Step Secure Wireless Acc
Số trang: 62
Loại file: doc
Dung lượng: 1.38 MB
Lượt xem: 7
Lượt tải: 0
Xem trước 7 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
This guide describes how to configure secure wireless access using IEEE 802.1Xauthentication using Protected Extensible Authentication Protocol with MicrosoftChallenge-Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) andExtensible Authentication Protocol-Transport Layer Security (EAP-TLS) in a test lab usinga wireless access point (AP) and four computers.
Nội dung trích xuất từ tài liệu:
Step Secure Wireless AccStep-by-Step Guide for Setting Up Secure Wireless Access in a Test LabMicrosoft CorporationPublished: April, 2005Author: Microsoft CorporationAbstractThis guide describes how to configure secure wireless access using IEEE 802.1Xauthentication using Protected Extensible Authentication Protocol with MicrosoftChallenge-Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) andExtensible Authentication Protocol-Transport Layer Security (EAP-TLS) in a test lab usinga wireless access point (AP) and four computers. Of the four computers, one is awireless client; one is a domain controller that is also a certification authority (CA),Dynamic Host Configuration Protocol (DHCP) server, and Domain Name System (DNS)server; one is a Web and file server; and one is an Internet Authentication Service (IAS)server that is acting as a Remote Authentication Dial-In User Service (RADIUS) server.Information in this document, including URL and other Internet Web site references, issubject to change without notice. Unless otherwise noted, the example companies,organizations, products, domain names, e-mail addresses, logos, people, places, andevents depicted herein are fictitious, and no association with any real company,organization, product, domain name, e-mail address, logo, person, place, or event isintended or should be inferred. Complying with all applicable copyright laws is theresponsibility of the user. Without limiting the rights under copyright, no part of thisdocument may be reproduced, stored in or introduced into a retrieval system, ortransmitted in any form or by any means (electronic, mechanical, photocopying,recording, or otherwise), or for any purpose, without the express written permission ofMicrosoft Corporation.Microsoft may have patents, patent applications, trademarks, copyrights, or otherintellectual property rights covering subject matter in this document. Except as expresslyprovided in any written license agreement from Microsoft, the furnishing of this documentdoes not give you any license to these patents, trademarks, copyrights, or otherintellectual property.© 2005 Microsoft Corporation. All rights reserved.Microsoft, Active Directory, MS-DOS, Windows, Windows NT, and Windows Server areeither registered trademarks or trademarks of Microsoft Corporation in the United Statesand/or other countries.All other trademarks are property of their respective owners.ContentsStep-by-Step Guide for Setting Up Secure Wireless Access in a Test Lab........................1 Abstract.......................................................................................................................1Contents.............................................................................................................................4Step-by-Step Guide for Setting Up Secure Wireless Access in a Test Lab........................5 PEAP-MS-CHAP v2 Authentication................................................................................5 Before You Begin.....................................................................................................6 DC1.............................................................................................................................7 IAS1...........................................................................................................................28 IIS1............................................................................................................................38 Wireless AP...............................................................................................................39 CLIENT1....................................................................................................................40 EAP-TLS Authentication...............................................................................................45 DC1...........................................................................................................................45 IAS1...........................................................................................................................53 CLIENT1....................................................................................................................58 Summary......................................................................................................................61 See Also........................................................................................................................61 5Step-by-Step Guide for Setting Up Secure Wireless Access in a Test LabThis guide provides detailed information about how you can use four computers and awireless access point (AP) to create a test lab with which to co ...
Nội dung trích xuất từ tài liệu:
Step Secure Wireless AccStep-by-Step Guide for Setting Up Secure Wireless Access in a Test LabMicrosoft CorporationPublished: April, 2005Author: Microsoft CorporationAbstractThis guide describes how to configure secure wireless access using IEEE 802.1Xauthentication using Protected Extensible Authentication Protocol with MicrosoftChallenge-Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) andExtensible Authentication Protocol-Transport Layer Security (EAP-TLS) in a test lab usinga wireless access point (AP) and four computers. Of the four computers, one is awireless client; one is a domain controller that is also a certification authority (CA),Dynamic Host Configuration Protocol (DHCP) server, and Domain Name System (DNS)server; one is a Web and file server; and one is an Internet Authentication Service (IAS)server that is acting as a Remote Authentication Dial-In User Service (RADIUS) server.Information in this document, including URL and other Internet Web site references, issubject to change without notice. Unless otherwise noted, the example companies,organizations, products, domain names, e-mail addresses, logos, people, places, andevents depicted herein are fictitious, and no association with any real company,organization, product, domain name, e-mail address, logo, person, place, or event isintended or should be inferred. Complying with all applicable copyright laws is theresponsibility of the user. Without limiting the rights under copyright, no part of thisdocument may be reproduced, stored in or introduced into a retrieval system, ortransmitted in any form or by any means (electronic, mechanical, photocopying,recording, or otherwise), or for any purpose, without the express written permission ofMicrosoft Corporation.Microsoft may have patents, patent applications, trademarks, copyrights, or otherintellectual property rights covering subject matter in this document. Except as expresslyprovided in any written license agreement from Microsoft, the furnishing of this documentdoes not give you any license to these patents, trademarks, copyrights, or otherintellectual property.© 2005 Microsoft Corporation. All rights reserved.Microsoft, Active Directory, MS-DOS, Windows, Windows NT, and Windows Server areeither registered trademarks or trademarks of Microsoft Corporation in the United Statesand/or other countries.All other trademarks are property of their respective owners.ContentsStep-by-Step Guide for Setting Up Secure Wireless Access in a Test Lab........................1 Abstract.......................................................................................................................1Contents.............................................................................................................................4Step-by-Step Guide for Setting Up Secure Wireless Access in a Test Lab........................5 PEAP-MS-CHAP v2 Authentication................................................................................5 Before You Begin.....................................................................................................6 DC1.............................................................................................................................7 IAS1...........................................................................................................................28 IIS1............................................................................................................................38 Wireless AP...............................................................................................................39 CLIENT1....................................................................................................................40 EAP-TLS Authentication...............................................................................................45 DC1...........................................................................................................................45 IAS1...........................................................................................................................53 CLIENT1....................................................................................................................58 Summary......................................................................................................................61 See Also........................................................................................................................61 5Step-by-Step Guide for Setting Up Secure Wireless Access in a Test LabThis guide provides detailed information about how you can use four computers and awireless access point (AP) to create a test lab with which to co ...
Tìm kiếm theo từ khóa liên quan:
thủ thuật máy tính công nghệ thông tin tin học quản trị mạng computer networkTài liệu liên quan:
-
52 trang 432 1 0
-
24 trang 358 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 319 0 0 -
Làm việc với Read Only Domain Controllers
20 trang 308 0 0 -
74 trang 303 0 0
-
96 trang 297 0 0
-
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 291 0 0 -
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 284 0 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 277 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 269 1 0