Deploying Protected Wireless Access
To deploy a protected wireless network using Windows Vista and Windows Server 2008, follow these steps:
- Deploy certificates.
- Configure Active Directory for user accounts and groups.
- Configure NPS servers.
- Deploy wireless APs.
- Configure wireless clients.
Deploying Certificates
Each wireless client in the following authentication configurations needs a computer certificate:
- Computer authentication with EAP-TLS or PEAP-TLS and computer certificates: Each wireless client computer needs a computer certificate.
- User authentication with EAP-TLS or PEAP-TLS and either smart cards or registry-based user certificates: Each wireless user needs a smart card or each wireless client computer needs a user certificate.
- User or computer authentication with PEAP-MS-CHAP v2: Each wireless client needs the root CA of the issuing CA of the NPS server's computer certificate.
Deploying Computer Certificates
To install computer certificates for EAP-TLS or PEAP-TLS authentication, a PKI must be present to issue certificates. Once the PKI is in place, you can install a computer certificate on wireless clients and NPS servers in the following ways:
- By configuring autoenrollment of computer certificates to computers in an Active Directory domain (recommended)
- By using the Certificates snap-in to request a computer certificate
- By using the Certificates snap-in to import a computer certificate
- By executing a CAPICOM script that requests a computer certificate
Deploying User Certificates
You can install a user certificate on wireless clients in the following ways:
- By configuring autoenrollment of user certificates to users in an Active Directory domain (recommended)
- By using the Certificates snap-in to request a user certificate
- By using the Certificates snap-in to import a user certificate
- By requesting a certificate over the Web
- By executing a CAPICOM script that requests a user certificate
Deploying Root CA Certificates
If you use PEAP-MS-CHAP v2 authentication, you might need to install the root CA certificates of the computer certificates that are installed on your NPS servers on your wireless clients. If the root CA certificate of the issuer of the computer certificates that are installed on the NPS servers is already installed as a root CA certificate on your wireless clients, no other configuration is necessary. For example, if your root CA is a Windows Server 2008-based online root enterprise CA, the root CA certificate is automatically installed on each domain member computer through a group policy.
To verify whether the correct root CA certificate is installed on your wireless clients, you need to determine:
- The root CA of the computer certificates installed on the NPS servers.
- Whether a certificate for the root CA is installed on your wireless clients.
- In the console tree of the Certificates snap-in for the NPS server computer account, open Certificates (Local Computer or Computer Name), open Personal, and then click Certificates.
- In the details pane, double-click the computer certificate that is being used by the NPS server for PEAP-MS-CHAP v2 authentication.
- In the Certificate properties dialog box, on the Certification Path tab, note the name at the top of the certification path. This is the name of the root CA.
- In the console tree of the Certificates snap-in for the wireless client computer account, open Certificates (Local Computer or Computer Name), open Trusted Root Certification Authorities, and then click Certificates.
- Examine the list of certificates in the details pane for a name matching the root CA for the computer certificates issued to the RADIUS servers.
You must install the root CA certificates of the issuers of the computer certificates of the NPS servers on each wireless client that does not contain them. The easiest way to install a root CA certificate on all your wireless clients is through Group Policy.
In this tutorial:
- IEEE 802.11 Wireless Networks
- Support for IEEE 802.11 Standards
- Wireless Security
- WPA
- Planning and Design Considerations
- Wireless Authentication Modes
- Intranet Infrastructure
- Wireless AP Placement
- Authentication Infrastructure
- Wireless Clients
- Windows Vista Wireless Policy
- Windows XP Wireless Policy
- Command-Line Configuration
- PKI
- 802.1X Enforcement with NAP
- Deploying Protected Wireless Access
- Configuring Active Directory for Accounts and Groups
- Deploying Wireless APs
- Configuring Wireless Clients
- Configuring and Deploying Wireless Profiles
- Maintenance for a Protected Wireless
- Troubleshooting Wireless Connections
- Network Diagnostics Framework Support for Wireless Connections
- Wireless Diagnostics Tracing
- NPS Event Logging
- Troubleshooting the Windows Wireless Client
- Troubleshooting the Wireless AP
- Common Wireless AP Problems
- Troubleshooting the Authentication Infrastructure
- Troubleshooting Certificate-Based Validation
- Troubleshooting Password-Based Validation