Authentication + Encryption w/ little or no client configuration?

Unanswered Question
Aug 17th, 2007
User Badges:
  • Green, 3000 points or more

I am wondering what the best solution would be for someone who wanted Authentication and Encryption and did not want to customize all of their user's wireless profiles. Here are the problems as I see it...

1. 802.1x - Authentication + Encryption but requires client configuration.

2. Web Authentication - Authentication and no Encryption but requires no client configuration.

3. Static WEP + Web Authentication - Authentication and Encryption but requires client configuration.

Am I missing something, is there a better/easier way to go about this? Is there an easy way to rollout a configuration profile?

I have a 2100 WLC. Thanks guys.

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
rtjensen4 Thu, 08/23/2007 - 13:10
User Badges:
  • Bronze, 100 points or more

We do it via Radius

Client gets a certificate from Domain Controller and authenticates via Radius server / EAP.

acomiskey Wed, 08/29/2007 - 11:34
User Badges:
  • Green, 3000 points or more

bump, anybody else?

Any more info on the certificate method?

acomiskey Thu, 08/30/2007 - 07:03
User Badges:
  • Green, 3000 points or more

Any comments at all???

ktechadmin Fri, 08/31/2007 - 05:14
User Badges:

You can either use certificates or push the wireless settings that are required for connection through group policy if you have a MS Windows domain. Those are the only two methods of zero-configuration for your clients that I know of.

Hope this helps.

wfm_Cisco Tue, 09/04/2007 - 19:09
User Badges:

All three should be part of the "VPN Client".

Configurations are usually stored on a tftp server in telecom although any LDAP group policy should do...

Radius is nice but without a better framework for addl parameters its tough to program against.

You might also give some third party apps a try, although this is ~ a quick solution!

- Bill


This Discussion



Trending Topics: Other Wireless Mobility

client could not be authenticated
Network Analysis Module (NAM) Products
Cisco 6500 nam
reason 440 driver failure
Cisco password cracker
Cisco Wireless mode