- Network Policy Server
- Routing and Remote Access Servers
- Remote Access Services
- Routing
Figure 1: Network Policy and Access Services role settings
Review the tutorial and click Next .
Select the items listed below (see Figure 2):
Click Next , and then click Install and wait for the installation process to complete and click Close .
Now you can start configuring NPS with the RADIUS function: click Start , type nps.msc and press Enter .
With the Standard Configuration option, select RADIUS server for 802.1X Wireless or Wired Connections (see Figure 3) from the drop-down menu.
Figure 3: Select the RADIUS server for 802.1X
Click Configure 802.1X .
With Type of 802.1X connections, select Secure Wireless Connections (see Figure 4) and click Next .
For each wireless controller or access point, click Add to create a new RADIUS client entry. But what is shown in Figure 5, you will have to specify the name, which is easy to distinguish, IP or DNS address and Shared Secret shared secret.
These secrets are very important for authentication and encryption. Please enter complex details with a certain length, like a password. They need to be unique to each wireless controller or AP. You then need to enter such Shared Secret sharing secrets into the respective controllers or APs. Remember to keep them secret, save them somewhere safe.
Regarding the authentication method, Authentication Method, select Microsoft Protected EAP (PEAP) because we are using PEAP.
Click the Configure . button, select the certificate you created earlier, click OK .
In the Specify User Groups window (see Figure 6), click Add .
In the Select Group dialog boxes, enter groups, click Advanced to search for available groups. If you haven't created additional groups, select Domain Users to allow users and Domain Computers to authenticate the machine if your controllers or APs support it. If you receive an error message that the domain does not exist, restart the Active Directory Domain Services server and do it again.
Once you have added the desired groups, click Next to continue.
In the Configure a VLAN window (see Figure 7), if your network (switch and controllers or AP) supports VLANs and you have configured them, then click Configure . to set up VLAN functions.
Now that you're done configuring VLANs, click Next .
Review the settings and click Finish .
Configure the wireless controller or AP
Now is the time to configure the controllers or access points. First, invoke the web interface by entering their IP address into the browser. Then navigate to the wireless settings.
Select -Enterprise or WPA2-Enteprise . For encryption type, select TKIP if using WPA or AES if using WPA2 . Then enter the IP address for the RADIUS server, this is the Windows Sever machine you set up. Next, enter the shared secrets you created earlier for the controller and AP. Then save the settings.
Install the CA certificate of the client name
In Part 1, you created the server certificate and the Certificate Authority (CA) for yourself. So you need to install the CA on your clients. In this way, the client can validate the server before performing authentication.
If you are running a domain network using Active Directory, you need to deploy this certificate with Group Policy. However, it is possible to install it yourself, this is what we will discuss.
To view and manage certificates in Windows Server 2008, call the Certificate Manager. If you saved that MMC to your desktop in Part 1, open it. Otherwise, follow the steps below:
Tip: You should save this MMC to your desktop for easy access later: click File > Save .
Expand Certificates (Local Computer Account) , open Personal , click Certificates .
As shown in Figure 8, right-click the certificate with the end of CA, then select All Tasks , Export . Then follow the wizard to export. When prompted, do not export the private key but use the DER format. You should export to the USB drive so you can bring it to other clients easily.
Now on the client computers, double-click the certificate and click the Install Certificate button (Figure 9). Use the wizard to import it into the Trusted Root Certificate Authorities repository .
Configure network settings on the client
You can configure network settings. Like installing certificates, you can push network settings for clients using Group Policy if you are running a domain network with Active Directory. However, you can still manually configure the clients, as discussed in Windows XP, Vista and 7 below.
First, create a preferred network profile or network entry. With Security Type choose WPA-Enterprise or WPA2-Enteprise . With Encryption Type , select TKIP if using WPA or AES if using WPA2 .
Open the network profile and select the Security tab (in Vista & 7) or the Authentication tab (in XP). In XP, check the Enable IEEE 802.1x authentication option for this network.
With Network Authentication method (in Vista & 7, as shown in Figure 10) or EAP Type (in XP), select Protected EAP (PEAP) . In XP, also cancel select both checkboxes at the bottom of the window.
Only in Windows 7, click the Advanced Settings button in the Security tab. Then on the Advanced Settings window, check the Specify authentication mode option, select User Authentication , and click OK to return to the Security tab.
Click Settings (in Vista & 7) or the Properties button (in XP).
Then in the Protected EAP Properties dialog box, follow these steps (Figure 11 shows an example):
Figure 11: Configuring PEAP properties
Finally, click OK on the windows to save the settings.
Connect and login!
Now you have configured the server, the AP and can make the connection.
On the client computer, select the network from the list of available wireless networks. Unless you have enabled client mode to automatically use its Windows login, you will be prompted to enter the login credentials, as shown in Figure 12. Use the account on the Windows Server in the group already Previous configuration in the Network Policy and Access Services section. If you select the Domain Users group, the Administrator account needs to be enabled by default.
Conclude
You now have an Enterprise-encrypted network and 802.1X authentication, to do that, we really need to thank Windows Server 2008 for its built-in RADIUS functionality. In this article, I have shown you how to set up servers, APs, and clients for PEAP authentication. Users can now log in with their accounts.
To manage RADIUS server settings, such as adding or removing APs, use the Network Policy Server utility: click Start > All Programs > Administrative Tools > Network Policy Server .