<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deploying a secure internal wireless network in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924146#M180730</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; yes, on reading the guide again, it does say that the client computer will pass on the credentials in the second phase of authentication once it has verified the identity of the NPS server using the certificate so thanks for clarifying that for me. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree but this will design will pass through our information security department and I'm sure they'll want me to go the EAP-TLS route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I have a question regarding the certificates. We already deply computer certificates on each client computer that is assigned to a user for VPN access, couldn't I just use these existing certificates for EAP-TLS or do I need to use dedicated certificates for this purpose? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Apr 2012 19:25:53 GMT</pubDate>
    <dc:creator>rajarora4</dc:creator>
    <dc:date>2012-04-09T19:25:53Z</dc:date>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924142#M180726</link>
      <description>&lt;P&gt;Hi, We've got a 5508 WLAN controller with about 200 WAPs currently deployed for guest access only. We would now like to deploy wireless for our internal network as well and would like for this to support voice as well. I'm reviewing the various options that are available and trying to figure out which one is the best. I've narrowed it down to EAP-TLS and PEAP with MS-CAHPV2 with Windows based certificates. Our management wants us to use Microsoft RADIUS servers instead of ACS.&amp;nbsp; Just wanted to get some feedback to see if someone has done this in their environment before and the pros and cons of choosing one authentication method over another. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for you valuable input!&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924142#M180726</guid>
      <dc:creator>rajarora4</dc:creator>
      <dc:date>2021-07-04T04:58:14Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924143#M180727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; FIrst for doing VoIP, make sure you have the appropriate coveraged. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RSSI -65dBm&lt;/P&gt;&lt;P&gt;SNR of 25 db&lt;/P&gt;&lt;P&gt;and 25% cell overlap.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for PEAP vs EAP-TLS, PEAP tends to be simpler.&amp;nbsp; You do need to have a certificate on the IAS/NPS server that allows it to authenticate clients, but this is the only required certificate.&amp;nbsp; You can use a GPO to push the wireless config down, and the Root CA certificate to the client devices making that task a lot easeier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With EAP-TLS, every machine/user needs a certificate.&amp;nbsp; So getting everyone enrolled can be a bit of a PITA.&amp;nbsp; But if a machine is lost, or a user leaves you only need to revoke those certificates, to stop the device from getting on the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My .02, go with PEAP.&amp;nbsp; Less certificate stuff to deal with, pretty easy to deploy and maintain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 18:55:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924143#M180727</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2012-04-09T18:55:53Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924144#M180728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Stephen, thanks for your post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding PEAP, from what I've read, it seems like the user will need to enter their AD credentials every time they want to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With EAP-TLS, the computer certificates should automatically connect the pc to the internal wireless network once it's in range. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I correct with these two statements? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if so, wouldn't option 2 be easier for users, and more secure?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 19:12:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924144#M180728</guid>
      <dc:creator>rajarora4</dc:creator>
      <dc:date>2012-04-09T19:12:36Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924145#M180729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Actually the user shouldn't need to input credentials beyond the windows login screen.&amp;nbsp; If you use the WZC, and most supplicants, when you login to the machine with domain credentials, they will be transmitted across the wireless for the user login.&amp;nbsp; That being said, if there is an issue, they could get prompted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I'd rather troubleshoot why the user loign isn't happening than have to get hip deep in PKI issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes EAP-TLS can be considered the most secure, and potentially easier on the user, so long as you are willing to do all of the certificate enrollments yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 19:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924145#M180729</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2012-04-09T19:16:38Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924146#M180730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; yes, on reading the guide again, it does say that the client computer will pass on the credentials in the second phase of authentication once it has verified the identity of the NPS server using the certificate so thanks for clarifying that for me. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree but this will design will pass through our information security department and I'm sure they'll want me to go the EAP-TLS route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I have a question regarding the certificates. We already deply computer certificates on each client computer that is assigned to a user for VPN access, couldn't I just use these existing certificates for EAP-TLS or do I need to use dedicated certificates for this purpose? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 19:25:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924146#M180730</guid>
      <dc:creator>rajarora4</dc:creator>
      <dc:date>2012-04-09T19:25:53Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924147#M180731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you only do machine level authentication for the TLS, you should be good, with what you have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 19:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924147#M180731</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2012-04-09T19:32:17Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924148#M180732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want to add, but not o confuse you, but you can do PEAP/EAP-TLS with mutual authentication. Its overkill, the benny is the cert is sent inside a tunnel. If you do native TLS it is sent in the open, unless you select privacy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as Steve mentioned, the cert can be used. In fact, when you configure the supplicant you select what cert you want to use. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 19:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924148#M180732</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-09T19:39:11Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924149#M180733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for chiming in George. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephen, with machine level authentication, I'm assuming you mean that as long as the machine is a member of the domain, has a valid certificate and the user account is active in AD, that machine should be able to connect to the wireless network using the certificate.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George, PEAP/EAP-TLS sounds like a great option that I could present as well. Could you provide some additional details? I can look it up if not but thanks for the idea. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you guys point me to a good step by step guide to deploy EAP-TLS with windows NPS and RADIUS. I can find one as well but you guys seem to have good experience doing this. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:33:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924149#M180733</guid>
      <dc:creator>rajarora4</dc:creator>
      <dc:date>2012-04-09T20:33:54Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924150#M180734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here give a peek at these to get you started&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a008009256b.shtml"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a008009256b.shtml&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.mombu.com/microsoft/windows-server-security-general/t-peap-tls-vs-eap-tls-443617.html"&gt;http://www.mombu.com/microsoft/windows-server-security-general/t-peap-tls-vs-eap-tls-443617.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924150#M180734</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-09T20:37:37Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924151#M180735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Stephen, with machine level authentication, I'm assuming you mean that as long as the machine is a member of the domain, has a valid certificate and the user account is active in AD, that machine should be able to connect to the wireless network using the certificate.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; With Machine authentication the user doesn't matter.&amp;nbsp; The machine certificate is the only 'credential' sent to be validated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924151#M180735</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2012-04-09T20:38:21Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924152#M180736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Interesting, so am I correct in assuming that PEAP/EAP-TLS would utilize both methods of authentication. It would validate the machine credentials as well as the user credentials?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924152#M180736</guid>
      <dc:creator>rajarora4</dc:creator>
      <dc:date>2012-04-09T20:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924153#M180737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Steve, his users have a VPN cert, this is not a machine cert, correct ? So I am thinking he would need to config his client with EAP-TLS and select the cert in the client supplicant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, "machine authentcaion" uses a SID (system id). This would not use a cert, correc?&amp;nbsp; Rather it would use the SID that is unquie to the device and AD, which is used insetad of a AD ID for example ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:42:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924153#M180737</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-09T20:42:55Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924154#M180738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would not implement PEAP/TLS as not all clients will support it. However, most client support EAP/TLS. I just wanted to mention it becuase if you are new to TLS this will be one of those "oh i didnt know you could do that" ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first EAP is the outter and the second eap is the inner&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EAP/PEAP (Outter) - MsChapV2(Inner)&lt;/P&gt;&lt;P&gt;EAP/TLS (there is no tunnel unless you select "privacy")&lt;/P&gt;&lt;P&gt;EAP/PEAP (Outter) - TLS (inner)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924154#M180738</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-09T20:47:50Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924155#M180739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Actually I believe it's a machine certificate &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924155#M180739</guid>
      <dc:creator>rajarora4</dc:creator>
      <dc:date>2012-04-09T20:48:47Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924156#M180740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;wow, started this 4 times now.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, TLS would use the certificate that was installed.&amp;nbsp; Technically, it would not matter if the machine were part of the domain, so long as it had the certificate.&amp;nbsp; The odds on getting the certificate while not being part of the domain is another story.....Now if you were doing PEAP with machine authentication, you could tell it to check that the machine is part of the domain or not.&lt;/P&gt;&lt;P&gt;@George IIRC adn I may not, when you do machine auth it looks at the GUID of the device that is in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN cert can be used for the TLS, just a matter of what/who it's issued to, the machine or the indivdual user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924156#M180740</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2012-04-09T20:50:05Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924157#M180741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have to say, the term "machine authentication", can mean a few different things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924157#M180741</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-09T20:51:46Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924158#M180742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@ Steve -- Is there a good document that talks about that specifically .. I am a little rusty on that subject and need to sharpen up ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924158#M180742</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-09T20:55:05Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924159#M180743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; @Stephen, I have a question about PEAP and your statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Actually the user shouldn't need to input credentials beyond the windows login screen.&amp;nbsp; If you use the WZC, and most supplicants, when you login to the machine with domain credentials, they will be transmitted across the wireless for the user login.&amp;nbsp; That being said, if there is an issue, they could get prompted. "&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Are the user creds sent encrypted or are they sent clear text?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 19:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924159#M180743</guid>
      <dc:creator>rajarora4</dc:creator>
      <dc:date>2012-04-10T19:47:28Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924160#M180744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use PEAP and WZC as your wireless supplicant, windows sends the inner identity as the outer identity, which is sent in the clear text. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if your AD was say ADRAJ password ABC123.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone sniffed the network you would see ADRAJ in the clear. Other supplicants, like Intel for example, you can send a bogus outer id. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 19:56:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924160#M180744</guid>
      <dc:creator>George Stefanick</dc:creator>
      <dc:date>2012-04-10T19:56:12Z</dc:date>
    </item>
    <item>
      <title>Deploying a secure internal wireless network</title>
      <link>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924161#M180745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the reply George. So how can I send the creds in encrypted format, Do I select privacy or is there another way?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 20:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/deploying-a-secure-internal-wireless-network/m-p/1924161#M180745</guid>
      <dc:creator>rajarora4</dc:creator>
      <dc:date>2012-04-10T20:00:14Z</dc:date>
    </item>
  </channel>
</rss>

