Danh mục

Step Secure Wireless Acc

Số trang: 62      Loại file: doc      Dung lượng: 1.38 MB      Lượt xem: 7      Lượt tải: 0    
Thư viện của tui

Hỗ trợ phí lưu trữ khi tải xuống: 35,000 VND Tải xuống file đầy đủ (62 trang) 0
Xem trước 7 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

This guide describes how to configure secure wireless access using IEEE 802.1Xauthentication using Protected Extensible Authentication Protocol with MicrosoftChallenge-Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) andExtensible Authentication Protocol-Transport Layer Security (EAP-TLS) in a test lab usinga wireless access point (AP) and four computers.
Nội dung trích xuất từ tài liệu:
Step Secure Wireless AccStep-by-Step Guide for Setting Up Secure Wireless Access in a Test LabMicrosoft CorporationPublished: April, 2005Author: Microsoft CorporationAbstractThis guide describes how to configure secure wireless access using IEEE 802.1Xauthentication using Protected Extensible Authentication Protocol with MicrosoftChallenge-Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) andExtensible Authentication Protocol-Transport Layer Security (EAP-TLS) in a test lab usinga wireless access point (AP) and four computers. Of the four computers, one is awireless client; one is a domain controller that is also a certification authority (CA),Dynamic Host Configuration Protocol (DHCP) server, and Domain Name System (DNS)server; one is a Web and file server; and one is an Internet Authentication Service (IAS)server that is acting as a Remote Authentication Dial-In User Service (RADIUS) server.Information in this document, including URL and other Internet Web site references, issubject to change without notice. Unless otherwise noted, the example companies,organizations, products, domain names, e-mail addresses, logos, people, places, andevents depicted herein are fictitious, and no association with any real company,organization, product, domain name, e-mail address, logo, person, place, or event isintended or should be inferred. Complying with all applicable copyright laws is theresponsibility of the user. Without limiting the rights under copyright, no part of thisdocument may be reproduced, stored in or introduced into a retrieval system, ortransmitted in any form or by any means (electronic, mechanical, photocopying,recording, or otherwise), or for any purpose, without the express written permission ofMicrosoft Corporation.Microsoft may have patents, patent applications, trademarks, copyrights, or otherintellectual property rights covering subject matter in this document. Except as expresslyprovided in any written license agreement from Microsoft, the furnishing of this documentdoes not give you any license to these patents, trademarks, copyrights, or otherintellectual property.© 2005 Microsoft Corporation. All rights reserved.Microsoft, Active Directory, MS-DOS, Windows, Windows NT, and Windows Server areeither registered trademarks or trademarks of Microsoft Corporation in the United Statesand/or other countries.All other trademarks are property of their respective owners.ContentsStep-by-Step Guide for Setting Up Secure Wireless Access in a Test Lab........................1 Abstract.......................................................................................................................1Contents.............................................................................................................................4Step-by-Step Guide for Setting Up Secure Wireless Access in a Test Lab........................5 PEAP-MS-CHAP v2 Authentication................................................................................5 Before You Begin.....................................................................................................6 DC1.............................................................................................................................7 IAS1...........................................................................................................................28 IIS1............................................................................................................................38 Wireless AP...............................................................................................................39 CLIENT1....................................................................................................................40 EAP-TLS Authentication...............................................................................................45 DC1...........................................................................................................................45 IAS1...........................................................................................................................53 CLIENT1....................................................................................................................58 Summary......................................................................................................................61 See Also........................................................................................................................61 5Step-by-Step Guide for Setting Up Secure Wireless Access in a Test LabThis guide provides detailed information about how you can use four computers and awireless access point (AP) to create a test lab with which to co ...

Tài liệu được xem nhiều: