Configure the Network

Retrieve the Certificates from a Microsoft Certificate Authority

Prerequisites: A Microsoft Certificate Authority is installed.

Steps for the Trusted CA Certificate

  1. Launch your browser and go to http://<IP Address>/certsrv

    where <IP Address> is the IP address of the computer hosting the CA.

  2. Click Download a CA certificate, certificate chain or CRL.
  3. Select Base64 as the encoding method.
  4. Click Download CA certificate.
  5. Save the file to a location of your choice.

Steps for the Server Certificate

This certificate is used by the AAA Server to perform the server authentication (TLS handshake).

  1. Launch your browser and go to http://<IP Address>/certsrv

    where <IP Address> is the IP address of the computer hosting the CA.

  2. Click Request a certificate.
  3. Select Advanced certificate request.
  4. Click Create and submit a request to this CA.
  5. Select Web Server as the certificate template.
  6. Enter the IP address of the machine hosting the AAA Server in the Name field.
  7. Select a size for the key.
  8. Select Mark keys as exportable.
  9. Submit the request.

Steps for the Certificate Revocation List

This list is used by the AAA Server to when authenticating a user certificate.

  1. Launch your browser and go to http://<IP Address>/certsrv

    where <IP Address> is the IP address of the computer hosting the CA.

  2. Click Download a CA certificate, certificate chain or CRL.
  3. Select Base64 as the encoding method.
  4. Click Download the latest base CRL.
  5. Save the file to a location of your choice.
Note: For the server certificate, you must set the Enhanced Key usage field as Server Authentication.

Configure the AAA Server for EAP

Prerequisites: The server certificate has been retrieved (see Retrieve the Certificates from a Microsoft Certificate Authority).
  1. From the Windows Start menu, point to Program Files, ActivID, AAA, and then click Server Configurator and enter the AAA Server Administrator credentials.

    The AAA Server Configurator opens.

  2. Click Options, and then select EAP Settings.

     

Note: Any certificate authority can generate the AAA Server certificate. However, to generate the required *.pem, *.pfx or *.p12 files, you must select the Mark keys as exportable option during the certificate generation process. For more information, see your certificate authority documentation.
  1. In the Server Certificate File field, enter the name (including location) of the AAA Server certificate (*.pem, *.pfx or *.p12), or browse to the certificate file.

    The following table lists the options for the type of certificate you are using:

    If... Then...
    You are using a .pfx certificate. The Please Enter Certificate Pass Phase dialog box is displayed. Enter the pass phase, and click OK. The passphrase is entered in the Private Key pass phrase field.
    You are using a .pem or .p12 certificate. Manually enter the certificate’s pass phrase in the Private Key pass phrase field.
  2. In the Trusted CAs file field, enter the name (including location) of the trusted certificate authorities file, or browse to the file.

    Configuring the Trusted CAs File is mandatory for EAP TLS (client certificate authentication).

  3. (Optional) To remove the user’s wireless authentication rights at the certificate level, select Perform a CRL checking, and click Append New CRL to locate the list of revoked certificates.

    You can append a Certificate Revocation List (CRL) by updating it manually from the certificate authority.

  4. In the EAP Settings dialog, click Apply.
  5. Log on as administrator to the AAA Server Administration Console.
  6. (Optional.) Create a new RADIUS server for the wireless access solution (see Managing the ActivID AAA Server for further information).

     

  7. You must enable the strip domain name options as follows:
    • For EAP-TLS, select Strip IP Domain Name....
    • For PEAP-MSCHAP V2, select Strip NT Domain Name....

Note: EAP Authentication is available only for RADIUS gates.
  1. Create a new RADIUS gate for the wireless authentication attempts (refer to the Managing the ActivID AAA Server for further information).
  2. Select EAP Methods for your wireless gate.

    The supported methods display.

     

  3. Select which EAP Authentication Methods to allow and, using Up and Down, define their order on the gate.

    The AAA Server starts authentication negotiations using the EAP methods in the order specified.

    The selection and order can be modified later, if required.

    For EAP-TLS and PEAP-MSCHAP V2, you must enable the strip domain name options in the RADIUS server configuration. Refer to step 9 above.

  4. Click OK to apply the settings.
  5. Export the data to the AAA Server.

Configure the Access Point

For illustration purposes, this section uses the Cisco Aironet 1100 as the wireless access point and Microsoft Windows XP on the workstation. Please refer to the documentation provided with your access point for the corresponding steps.

Prerequisites: You must have the configuration details of the AAA Authentication Server assigned to handle the wireless authentication attempts.
  1. Open the access point’s configuration window.
  2. Select Security and then SSID Manager.

     

  3. Select the SSID from the Current SSID List.
  4. Under Authentication Methods Accepted, select Open Authentication and with EAP from the corresponding drop-down list.
  5. Select Network EAP (without additional options).
  6. Under Security, select Server Manager.

     

  7. Select < NEW > to create a new RADIUS server.
  8. Enter the hostname or IP address of the machine hosting the AAA Authentication Server assigned to handle the wireless authentication attempts in the Server field.
  9. Enter the Shared Secret for the authentication server.
  10. Enter the Authentication Port for the authentication server.
  11. Enter the Accounting Port for the authentication server.
  12. Select EAP Authentication in the Use Server for: section.
  13. Click Apply.

    The configured authentication server is displayed in the Current Server List.

    Steps 10 to 13 are required for encrypting the traffic on the wireless network (between the client and the access point).
    It is recommended that these steps are performed to secure the connection.

  14. Under Security, select Encryption Manager.

    The Encryption Manager configuration window opens:

     

  15. Select WEP Encryption for the mode.
  16. Select Mandatory from the WEP drop-down list and click Apply.
  17. Under Security, select Advanced Security and then the EAP Authentication tab.

     

  18. Select Enable Reauthentication with Interval and set the value to a reasonable interval (in seconds).
  19. Set EAP Client Timeout to 30 seconds which is sufficient for a PKI-based authentication.
  20. Click Apply and restart the wireless access point.