Setting up Wireless 802.1x with Windows Server 2008 and NPS

Setting up Wireless 802.1x with Windows Server 2008 and NPS

                        Filed Under (Windows Networking) by Just An Admin on 25-11-2010                       

Setting up a more advanced Wireless network within a business, school or other large organization network quickly brings you to use 802.1x for security reasons, allowing you to connect to a LDAP, RADIUS or Active Directory (AD) service. My brand new wireless network, consisting of a Ruckus ZoneDirector 1006 and five Ruckus 7363 Access Points was going to be connected to our Windows 2008 Server using Network Policy Services (NPS). Users connecting to this network have to be registered in the AD and be able to use that account to connect to the Wireless network. I know PSK/Certificate based solutions are offered too, even with the Ruckus product itself, but this is what we decided upon.

48 hours later… The Ruckus Wireless unit is performing even better then expected, offering it’s moneys worth. But getting the setup to authenticate against my NPS setup seems an impossible task. Logging is insufficient to get a grasp of the exact problem: Why could users not authenticate their wireless connection using their AD accounts? Immediate disconnects, waiting to authenticate,Authentication failed. Documents with too much detail passed my workspace, eventlogs were reread and analyzed and Google was asked for advice to many times.

72 hours later… Frustration is getting the better of me. I have installed RADIUS Test Clients to see if authentication is working as expected (and it did), IAS Log Viewer from Deepsoft was used to debug the NPS logs… Until i found this article on Mat’s Techblog Securing Wireless Networks with Windows Server 2008 and NPS.

Worked like a charm!!! Well written and without unnecessary information. Followed it to the letter and got the setup working in under 10 minutes. Great job!

———————- Original post from Mat’s Blog ———————————–

In this post I’m going to go through the process of securing your wireless  network using Windows Server 2008 and the NPS (Network Policy Services) role  from start to finish.

Previously, I was using Windows Server 2003 with IAS (Internet Authentication  Services) to secure my wireless network, until I recently upgraded all of my  servers to Windows Server 2008 – By the way, NPS is the new version and name for  IAS.

Here is the TechNet guide which I followed – http://technet.microsoft.com/en-us/library/cc771455.aspx –  I will be applying these guidelines to the following environment…

  • A Windows Server 2008 machine running AD DS (Active Directory Domain  Services)
  • A Windows Server 2008 machine running NPS (Network Protection Services) and  AD CS (Active Directory Certificate Services)
  • A Linksys WAP54G (an entry level wireless access point – you can use any  wireless access point that supports RADIUS)

You can run NPS, AD DS and AD CS on the same machine if you want to, but I  wouldn’t recommend it (personally, I prefer to keep my domain controllers  running only AD DS).

I’m not going to go through the process of installing AD DS as it’s a little  out of scope for this post, so we’ll start from having an established domain,  and a clean install of Windows Server 2008 on which we will install AD CS and  NPS.

The first step is installing AD CS and NPS on your clean Windows Server 2008  install…

  1. First, you’ll need to join the server to your existing domain and then  restart;
  2. After the server restarts, open Server Manager;
  3. Click on the Roles node;
  4. Click on the Add Roles;
  5. On the Server Roles screen, select Active Directory  Certificate Services and Network Policy and Access  Services;
  6. Follow the wizard, selecting Network Policy Server when  configuring the Network Policy and Access Services role and  leaving the default Certification Authority role service  selected for AD CS;
  7. Select Enterprise for the setup type for AD  CS;
  8. Choose Root CA for the CA Type (remember  we’re assuming that this is the first Certification Authority in your  environment, so if it’s not you either don’t need to install this role, or if  you choose you can configure this server as a Subordinate CA instead);
  9. Run through the rest of the wizard, making any changes you may wish to,  otherwise just leave the defaults as they are appropriate (I changed the CA  Common Name to the name of the server, as I think it’s cleaner) – Note  that there is a warning at the end of the wizard, stating that the name of this  server cannot be changed after installing the AD CS role.

Now that you have a Root CA and an NPS server on your domain, we can start  configuring it…

  1. Open an MMC console, and go to File ->  Add/Remove Snap-in…
  2. Add the Certificates snap-in, selecting Computer  account for the local computer;
  3. Expand Certificates (Local Computers) ->  Personal, right click on Certificates and  choose Request new certificate;
  4. Follow the wizard, choosing Computer for the certificate  type and then click the Enroll button, then close MMC;
  5. Open the Network Policy Server administrative console from  Administrative Tools;
  6. Right click on the parent node, NPS (Local) and click  Register server in Active Directory – Click OK on the two  informational popups;
  7. With the NPS (Local) node still selected, choose  RADIUS server for 802.1X Wireless or Wired Connections and then  click on the Configure 802.1X button;
  8. Under Type of 802.1X connections, select Secure  Wireless Connections and provide an appropriate name for the policies  which will be created as part of this wizard;
  9. In the next step, you’ll need to configure a RADIUS client (by the way,  RADIUS stands for Remote Authentication Dial In User Service), so click on the  Add button;
  10. The RADIUS client will be your wireless access point, so for the friendly  name type in something to identify the access point (for example, AP01), then  provide the IP address or DNS entry for the access point;
  11. Click on the Generate radio button, and then click on the  Generate button to generate a shared secret – Copy the shared  secret to a notepad document, and click OK – Note that on my particular  access point, a character limit of 22 characters exists for shared secrets so I  had to cut the string down to the acceptable limit, so I would suggest checking  for this limitation on your own hardware;
  12. Click Next, and then choose Microsoft: Protected EAP (PEAP) and then click on the Configure button (if you get an error  message, you probably didn’t follow steps 1 -> 4 correctly);
  13. Ensure that the Certificate issued drop down box has the  certificate you enrolled in step 4;
  14. Click Next, and then click on the Add button to use an Active Directory  group to secure your wireless (you should add both the machine accounts and user  accounts to this group to allow the machine to authenticate on the wireless  before the user logs in);
  15. On the next step of the wizard, you can configure VLAN information,  otherwise just accept defaults to complete;
  16. Restart the Network Policy Server service.

If you expand the Policies node now, you’ll see that the wizard has created a  Connection Request Policy and a Network Policy containing the appropriate  settings to authenticate your wireless connection – These individual policies  can obviously be created manually, but the wizard is an easier method.

You can also remove the less secure authentication method options, and  increase the encryption methods in the network policy if you wish (I have  configured mine this way)…

  1. Under the Network Policies node, bring up the properties of  the newly created policy;
  2. On the Constraints tab, uncheck all of the checkboxes under  Less secure authentication methods;
  3. On the Settings tab, click on Encryption and uncheck all boxes except Strongest encryption (MPPE  128-bit);
  4. Save the policy and then restart the Network Policy Server service.

With the NPS server configured to accept requests from your wireless access  point, you’ll now need to configure the access point to communicate with the NPS  servers – These instructions are for my Linksys WAP54G, but will be similar to  most access points which support RADIUS…

  1. In the web interface for the access point, click on the  Wireless tab and assign an appropriate SSID;
  2. Click on the Security sub-tab, and set the Security  Mode to WPA-Enterprise (if your access point supports  WPA2-Enterprise, use this instead);
  3. Set the Encryption to AES, and then  provide the NPS server IP as the RADIUS Server and the  Shared Secret that you saved in step 11 above;
  4. Save your settings and restart the access point.

Now your access point should be configured to talk to your NPS server, so all  that is left is to configure your clients to connect – The recommended way of  doing this, would be to use Group Policy, but the instructions below are for  configuring a Windows Vista client – You can easily replicate these actions in a  Group Policy under the Security node.

To configure a Windows Vista client which is joined to the domain…

  1. Open up the Network and Sharing Center;
  2. Click on Connect to a network;
  3. Locate the network you have just secured (it should say  Security-enabled network next to it) and click the  Connect button;
  4. It will take a short while to set up the profile and then connect  successfully.

You can also configure a few extra settings to speed up the time it takes to  connect (it won’t improve the overall speed, only the time it takes to initially  connect to the wireless network)…

  1. In the Network and Sharing Center, click on Manage wireless  networks and then double click the network you set up above;
  2. Click the Security tab, and then the  Settings button below;
  3. The Validate server certificate checkbox should already be  selected by default, but you should also select the CA that you set up earlier  under the Trusted Root Certification Authorities to speed up  the certificate verification process;
  4. You can also check the box Do not prompt user to authorize new  servers or trusted certification authorities in order to improve the  user’s experience.

Some suggestions recommendations…

  • Use a security group with the appropriate machine and user accounts as  members to secure your network;
  • Group Policy is by far the best way to deploy the client side settings, but  will obviously require an established domain connection in order to push these  settings down to the clients;
  • While disabling the SSID of your access point sounds like an increased  security measure, it can be a security risk if you are configuring your  workstations to actively look for the SSID name – Potential session hijackers  could intercept this traffic and set up an SSID for the requested name,  unknowingly to the user which would then connect to a potentially malicious  network;
  • You can vary the encryption type from AES to TKIP if your devices don’t all  support AES, although AES is the preferred encryption algorithm;
  • If your having trouble with your connection, there are a few places you can  look to troubleshoot, namely – Local client event logs, the NPS log file which  lives in C:WindowsSystem32logfiles and most importantly the Security event logs  of the NPS server which contains detailed information about access successes and  failures.
Incoming search terms:

http://www.jadota.com/2010/11/setting-up-wireless-802-1x-with-windows-server-2008-and-nps/

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值