06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Windows <strong>User</strong> Database<br />

12-14<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 12 <strong>User</strong> Databases<br />

2. Ensure that the certification authority (CA) certificate of the CA that issued the ACS server<br />

certificate is stored in machine storage on client computers. <strong>User</strong> storage is not available during<br />

machine authentication; there<strong>for</strong>e, if the CA certificate is in user storage, machine authentication<br />

fails.<br />

3. Select the wireless network:<br />

– In Windows XP, you can choose Windows Network Connection > Properties > Network<br />

Connection Properties.<br />

– In Windows 2000, you can manually enter the Service Set Identifier (SSID) of the wireless<br />

network. Use the Advanced tab of the properties dialog box <strong>for</strong> the wireless network adapter.<br />

4. To enable PEAP machine authentication, configure the Authentication tab. In Windows XP, the<br />

Authentication tab is available from the properties of the wireless network. In Windows 2000, it is<br />

available from the properties of the wireless network connection. To configure the Authentication<br />

tab:<br />

a. Check the Enable network access control using IEEE 802.1X check box.<br />

b. Check the Authenticate as computer when computer in<strong>for</strong>mation is available check box.<br />

c. From the EAP type list, select Protected EAP (PEAP).<br />

d. On the Protected EAP Properties dialog box, you can en<strong>for</strong>ce that ACS has a valid server<br />

certificate by checking the Validate server certificate check box. If you do check this check<br />

box, you must also select the applicable Trusted Root Certification Authorities.<br />

e. Also open the PEAP properties dialog box, from the Select Authentication Method list, select<br />

<strong>Secure</strong>d password (EAP-MS-CHAP v2).<br />

5. To enable EAP-TLS machine authentication, configure the Authentication tab. In Windows XP, the<br />

Authentication tab is available from the properties of the wireless network. In Windows 2000, it is<br />

available from the properties of the wireless network connection.<br />

a. Check the Enable network access control using IEEE 802.1X check box.<br />

b. Check the Authenticate as computer when computer in<strong>for</strong>mation is available check box.<br />

c. From the EAP type list, select Smart Card or other Certificate.<br />

d. On the Smart Card or other Certificate Properties dialog box, select the Use a certificate on<br />

this computer option.<br />

e. Also on the Smart Card or other Certificate Properties dialog box, you can en<strong>for</strong>ce that ACS<br />

has a valid server certificate by checking the Validate server certificate check box. If you<br />

check this check box, you must also select the applicable Trusted Root Certification Authorities.<br />

If you have a Microsoft certification authority server that is configured on the domain controller, you<br />

can configure a policy in Active Directory to produce a client certificate automatically when a computer<br />

is added to the domain. For more in<strong>for</strong>mation, see the Microsoft Knowledge Base Article 313407, HOW<br />

TO: Create Automatic Certificate Requests with Group Policy in Windows.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!