Table of Contents

WIRELESS ACCESS DEPLOYMENT

Deploy and Configure Wireless APs

Follow these steps to deploy and configure your wireless APs:

Specify Wireless AP Channel Frequencies

When you deploy multiple wireless APs at a single geographical site, you must configure wireless APs that have overlapping signals to use unique channel frequencies to reduce interference between wireless APs.

You can use the following guidelines to assist you in choosing channel frequencies that do not conflict with other wireless networks at the geographical location of your wireless network.

Configure Wireless APs

Use the following information along with the product documentation provided by the wireless AP manufacturer to configure your wireless APs.

This procedure enumerates items commonly configured on a wireless AP. The item names can vary by brand and model and might be different from those in the following list. For specific details, see your wireless AP documentation.

To configure your wireless APs

Create Security Groups for Wireless Users

Follow these steps to create one or more wireless users security groups, and then add users to the appropriate wireless users security group:

Create a Wireless Users Security Group

You can use this procedure to create a wireless security group in the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in.

Membership in Domain Admins, or equivalent, is the minimum required to perform this procedure.

To create a wireless users security group

1. Click Start, click Administrative Tools, and then click Active Directory Users and Computers. The Active Directory Users and Computers snap-in opens. If it is not already selected, click the node for your domain. For example, if your domain is example.com, click example.com.

2. In the details pane, right-click the folder in which you want to add a new group (for example, right-click Users), point to New, and then click Group.

3. In New Object – Group, in Group name, type the name of the new group. For example, type Wireless Group.

4. In Group scope, select one of the following options:

5. In Group type, select Security.

6. Click OK.

If you need more than one security group for wireless users, repeat these steps to create additional wireless users groups. Later you can create individual network policies in NPS to apply different conditions and constraints to each group, providing them with different access permissions and connectivity rules.

Add Users to the Wireless Users Security Group

You can use this procedure to add a user, computer, or group to your wireless security group in the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in.

Membership in Domain Admins, or equivalent is the minimum required to perform this procedure.

To add users to the wireless security group

1. Click Start, click Administrative Tools, and then click Active Directory Users and Computers. The Active Directory Users and Computers MMC opens. If it is not already selected, click the node for your domain. For example, if your domain is example.com, click example.com.

2. In the details pane, double-click the folder that contains your wireless security group.

3. In the details pane, right-click the wireless security group, and then click Properties. The Properties dialog box for the security group opens.

4. On the Members tab, click Add, and then complete one of the following procedures to either add a computer or add a user or group.

To add a user or group

1. In Enter the object names to select, type the name of the user or group that you want to add, and then click OK.

2. To assign group membership to other users or groups, repeat step 1 of this procedure.

To add a computer

1. Click Object Types. The Object Types dialog box opens.

2. In Object types, select Computers, and then click OK.

3. In Enter the object names to select, type the name of the computer that you want to add, and then click OK.

4. To assign group membership to other computers, repeat steps 1-3 of this procedure.

Configure Wireless Network (IEEE 802.11) Policies

Follow these steps to configure Wireless Network (IEEE 802.11) Policies Group Policy extension:

Open or Add and Open a Group Policy Object

By default, the Group Policy Management feature is installed on computers running Windows Server 2016 when the Active Directory Domain Services (AD DS) server role is installed and the server is configured as a domain controller. The following procedure that describes how to open the Group Policy Management Console (GPMC) on your domain controller. The procedure then describes how to either open an existing domain-level Group Policy object (GPO) for editing, or create a new domain GPO and open it for editing.

Membership in Domain Admins, or equivalent, is the minimum required to perform this procedure.

To open or add and open a Group Policy object

1. On your domain controller, click Start, click Windows Administrative Tools, and then click Group Policy Management. The Group Policy Management Console opens.

2. In the left pane, double-click your forest. For example, double-click Forest: example.com.

3. In the left pane, double-click Domains, and then double-click the domain for which you want to manage a Group Policy object. For example, double-click example.com.

4. Do one of the following:

In New GPO, in Name, type a name for the new Group Policy object, and then click OK.

Right-click your new Group Policy object, and then click Edit. Group Policy Management Editor opens.

In the next section you will use Group Policy Management Editor to create wireless policy.

