![]() The wireless network is built on the UniFi brand of Access Points with the Windows Server 2012 R2 Network Policy Server (NPS) as the RADIUS server.ġ) WS2012R2 Certificate Authority Server.Ģ) UniFi AC Access Points and Controller.Ĥ) Group Policy Object configuration for Certificate Auto-enrollment and Wireless 802.1X. In this post, I provide my configuration steps in setting up Microsoft Protected Extensible Authentication Protocol with Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) version 2 authentication. ![]() This replaces easily distributed and insecure network keys.Ģ) Administrators can more easily manage user and device credentials and centrally revoke access if and when necessary. ![]() Some of the benefits of this redesign are as follows:ġ) User access control is managed with usernames and passwords in Active Directory. I’ve recently reconfigured and redesigned a client site’s WPAPersonal Wireless network for Radius (Remote Authentication Dial-In User Service) Authentication on an NPS (Network Policy Server) Server running on the Windows Server 2012R2 platform. In an enterprise environment this is not ideal. Basic 802.1X Wireless network implementation requires an alphanumeric network key for access and authentication.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |