First a little information on our setup. When I first started working here, the 
wireless network had been in place for a year already and was rather small, 
only 3 access points and ~90 laptops. My boss set it up as static WEP (I don't 
know why WEP instead of WPA) and used the AP's (Cisco 1121 series) authorized 
MAC list to restrict access to our laptops. When I came on board, we just 
received about 250 new laptops from the grant and the AP's couldn't fit all of 
the MAC addresses in the space allocated in the flash as simulated NVRAM. For a 
quick fix, I changed how much NVRAM was simulated in order for the AP's to hold 
the info when rebooted. Of course, maintaining the MAC list on all of these 
AP's (we got an additional 8 or 9 AP's at that time) was a nightmare, plus the 
AP's seemed a bit sluggish with authenticating laptops. I convinced my boss to 
let me configure a FreeRADIUS server to do the authentication, removing all of 
the MAC addresses from the AP's and resetting the !
 NVRAM to its default size. We now have about 15 AP's and ~400 laptops. Some 
AP's are overloaded while others have no load at all, though this has little to 
do with FR other than the fact the AP's lose packets to FR from time to time, 
through no fault of FR at all.

This summer, due to budget cuts, we won't be getting in much new equipment 
which frees me up to do some long needed adjustments to the wireless network. I 
am going to be converting from WEP to WPA finally. I don't want to use WPA-PSK 
so I am looking at doing EAP-TLS. I have a test server up that I've gotten to 
work with EAP-TLS using the snake-oil certificates. On the AP's, there is the 
option of doing EAP and MAC authentication. This leads to my question.

Does doing MAC authentication really accomplish anything when using EAP-TLS? 
The certificates can't be copied from the laptop they are installed onto as far 
as I know. They're running XP SP3 and when installing the certificates, the 
option to export them will not be checked. This should mean that if it has a 
valid certificate, it is one of our laptops and not someone who somehow stole a 
cert and installed it on their laptop.

I'm not doing any dynamic VLAN assignments over the wireless so I really don't 
see any need for MAC authentication and just see it as unneeded overhead. Is 
there any reason why I'm wrong with this assumption?

The only thing I can see enabling MAC authentication for is if we switch at 
some point to EAP-TTLS or EAP-PEAP to verify that the user is logging in with 
one of our laptops and not one they brought in from home/cell phone/etc. Or if 
I can convince my boss to authenticate all the wired connections so that no one 
brings in a laptop from home and plugs it into the network. (We've had at least 
some substitute teachers do this apparently, not sure if any full-time staff 
has done this.) While I might end up creating temporary users for when we have 
presenters and use EAP-[TTLS|PEAP] for them, I'd have to not do MAC 
authentication for them as finding out the MAC address in advance seems rather 
unlikely to happen. 

Sorry for being so long winded, but I wanted to make sure I got everything 
relevant about our setup and what I'm trying to do across.

And as I finish my proof-reading, I realize that regardless of if I do MAC 
authentication or not, it seems rather pointless to enable the option on the AP 
as the MAC address would be sent regardless of if I set it or not. (Which 
really makes me wonder why they even included it, unless I'm misunderstanding 
something.) I think the proper solution would be to do a check in FR to ensure 
when the user requests access, that the requesting MAC is from one of our 
machines. Regardless, could someone let me know if there is any need to do MAC 
authentication when doing EAP-TLS?

-- 
John McDonnell
Penn Cambria School District
[email protected]


-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to