Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this
0 of .
Results for:
No results containing your search query
P. 1
step-by-step guide for setting up radius server and secure your wireless in windows 2003

step-by-step guide for setting up radius server and secure your wireless in windows 2003

Ratings: (0)|Views: 150|Likes:
Published by psukhija

More info:

Published by: psukhija on Feb 22, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





Step-by-Step Guide for Setting Up SecureWireless Access in a Test Lab
Microsoft CorporationPublished: April, 2005Author: Microsoft Corporation
This guide describes how to configure secure wireless access using IEEE 802.1Xauthentication using Protected Extensible Authentication Protocol with MicrosoftChallenge-Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) andExtensible Authentication Protocol-Transport Layer Security (EAP-TLS) in a test lab usinga wireless access point (AP) and four computers. Of the four computers, one is awireless client; one is a domain controller that is also a certification authority (CA),Dynamic Host Configuration Protocol (DHCP) server, and Domain Name System (DNS)server; one is a Web and file server; and one is an Internet Authentication Service (IAS)server that is acting as a Remote Authentication Dial-In User Service (RADIUS) server.
Information in this document, including URL and other Internet Web site references, issubject to change without notice. Unless otherwise noted, the example companies,organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company,organization, product, domain name, e-mail address, logo, person, place, or event isintended or should be inferred. Complying with all applicable copyright laws is theresponsibility of the user. Without limiting the rights under copyright, no part of thisdocument may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying,recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly  provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.© 2005 Microsoft Corporation. All rights reserved.Microsoft, Active Directory, MS-DOS, Windows, Windows NT, and Windows Server areeither registered trademarks or trademarks of Microsoft Corporation in the United Statesand/or other countries. All other trademarks are property of their respective owners.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->