Setup W2K3SBS as a RADIUS server for Wifi authentication...


Recommended Posts

Hello

Im wondering the pros and cons on setting up a wifi router for RADIUS autentification instead of WPA2. The RADIUS server would be a W2K3SBS with Active Directory.

How would I go on with setting this up on the W2K3SBS server?

Thank you

Link to comment
Share on other sites

Pros is that is it much more secure than WPA2. 

 

The only issue that there is with RADIUS auth is that if you have a requirement that forces users to change passwords, they will not be able to authenticate if their cached password is mismatched from their domain password.  After a password change you will need to be physically plugged in to apply the password to the cache.  We have this issue where I work, lots of wireless users. 

Link to comment
Share on other sites

"Pros is that is it much more secure than WPA2. "

To be honest that is debatable.. If you think about it, normal required password length for windows is what 7 characters. User name is easy to guess or get via email address if they are using exchange, etc.

Could leave network open to dos of sorts, if I just flood the server with login requests -- possible to even lock out say most every account in their AD if they are not setup correctly, etc.

The pro of enterprise auth vs just a psk if you ask me is more the ability to remove a users access without having to have every single user change the password they use. If 1 user account get compromised, you change that 1 account not the shared PSK.

Where you have a user base that comes and goes - using a psk would suck if you had to change it every time a user got fired or quit, etc.

So I don't think I agree with the statement that is more secure -- more flexible for sure, but not really any more secure if you ask me.

Link to comment
Share on other sites

not if the username does not match that of the email address.  one company used the first 5 letters of their last name and their first initial...another used first name, middle initial, last 2 initials....no one has the same standards.  I personally like firstinitial lastname.  some even say screw it and make it the same their username which in many cases is firstname.lastname.  stupid non standard standards. 

 

but anyway, you would have to guess username, if they have access to the wireless (some do not), and then guess their password.  whole lot of guessing if you ask me vs guessing one passkey.

Link to comment
Share on other sites

  1. Install the AD cert services role
  2. Duplicate the NPS Server cert and assign enroll permissions for your Server
  3. Request the duplicated NPS Server cert and install it to computer certs / personal
  4. Install the NPS role and configure a radius client
  5. On the NPS console select the 802.1X wizard
  6. Select secure wireless connections
  7. Select PEAP as the authentication method and remove all the other methods
  8. Finish the wizard and remove everything except maximum 128bit encryption

That's what i do usually, Make sure you don't use non standard characters for the shared secret like %$"^ just Hex

Link to comment
Share on other sites

  • Install the AD cert services role
  • Duplicate the NPS Server cert and assign enroll permissions for your Server
  • Request the duplicated NPS Server cert and install it to computer certs / personal
  • Install the NPS role and configure a radius client
  • On the NPS console select the 802.1X wizard
  • Select secure wireless connections
  • Select PEAP as the authentication method and remove all the other methods
  • Finish the wizard and remove everything except maximum 128bit encryption
That's what i do usually, Make sure you don't use non standard characters for the shared secret like %$"^ just Hex
I thought a RADIUS server used AD creds, not a certificate.
Link to comment
Share on other sites

PEAP uses both a certificate to stop clients connecting to rogue access points and your domain credentials. If you can setup a CA or have one already its the best choice.

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.