802.1X Authentication Configuration Supplement
This Help topic provides supplemental instructions for users who are configuring their network for 802.1X authentication. It is recommended that you begin by following the instructions in the Policy Manager Authentication Configuration Guide. Then, read this configuration supplement for specific information related to configuring 802.1X end users. For more detailed information regarding client setup, consult the documentation for your particular client(s).
Instructions on:
EAP MD5-Challenge End User (Supplicant) Setup
Windows XP and Windows 2000 End User (Supplicant) Setup
Use the following instructions to set up a Windows XP or Windows 2000 end user for 802.1X authentication:
- On the end user's machine, open Network Connections (Start menu > Settings > Network Connections).
- Right click on the connection and select Properties.
- In the General tab, verify that the Show icon in notification area when connected option is selected.
- In the Authentication tab, select the Enable network access control using IEEE
802.1X check box. Then, select MD5-Challenge as EAP type.
NOTE: Depending on your network's needs, you can select "Authenticate as computer when computer information is available" and/or "Authenticate as guest when user or computer information is unavailable".
The authentication process is as follows:
- Press Ctrl-Alt-Delete and log on to the end user's machine.
- Allow a couple of minutes (or less) to initialize and establish the EAP authentication between the local machine and the 802.1X-enabled device.
- After establishing the EAP authentication, notice that a bubble (balloon) appears in the notification area.
- Click on the bubble to open the network logon window.
- Provide the end user's username and password, and the domain, if appropriate.
NOTES: If a user logs in incorrectly twice, the Windows XP client will not let them retry the login again. To be able to retry the login, the user can toggle link on the port, or log out and log back in.
After launching the network logon window by clicking the bubble, the user might get another bubble in the notification area before logging in. In this case, the user must close the logon window opened previously and click the second bubble which appeared in the notification area to re-launch the network logon window.
How to Speed up MD5 Prompt on XP Client
By default, the MD5 prompt can take up to two minutes to appear after you log into the machine or plug into an 802.1X enabled device. It is possible to speed up this process by making the following changes to the XP client and the 802.1X-enabled device.
Modify the XP client's Registry:
- Run regedit.exe from the Run box.
- Navigate to HEY_LocalMachine\Software\Microsoft\EAPOL\Parameters\General\Global.
- Right click on Global and select New and the DWORD value.
- Name it SupplicantMode.
- After it is created, double-click it and set its value to a 3.
- You must reboot the PC before the new registry value takes effect.
On the 802.1X-enabled device, use Policy Manager to change the Authentication Request Period on the supplicant port to a shorter interval:
- Launch Policy Manager.
- In the left panel, select the Network Elements tab.
- Open the Devices folder and select the 802.1X-enabled device on which the port is located.
- Select the port in the left panel.
- In the right panel, select the Authentication Configuration tab.
- In the Login Settings area, set the Authentication Request Period to a short interval, for example, 5 seconds.
- Click Apply.
Linux SecureSupplicant Setup
You can download the OpenSource 802.1X client from http://www.open1x.org at no cost, or you can purchase the Meetinghouse 802.1X supplicant called AEGIS Client from http://www.mtghouse.com. Refer to the instructions included in the download to install and set up your Linux SecureSupplicant.
EAP-TLS Certificate Setup
Windows 2000 AS Certificate Server Configuration
Use the following instructions to set up Windows 2000 Advanced Server (AS) for Certificate Authentication (CA). These instructions are only an example; refer to Microsoft documentation to install on a production network.
- Install Windows 2000 Advanced Server with Active Directory, DNS service, and IAS.
- If you did not
install Internet Information Services (IIS) with the Windows 2000 AS installation, do so now.
- Select the Start menu > Settings > Control Panel, and click on Add/Remove Programs.
- On the left panel, select Add/Remove Windows Components.
- When the Windows Components window opens, select Internet Information Services (IIS), and Next. This will install the IIS service. You can now install the Certificate Services.
- Launch the Windows Components Wizard by opening Add/Remove Programs in Control Panel and clicking on Add/Remove Windows Components.
- When the Wizard opens, select Certificate Services from the component list. The installer will warn you that once the CA software is installed, you can't change the name of the server or move it out of an Active Directory Domain.
- The Certification Authority Type Selection screen will appear, giving you a choice of the different CA types. Select Enterprise root CA. Do not select Advanced Options.
- On the CA Identifying Information screen, enter a unique name for the CA Name, then fill out the rest of the form with whatever applies to your setup environment.
- The next screen prompts you for the location of the Data Storage files. Select the defaults.
- If you are running IIS WWW service, the installer will tell you that it must stop the service to complete the installation.
- When the wizard finishes, you'll be prompted to restart your server. After rebooting, the CA service will start automatically.
Windows XP Client Certificate Setup
Install a certificate on a Windows XP client:
- Connect the client PC to the Domain on which the CA resides.
- Open your browser and go to http://<CA server>/certsrv. This brings up the Certificate Services page for the CA server.
- Select Request a Certificate.
- Select User Certificate.
- Select Submit. This prompts the client to request a certificate from the CA.
- When the "Certificate Issued" response is presented, select "Install this Certificate". This results in "Certificate Installed".
View the installed certificate on the client:
- Select the Start menu > Run.
- Type mmc.
- When the Console starts, select File > Add/Remove Snap-in.
- From the Standalone tab, select Add.
- Select Certificates, then Add.
- The Certificates Snap-in window prompts for what type of account the certificate will manage.
- Select My user account, then Finish.
- Close the Add Standalone Snap-in window.
- On the Add/Remove Snap-in window, click OK .
- In the Console, expand Certificates, expand Personal, and select Certificates.
- You will see your certificate(s) in the right pane .
- Double-click on the certificate to view the certificate properties.
- Upon initial authentication (within a few minutes of attempting), the client will be prompted to accept certificate as valid from server.
802.11 Wireless Setup
RoamAbout R2 802.1X Configuration
Use the following instructions to set up and configure 802.1X authentication for the RoamAbout R2.
RoamAbout R2 firmware and boot images should be upgraded to the latest versions, which are available at https://extranet.extremenetworks.com/downloads/Pages/RoamAbout4102.aspx.
System requirements:
- RoamAbout R2 with RoamAbout card
- PC with Windows XP or Windows 2000 installed
- A null modem cable to connect the console port on the PC to the console port of the RoamAbout R2. (See http://www.lammertbies.nl/comm/cable/RS-232.html#null.)
- AP Manager installed on the PC
- A RADIUS Server with 802.1X support (Steel-Belted RADIUS Administrator Service Provider Edition) or Windows 2000 IAS
Configure the RoamAbout R2:
- Connect a null modem cable from the PC to the RoamAbout R2.
- Using a terminal emulator like Microsoft® HyperTerminal, log in to the RoamAbout R2.
- Select Network Configuration, assign an IP mask and gateway, and save the configuration.
- On the PC, launch AP Manager.
- In AP Manager, select the Add button to add a new AP.
- Upgrade the RoamAbout boot image to the latest version. To download the boot image:
- In the AP Manager Main menu select Reload. The Reload window opens.
- In the Options area, select the Use This Computer option.
- In the Firmware Image area, select the Operational BootROM option.
- Enter the path to the boot image or use the Browse button to navigate to the boot image.
- Click Reload Now.
- Upgrade the RoamAbout firmware image to the latest version. To download the firmware image:
- In the Main menu select Reload.
- In the Options area, select the Use This Computer option.
- In the Firmware Image area, select the Operational Firmware option.
- Enter the path to the firmware image or use the Browse button to navigate to the firmware image.
- Click Reload Now.
- When the images have finished downloading, at the prompt, reboot the RoamAbout R2 device.
- In the AP Manager Main menu, select Wireless Parameters.
- In the Wireless Parameters window, enter the Wireless Network Name.
- Use Policy Manager to configure the RoamAbout R2 as a RADIUS client, following the instructions in the Authentication Configuration Guide.
- On the RoamAbout R2, you must enable 802.1X on each port by setting the
port's Authentication Behavior to Active.
- In Policy Manager, select the Network Elements tab in the left panel.
- Expand the RoamAbout R2 device to see its ports.
- Select a port in the left panel.
- In the right panel, select the Authentication Configuration tab.
- In the Port Mode area, set the port's Authentication Behavior to Active.
- Click Apply.
Set up the Windows XP Client:
Requirements:
- A PC that meets windows XP requirements.
- A wireless interface card on the XP PC.
- Select Start menu > Settings > Network Connections and then right-click on wireless adapter icon.
- From the drop-down menu select Properties.
- Select the Authentication tab, and check Enable network access control using the IEEE 802.1X.
- Set EAP type to MD5 Challenge.
Set up the Funk RADIUS Server:
Requirements:
- RADIUS Server with 802.1X support (Steel-Belted RADIUS Administrator Service Provider Edition)
- Install application.
- Go to the eap.ini file in in the RADIUS Services folder, and uncomment the EAP-Type = MD5-Challenge for the native, domain, and domain user groups.
- Go to the RADIUS.ini file and set the LogLevel = 2 and the TraceLevel = 2. This sets logfile verbose level.
- Start RADIUS Server Service.
For information on related concepts:
For information on related tasks: