ruckus ZoneDirector 1006 and five Ruckus 7363 Access Points was going to be connected to our Windows 2008 Server using Network Policy Services (NPS). Users connecting to this network have to be registered in the AD and be able to use that account to connect to the Wireless network. I know PSK/Certificate based solutions are offered too, even with the Ruckus product itself, but this is what we decided upon.
48 hours later… The Ruckus Wireless unit is performing even better then expected, offering it’s moneys worth. But getting the setup to authenticate against my NPS setup seems an impossible task. Logging is insufficient to get a grasp of the exact problem: Why could users not authenticate their wireless connection using their AD accounts? Immediate disconnects, waiting to authenticate,Authentication failed. Documents with too much detail passed my workspace, eventlogs were reread and analyzed and Google was asked for advice to many times.
72 hours later… Frustration is getting the better of me. I have installed RADIUS Test Clients to see if authentication is working as expected (and it did), IAS Log Viewer fromDeepsoft was used to debug the NPS logs… Until i found this article onMat’s Techblog – Securing Wireless Networks with Windows Server 2008 and NPS.
Worked like a charm!!! Well written and without unnecessary information. Followed it to the letter and got the setup working in under 10 minutes. Great job!
———————- Original post from Mat’s Blog ———————————–
In this post I’m going to go through the process of securing your wireless network using Windows Server 2008 and the NPS (Network Policy Services) role from start to finish.
Previously, I was using Windows Server 2003 with IAS (Internet Authentication Services) to secure my wireless network, until I recently upgraded all of my servers to Windows Server 2008 – By the way, NPS is the new version and name for IAS.
Here is the TechNet guide which I followed – http://technet.microsoft.com/en-us/library/cc771455.aspx – I will be applying these guidelines to the following environment…
- A Windows Server 2008 machine running AD DS (Active Directory Domain Services)
- A Windows Server 2008 machine running NPS (Network Protection Services) and AD CS (Active Directory Certificate Services)
- A Linksys WAP54G (an entry level wireless access point – you can use any wireless access point that supports RADIUS)
You can run NPS, AD DS and AD CS on the same machine if you want to, but I wouldn’t recommend it (personally, I prefer to keep my domain controllers running only AD DS).
I’m not going to go through the process of installing AD DS as it’s a little out of scope for this post, so we’ll start from having an established domain, and a clean install of Windows Server 2008 on which we will install AD CS and NPS.
The first step is installing AD CS and NPS on your clean Windows Server 2008 install…
- First, you’ll need to join the server to your existing domain and then restart;
- After the server restarts, open Server Manager;
- Click on the Roles node;
- Click on the Add Roles;
- On the Server Roles screen, select Active Directory Certificate Services andNetwork Policy and Access Services;
- Follow the wizard, selecting Network Policy Server when configuring theNetwork Policy and Access Services role and leaving the defaultCertification Authority role service selected for AD CS;
- Select Enterprise for the setup type for AD CS;
- Choose Root CA for the CA Type (remember we’re assuming that this is the first Certification Authority in your environment, so if it’s not you either don’t need to install this role, or if you choose you can configure this server as a Subordinate CA instead);
- Run through the rest of the wizard, making any changes you may wish to, otherwise just leave the defaults as they are appropriate (I changed the CA Common Name to the name of the server, as I think it’s cleaner) –Note that there is a warning at the end of the wizard, stating that the name of this server cannot be changed after installing the AD CS role.
Now that you have a Root CA and an NPS server on your domain, we can start configuring it…
- Open an MMC console, and go to File -> Add/Remove Snap-in…
- Add the Certificates snap-in, selecting Computer account for the local computer;
- Expand Certificates (Local Computers) -> Personal, right click onCertificates and choose Request new certificate;
- Follow the wizard, choosing Computer for the certificate type and then click theEnroll button, then close MMC;
- Open the Network Policy Server administrative console from Administrative Tools;
- Right click on the parent node, NPS (Local) and click Register server in Active Directory – Click OK on the two informational popups;
- With the NPS (Local) node still selected, choose RADIUS server for 802.1X Wireless or Wired Connections and then click on theConfigure 802.1X button;
- Under Type of 802.1X connections, select Secure Wireless Connections and provide an appropriate name for the policies which will be created as part of this wizard;
- In the next step, you’ll need to configure a RADIUS client (by the way, RADIUS stands for Remote Authentication Dial In User Service), so click on the Add button;
- The RADIUS client will be your wireless access point, so for the friendly name type in something to identify the access point (for example, AP01), then provide the IP address or DNS entry for the access point;
- Click on the Generate radio button, and then click on the Generate button to generate a shared secret – Copy the shared secret to a notepad document, and click OK –Note that on my particular access point, a character limit of 22 characters exists for shared secrets so I had to cut the string down to the acceptable limit, so I would suggest checking for this limitation on your own hardware;
- Click Next, and then choose Microsoft: Protected EAP (PEAP) and then click on theConfigure button (if you get an error message, you probably didn’t follow steps 1 -> 4 correctly);
- Ensure that the Certificate issued drop down box has the certificate you enrolled in step 4;
- Click Next, and then click on the Add button to use an Active Directory group to secure your wireless (you should add both the machine accounts and user accounts to this group to allow the machine to authenticate on the wireless before the user logs in);
- On the next step of the wizard, you can configure VLAN information, otherwise just accept defaults to complete;
- Restart the Network Policy Server service.
