{"id":36,"date":"2009-10-19T21:25:57","date_gmt":"2009-10-20T03:25:57","guid":{"rendered":"http:\/\/blog.escarra.org\/?p=36"},"modified":"2016-07-20T08:23:28","modified_gmt":"2016-07-20T14:23:28","slug":"wpa-enterprise-server-setup","status":"publish","type":"post","link":"https:\/\/blog.escarra.org\/?p=36","title":{"rendered":"WPA Enterprise &#8211; Server Setup"},"content":{"rendered":"<p>So it has been a little over three months since I last posted, and having left off before starting to explain a simple WPA Enterprise implementation, I will now continue.<\/p>\n<p>I&#8217;ll assume you already have a Domain Controller setup with a Certification Authority, and Internet Authentication Service, since that will be the key around authenticating our users and computers.<\/p>\n<p><!--more--><\/p>\n<p>So, let&#8217;s start with setting up our AD. We&#8217;ll create two security groups, one for authenticating computers, and another for authenticating users against the wireless network. We can add our Computer objects and User objects from AD to the respective groups.<\/p>\n<p><a href=\"http:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10_08_44-PM.png\"><img data-attachment-id=\"41\" data-permalink=\"https:\/\/blog.escarra.org\/?attachment_id=41\" data-orig-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.08.44-PM.png\" data-orig-size=\"667,289\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Screen shot 2009-10-19 at 10.08.44 PM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.08.44-PM.png\" data-large-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.08.44-PM.png\" decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-41\" title=\"Screen shot 2009-10-19 at 10.08.44 PM\" src=\"http:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10_08_44-PM.png\" alt=\"Screen shot 2009-10-19 at 10.08.44 PM\" width=\"667\" height=\"289\" \/><\/a><\/p>\n<p>Next, we&#8217;ll configure IAS Policies. Open the Internet Authentication Service console, then right click on <strong>Remote Access Policies<\/strong> and click on <strong>New Remote Policy<\/strong>.<\/p>\n<p>We can use the Wizard, as it asks the right questions to get this working quick.<\/p>\n<ul>\n<li>Name the policy as <strong>Wireless Users<\/strong>, and click <strong>Next<\/strong>.<\/li>\n<li>Click on <strong>Wireless<\/strong> and <strong>Next<\/strong>.<\/li>\n<li>Select <strong>Group<\/strong> and then click <strong>Add<\/strong>. Browse for the group we created for Wireless Users in AD, then click <strong>Next<\/strong>.<\/li>\n<li>Select the EAP type for the policy as <strong>Protected EAP (PEAP)<\/strong>.<\/li>\n<li>Finish the wizard.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10_13_46-PM.png\"><img data-attachment-id=\"42\" data-permalink=\"https:\/\/blog.escarra.org\/?attachment_id=42\" data-orig-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.13.46-PM.png\" data-orig-size=\"506,400\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Screen shot 2009-10-19 at 10.13.46 PM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.13.46-PM.png\" data-large-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.13.46-PM.png\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-42 alignnone\" title=\"Screen shot 2009-10-19 at 10.13.46 PM\" src=\"http:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10_13_46-PM.png\" alt=\"Screen shot 2009-10-19 at 10.13.46 PM\" width=\"506\" height=\"400\" \/><\/a><\/p>\n<p><a href=\"http:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10_16_52-PM.png\"><img data-attachment-id=\"43\" data-permalink=\"https:\/\/blog.escarra.org\/?attachment_id=43\" data-orig-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.16.52-PM.png\" data-orig-size=\"507,400\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"Screen shot 2009-10-19 at 10.16.52 PM\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.16.52-PM.png\" data-large-file=\"https:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10.16.52-PM.png\" decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-43\" title=\"Screen shot 2009-10-19 at 10.16.52 PM\" src=\"http:\/\/blog.escarra.org\/wp-content\/uploads\/2009\/10\/Screen-shot-2009-10-19-at-10_16_52-PM.png\" alt=\"Screen shot 2009-10-19 at 10.16.52 PM\" width=\"507\" height=\"400\" \/><\/a><\/p>\n<p>Repeat the steps above, but this time, create a policy for authenticating the computers instead of users. After that is done, we&#8217;ve got the IAS policies in place that&#8217;ll allow domain users to use the wireless network.<\/p>\n<p>On my next post, we&#8217;ll need to setup an association, then configure our AP, and then use Group Policy to our advantage: Automate the deployment of our root certificate and wireless access.<\/p>\n<p>By the time we&#8217;re done with all the steps our users will have wireless access as soon as the computer joins the domain and you authorize them. <strong>No keys!!!!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So it has been a little over three months since I last posted, and having left off before starting to explain a simple WPA Enterprise implementation, I will now continue. I&#8217;ll assume you already have a Domain Controller setup with a Certification Authority, and Internet Authentication Service, since that will be the key around authenticating [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"footnotes":"","_jetpack_memberships_contains_paid_content":false,"jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[11],"tags":[],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.escarra.org\/index.php?rest_route=\/wp\/v2\/posts\/36"}],"collection":[{"href":"https:\/\/blog.escarra.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.escarra.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.escarra.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.escarra.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=36"}],"version-history":[{"count":9,"href":"https:\/\/blog.escarra.org\/index.php?rest_route=\/wp\/v2\/posts\/36\/revisions"}],"predecessor-version":[{"id":671,"href":"https:\/\/blog.escarra.org\/index.php?rest_route=\/wp\/v2\/posts\/36\/revisions\/671"}],"wp:attachment":[{"href":"https:\/\/blog.escarra.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=36"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.escarra.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=36"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.escarra.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}