<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security for Internal WLAN in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911425#M22456</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Success!!! I was able to get past this message and get connected to my internal WLAN. Thanks for all of the help guys.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Mar 2012 14:54:28 GMT</pubDate>
    <dc:creator>snowmizer</dc:creator>
    <dc:date>2012-03-09T14:54:28Z</dc:date>
    <item>
      <title>Security for Internal WLAN</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911418#M22449</link>
      <description>&lt;P&gt;I'm trying to figure out the best way to set up authentication on my WLAN for my internal users. I want to use certificates but I'm not exactly sure what layer 2, layer 3 and AAA settings I need to configure for certificates. If I do certificate authentication is that enough or do I also need to use something like RADIUS authentication?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone got any good docs or recommendations on how to configure my WLAN for certificate authentication? Also, I'm curious what methods other people are using to secure their internal WLANs.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911418#M22449</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2021-07-04T04:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security for Internal WLAN</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911419#M22450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In order to do certificate authentication either using EAP-TLS or PEAP, 802.1x requires the use of a radius server.&amp;nbsp; The radius would look at your active directory for user or device authentication.&amp;nbsp; You would also need to have a pki infrastructure if doing EAP-TLS.&amp;nbsp; If you do not have a radius server, then pre shared key is your best bet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 16:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911419#M22450</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-03-07T16:25:29Z</dc:date>
    </item>
    <item>
      <title>Security for Internal WLAN</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911420#M22451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; If you're looking for WLAN authentication, I would recommend PEAP.&amp;nbsp; It requires all users to use their AD credentials and synchronizes with your AD infrastructure via RADIUS.&amp;nbsp; You can use your own RADIUS server or ACS / AD for authentication.&lt;/P&gt;&lt;P&gt;I've used it in the past and it is very good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first link gives you some detail on PEAP.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps430/prod_qas0900aecd801764fa.html"&gt;http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps430/prod_qas0900aecd801764fa.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second link is a configuration guide.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a0080665d18.shtml"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a0080665d18.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 16:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911420#M22451</guid>
      <dc:creator>Ven Taylor</dc:creator>
      <dc:date>2012-03-07T16:27:34Z</dc:date>
    </item>
    <item>
      <title>Security for Internal WLAN</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911421#M22452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; So basically I need to set up a RADIUS server and configure all of my APs as RADIUS clients, select "WPA+WPA2+802.1x" as the layer 2 security method, configure the AAA server tab to use my RADIUS server and then check "Local-EAP". Then set up a Local EAP profile that uses EAP-TLS. Am I correct that I will also need to change the settings on my client's wireless network config to pass EAP-TLS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 16:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911421#M22452</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2012-03-07T16:28:43Z</dc:date>
    </item>
    <item>
      <title>Security for Internal WLAN</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911422#M22453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your AP's are autonomous, then yes.&amp;nbsp; If you have a WLC, then only the WLC(S) are entered as your AAA client.&amp;nbsp; No need to select local eap when pointing to a radius server, You do want to select WPA+WPA@, but really only enable WPA2 &amp;amp; AES with 802.1x.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 16:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911422#M22453</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-03-07T16:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: Security for Internal WLAN</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911423#M22454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using WLC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks guys for the replies. I'm going to check out the two docs that Ven also recommended and I'll see if I have any other questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 16:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911423#M22454</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2012-03-07T16:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: Security for Internal WLAN</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911424#M22455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I looked at the docs and configured my settings. I set up RADIUS on Windows 2008 R2 NPS. Initially I had the WLC configured as a RADIUS client and I was seeing messages that a RADIUS message was received from the invalid RADIUS client IP address 1.2.3.4. The address 1.2.3.4 corresponds to the IP address on the interface for the WLAN. So I switched the IP address on the RADIUS client on NPS to match the IP address 1.2.3.4 and tried accessing the WLAN. Now I'm getting an EAP error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explicit EAP failure received (0x50005)&lt;/P&gt;&lt;P&gt;EAP Error Code: 0x40420110&lt;/P&gt;&lt;P&gt;Network authentication failed due to a problem with the user account&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looked on the NPS server logs and don't see any messages there. Account isn't locked out, certificate is valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other ideas?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 22:27:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911424#M22455</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2012-03-07T22:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security for Internal WLAN</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911425#M22456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Success!!! I was able to get past this message and get connected to my internal WLAN. Thanks for all of the help guys.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2012 14:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911425#M22456</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2012-03-09T14:54:28Z</dc:date>
    </item>
    <item>
      <title>I have this problem too</title>
      <link>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911426#M22457</link>
      <description>&lt;P&gt;I have this problem too.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Explicit EAP failure received (0x50005)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Can you help me please?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2014 11:02:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-for-internal-wlan/m-p/1911426#M22457</guid>
      <dc:creator>SMirlan79</dc:creator>
      <dc:date>2014-05-20T11:02:02Z</dc:date>
    </item>
  </channel>
</rss>

