16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

572 Chapter 21<br />

Figure 21.77 : Adding wireless NAS-port-type conditions<br />

7. Click the radio button to Grant remote access permission if user matches<br />

conditions in the subsequent Permissions page for the new policy. The next step<br />

is to configure the Profi le to support EAP-TLS and force the strongest level of<br />

encryption (128 bit).<br />

8. Click Edit Profi le and click the Authentication tab.<br />

9. Confirm that the checkbox for Extensible Authentication Protocol is selected<br />

and that Smart Card or Other Certifi cate is listed as the EAP type in the dropdown<br />

box. Clear all the other check boxes and click Confi gure .<br />

10. Select the computer certificate you installed for use by the IAS server, and click<br />

OK . The resulting Authentication tab should look like the one in Figure 21.78 .<br />

11. Force the strongest level of encryption by clicking the Encryption tab and then<br />

clearing all the checkboxes except the one for Strongest .<br />

12. Save the policy by clicking OK and then Finish . Make sure that the policy you<br />

created is higher in the list than the default Remote Access Policy. You can<br />

delete the default policy if you like.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!