If you expand the Policies node now, you’ll see that the wizard has created a Connection Request Policy and a Network Policy containing the appropriate settings to authenticate your wireless connection – These individual policies can obviously be created manually, but the wizard is an easier method.
You can also remove the less secure authentication method options, and increase the encryption methods in the network policy if you wish (I have configured mine this way)…
- Under the Network Policies node, bring up the properties of the newly created policy;
- On the Constraints tab, uncheck all of the checkboxes under Less secure authentication methods;
- On the Settings tab, click on Encryption and uncheck all boxes exceptStrongest encryption (MPPE 128-bit);
- Save the policy and then restart the Network Policy Server service.
With the NPS server configured to accept requests from your wireless access point, you’ll now need to configure the access point to communicate with the NPS servers – These instructions are for my Linksys WAP54G, but will be similar to most access points which support RADIUS…
- In the web interface for the access point, click on the Wireless tab and assign an appropriate SSID;
- Click on the Security sub-tab, and set the Security Mode toWPA-Enterprise (if your access point supports WPA2-Enterprise, use this instead);
- Set the Encryption to AES, and then provide the NPS server IP as theRADIUS Server and the Shared Secret that you saved in step 11 above;
- Save your settings and restart the access point.
Now your access point should be configured to talk to your NPS server, so all that is left is to configure your clients to connect – The recommended way of doing this, would be to use Group Policy, but the instructions below are for configuring a Windows Vista client – You can easily replicate these actions in a Group Policy under theSecurity node.
To configure a Windows Vista client which is joined to the domain…
- Open up the Network and Sharing Center;
- Click on Connect to a network;
- Locate the network you have just secured (it should say Security-enabled network next to it) and click the Connect button;
- It will take a short while to set up the profile and then connect successfully.
You can also configure a few extra settings to speed up the time it takes to connect (it won’t improve the overall speed, only the time it takes to initially connect to the wireless network)…
- In the Network and Sharing Center, click on Manage wireless networks and then double click the network you set up above;
- Click the Security tab, and then the Settings button below;
- The Validate server certificate checkbox should already be selected by default, but you should also select the CA that you set up earlier under theTrusted Root Certification Authorities to speed up the certificate verification process;
- You can also check the box Do not prompt user to authorize new servers or trusted certification authorities in order to improve the user’s experience.
Some suggestions recommendations…
- Use a security group with the appropriate machine and user accounts as members to secure your network;
- Group Policy is by far the best way to deploy the client side settings, but will obviously require an established domain connection in order to push these settings down to the clients;
- While disabling the SSID of your access point sounds like an increased security measure, it can be a security risk if you are configuring your workstations to actively look for the SSID name – Potential session hijackers could intercept this traffic and set up an SSID for the requested name, unknowingly to the user which would then connect to a potentially malicious network;
- You can vary the encryption type from AES to TKIP if your devices don’t all support AES, although AES is the preferred encryption algorithm;
- If your having trouble with your connection, there are a few places you can look to troubleshoot, namely – Local client event logs, the NPS log file which lives in C:WindowsSystem32logfiles and most importantly the Security event logs of the NPS server which contains detailed information about access successes and failures.
Incoming search terms:
- - how to configure 802 1x wireless in NPS - NPS regsiter server in active directory - NPS 802 1x wireless - set up nps for wireless - 802 1x server 2008 - nps server - 802 1x NPS - configure 802 1x server 2008 - nps wireless - setting up nps
http://www.jadota.com/2010/11/setting-up-wireless-802-1x-with-windows-server-2008-and-nps/
- Setting up Wireless 802.1x with Windows Server 2008 and NPS
- Setting up your Windows computer to run JPetStore 3.x with MySQL and Tomcat
- Setting up a windows PHP server with MSSQL
- Setting up Django and your web server with uWSGI and nginx
- Setting up Django and your web server with uWSGI and nginx
- Setting up Django and your web server with uWSGI and nginx
- Setting up Django and your web server with uWSGI and nginx
- Setting up SSL with a SelfSSL certificate on Windows Server 2003
- Setting Up and Working with Self-Service Transactions
- Setting up Django with Nginx, Gunicorn, virtualenv, supervisor and PostgreSQL
- 17.1.1.7 Setting Up Replication with New Master and Slaves
- Setting up a Mercurial server under IIS7 on Windows Server 2008 R2
- Setting up a git server on MacOS X Lion
- Setting Up An NFS Server And Client On OpenSUSE 11.3
- Setting up LaTeX for Windows 9x/NT/2000/XP
- Setting up a Push Notification service on Windows Server 2003
- Setting up Eclipse with Tomcat
- Setting up Spark with Gradle
- she窗体皮肤效果查看器
- parted指令
- 乔布斯经典语录
- Flex下载与安装
- 一步一步写算法(之线性堆栈)
- Setting up Wireless 802.1x with Windows Server 2008 and NPS
- Ubuntu 10.04 之Vmware Server 2.0 安装
- VC编译程序时Cannot open precompiled header file: 'Debug/.pch': No such file or directory为什么
- 硬编码科普1
- 产品和项目的差别
- Ubuntu的基本配置
- 安装JBPM4.1
- 自然排序算法介绍
- PHP_SELF 应用初步