Also consider ClearPass QuickConnect from Aruba Networks.

**
Tim Cappalli*, *Network Engineer
LTS | Brandeis University
x67149 | (617) 701-7149
[email protected]


On Tue, Apr 16, 2013 at 2:40 PM, Williams, Mr. Michael <
[email protected]> wrote:

> Thanks Lee.  I am going to take a look at Cloudpath.****
>
> ** **
>
> mike****
>
> ** **
>
> *Michael M. Williams*
>
> Network Systems Analyst****
>
> Information Technology Services****
>
> Tarleton State University****
>
> 201st St. Felix Str.****
>
> Box T-0220****
>
> Stephenville, TX 76402****
>
> Tel: (254) 968-1850****
>
> Fax: (254) 968-9393****
>
> [email protected]****
>
> ** **
>
> *Information Technology Services staff will never ask for your password
> in an email.  Don't ever email your password to anyone or share
> confidential information in emails.*
>
> * *
>
> *Confidentiality Notice:  This electronic message, including any
> attachments, is for the sole use of the intended recipients(s) and may
> contain confidential and privileged information.  Any unauthorized review,
> use, disclosure or distribution is prohibited.  If you are not the intended
> recipient, please contact the sender by reply e-mail and destroy all copies
> of the original message.*
>
> ** **
>
> *From:* The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:
> [email protected]] *On Behalf Of *Lee H Badman
> *Sent:* Tuesday, April 16, 2013 8:38 AM
> *To:* [email protected]
> *Subject:* Re: [WIRELESS-LAN] Verifying or Validating Server Certificate
> when using WPA/WPA2 and 8021x WLAN****
>
> ** **
>
> We found Cloudpath ExpressConnect to be wonderful at setting things like
> approved certs for the client- if you can get them to use it.
>
> We have a great mechanism with a "Help" SSID that allows for initial
> self-config, then self-remediation if you ever find your client not
> behaving. Works so sweet... except that new OS X and Win 7 machines also
> want to self-configure and onboard clients with just credentials needed
> (like for MS-CHAP v2/PEAP) and so our help tool gets unused.
>
> Expressconnect also lets you do things like disable IPv6, clear out
> "extra" profiles that accumulate, and other nice tweaks along with elegent
> cert handling.****
>
> ** **
>
> *Lee H. Badman*
> Network Architect/Wireless TME
> ITS, Syracuse University
> 315.443.3003****
> ------------------------------
>
> *From:* The EDUCAUSE Wireless Issues Constituent Group Listserv [
> [email protected]] on behalf of Tim Cappalli [
> [email protected]]
> *Sent:* Tuesday, April 16, 2013 9:12 AM
> *To:* [email protected]
> *Subject:* Re: [WIRELESS-LAN] Verifying or Validating Server Certificate
> when using WPA/WPA2 and 8021x WLAN****
>
> This is definitely normal behavior. The only way to get around this would
> be to configure the client to not verify the server certificate which is a
> security risk and is not best practice.****
>
>  ****
>
> The idea is that if someone threw up a rogue AP with the same SSID and
> your users associated to it, they would receive a different certificate
> prompt which should throw a red flag (unforuntely it doesn't to college
> kids, they just click yes).****
>
>  ****
>
> tim****
>
>
> ****
>
>  ****
>
> Tim Cappalli*, *Network Engineer
> LTS | Brandeis University
> x67149 | (617) 701-7149
> [email protected]****
>
> ** **
>
> On Mon, Apr 15, 2013 at 11:34 AM, Williams, Mr. Michael <
> [email protected]> wrote:****
>
> Our wireless network consists of a two Cisco wireless controller, 240 APs
> and we use Cisco ACS 5.2 as our RADIUS server.   One of our wireless
> networks is configured to use WPA/WPA2 with 802.1x and PEAP w/ MSCHAP v2.
> After updating the server certificate on the ACS, our wireless users were
> asked to verify or validate the server certificate before gaining access to
> the wireless network.  This requirement generates numerous helpdesk tickets
> and many more questions as to why the users must do this, when they don’t
> have to do it on any other wireless network.    I have asked Cisco for
> assistance but they informed me that what we are seeing is the normal
> behavior for the wireless supplicants and that the user must manually
> verify the authentication server certificate when a wireless profile is
> created for the first time or after the server certificate is changed on
> the ACS.****
>
>  ****
>
> I know we are not the only one seeing this requirements, numerous other
> University have publish wireless tutorials asking their user to verify the
> certificate as part of the initial setup of the wireless profile.  I know
> we can eliminate this requirement in Windows machines by just unchecking
> the validate certificate option, but this is not an option on iOS
> machines.  We use the 3rd party certificate by Incommon and have install
> both intermediate and root certificate on the ACS.****
>
>  ****
>
> Has anyone found a solution to this problem?  Or is this just the default
> behavior of the supplicant that we are seeing?****
>
>  ****
>
> Thank you for your assistance.****
>
>  ****
>
> mike****
>
>  ****
>
> *Michael M. Williams*****
>
> Network Systems Analyst****
>
> Information Technology Services****
>
> Tarleton State University****
>
> 201st St. Felix Str.****
>
> Box T-0220****
>
> Stephenville, TX 76402****
>
>  ****
>
> *Information Technology Services staff will never ask for your password
> in an email.  Don't ever email your password to anyone or share
> confidential information in emails.*****
>
> * *****
>
> *Confidentiality Notice:  This electronic message, including any
> attachments, is for the sole use of the intended recipients(s) and may
> contain confidential and privileged information.  Any unauthorized review,
> use, disclosure or distribution is prohibited.  If you are not the intended
> recipient, please contact the sender by reply e-mail and destroy all copies
> of the original message.*****
>
>  ****
>
> ********** Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found at
> http://www.educause.edu/groups/. ****
>
> ** **
>
> ********** Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found at
> http://www.educause.edu/groups/. ****
>
> ********** Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found at
> http://www.educause.edu/groups/. ****
> ********** Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found at
> http://www.educause.edu/groups/.
>
>

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to