<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 5508 and Active Directory Integration using EAP (MS-CH in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688094#M292710</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all and thanks for the replies. After further reasearch I have found that MS-CHAP PEAP v2 with WPA2-AES is what I should do. I have been told this is used by 90% of deployments where Active Directory Authentication is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am in the process of purchasing a Cisco ACS with 5.2 software to add to the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I understand, I will need to configure a CA Authority on a Windows Server and then download that certficate to the ACS. Then I would configure the LDAP connection from the ACS to my Windows AD Server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is anyone around that uses this same scenario in production? In this scenario, do I have to manually install the certificate from the CA on each wireless client?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your replies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 May 2011 16:35:31 GMT</pubDate>
    <dc:creator>kmcdonald1973</dc:creator>
    <dc:date>2011-05-26T16:35:31Z</dc:date>
    <item>
      <title>Cisco 5508 and Active Directory Integration using EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688091#M292702</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have just recently purchased a 5505 Controller and 30 3502i AP's. On my main corporate WLAN, I would like to allow users to be able to authenticate via Active Directory username and password.I am also looking for as little client side set up as possible. From what I have researched, I will need to use some type of EAP method.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have come across two methods that appear to be the top contenders.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EAP-FAST - The method seems to be a possibility but I see that it uses certificates. If I use this method, does it mean that I would have to import the certificates to each machine manually? Also, can I configure thsi to work with just the 5508 Controller and an AD Database server or do I need an intermediary like IAS or ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PEAP/GTC - This method is also a possibility and I think that it does not require certificates. Is this true? Does this also require an intermediary like ACS or IAS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:06:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688091#M292702</guid>
      <dc:creator>kmcdonald1973</dc:creator>
      <dc:date>2019-03-11T01:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5508 and Active Directory Integration using EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688092#M292704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The WLC does have a feature called Local EAP which I believe is possible to back-end to AD via LDAP.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a0080851b42.shtml"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a0080851b42.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know off the top of my head, but I think only certain EAP types work with the LDAP part..... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally speaking though, if you want to use EAP, you get alot more bang out of a real AAA server (ACS/IAS).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 May 2011 21:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688092#M292704</guid>
      <dc:creator>weterry</dc:creator>
      <dc:date>2011-05-25T21:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5508 and Active Directory Integration using EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688093#M292707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For web-auth no need any intermediary, you can connect directly to LDAP.&lt;/P&gt;&lt;P&gt;For EAP-FAST certificates needed on both sides.&lt;/P&gt;&lt;P&gt;For PEAP-GTS, I found that no support for Microsoft AD.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 05:13:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688093#M292707</guid>
      <dc:creator>deshtikypshaq</dc:creator>
      <dc:date>2011-05-26T05:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5508 and Active Directory Integration using EAP (MS-CH</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688094#M292710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all and thanks for the replies. After further reasearch I have found that MS-CHAP PEAP v2 with WPA2-AES is what I should do. I have been told this is used by 90% of deployments where Active Directory Authentication is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am in the process of purchasing a Cisco ACS with 5.2 software to add to the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I understand, I will need to configure a CA Authority on a Windows Server and then download that certficate to the ACS. Then I would configure the LDAP connection from the ACS to my Windows AD Server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is anyone around that uses this same scenario in production? In this scenario, do I have to manually install the certificate from the CA on each wireless client?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your replies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 16:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-5508-and-active-directory-integration-using-eap/m-p/1688094#M292710</guid>
      <dc:creator>kmcdonald1973</dc:creator>
      <dc:date>2011-05-26T16:35:31Z</dc:date>
    </item>
  </channel>
</rss>