Activate Default Wireless Network (IEEE 802.11) Policies

This procedure describes how to activate the default Wireless Network (IEEE 802.11) Policies by using the Group Policy Management Editor (GPME).

Membership in Domain Admins, or equivalent, is the minimum required to perform this procedure.

To activate default Wireless Network (IEEE 802.11) Policies

1. Follow the previous procedure, To open or add and open a Group Policy object to open the GPME.

2. In the GPME, in the left pane, double-click Computer Configuration, double-click Policies, double-click Windows Settings, and then double-click Security Settings.

3. In Security Settings, right-click Wireless Network (IEEE 802.11) Policies, and then click Create a new Wireless Policy for Windows Vista and Later Releases.

4. The New Wireless Network Policy Properties dialog box opens. In Policy Name, type a new name for the policy or keep the default name. Click OK to save the policy. The default policy is activated and listed in the details pane of the GPME with the new name you provided or with the default name New Wireless Network Policy.

5. In the details pane, double-click New Wireless Network Policy to open it.

In the next section you can perform policy configuration, policy processing preference order, and network permissions.

Configure the New Wireless Network Policy

You can use the procedures in this section to configure Wireless Network (IEEE 802.11) Policy. This policy enables you to configure security and authentication settings, manage wireless profiles, and specify permissions for wireless networks that are not configured as preferred networks.

Configure a Wireless Connection Profile for PEAP-MS-CHAP v2

This procedure provides the steps required to configure a PEAP-MS-CHAP v2 wireless profile.

Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure.

To configure a wireless connection profile for PEAP-MS-CHAP v2

1. In GPME, in the wireless network properties dialog box for the policy that you just created, on the General tab and in Description, type a brief description for the policy.

2. To specify that WLAN AutoConfig is used to configure wireless network adapter settings, ensure that Use Windows WLAN AutoConfig service for clients is selected.

3. In Connect to available networks in the order of profiles listed below, click Add, and then select Infrastructure. The New Profile properties dialog box opens.

4. In theNew Profile properties dialog box, on the Connection tab, in the Profile Name field, type a new name for the profile. For example, type Example.com WLAN Profile for Windows 10.

5. In Network Name(s) (SSID), type the SSID that corresponds to the SSID configured on your wireless APs, and then click Add.

If your deployment uses multiple SSIDs and each wireless AP uses the same wireless security settings, repeat this step to add the SSID for each wireless AP to which you want this profile to apply.

If your deployment uses multiple SSIDs and the security settings for each SSID do not match, configure a separate profile for each group of SSIDs that use the same security settings. For example, if you have one group of wireless APs configured to use WPA2-Enterprise and AES, and another group of wireless APs to use WPA-Enterprise and TKIP, configure a profile for each group of wireless APs.

6. If the default text NEWSSID is present, select it, and then click Remove.

7. If you deployed wireless access points that are configured to suppress the broadcast beacon, select Connect even if the network is not broadcasting.

8. Click the Security tab, click Advanced, and then configure the following:

a. To configure advanced 802.1X settings, in IEEE 802.1X, select Enforce advanced 802.1X settings.

When the advanced 802.1X settings are enforced, the default values for Max Eapol-Start Msgs, Held Period, Start Period, and Auth Period are sufficient for typical wireless deployments. Because of this, you do not need to change the defaults unless you have a specific reason for doing so.

b. To enable Single Sign On, select Enable Single Sign On for this network.

c. The remaining default values in Single Sign On are sufficient for typical wireless deployments.

d. In Fast Roaming, if your wireless AP is configured for pre-authentication, select This network uses pre-authentication.

9. To specify that wireless communications meet FIPS 140-2 standards, select Perform cryptography in FIPS 140-2 certified mode.

10. Click OK to return to the Security tab. In Select the security methods for this network, in Authentication, select WPA2-Enterprise if it is supported by your wireless AP and wireless client network adapters. Otherwise, select WPA-Enterprise.

11. In Encryption, if supported by your wireless AP and wireless client network adapters, select AES-CCMP. If you are using access points and wireless network adapters that support 802.11ac, select AES-GCMP. Otherwise, select TKIP.

12. In Select a network authentication method, select Protected EAP (PEAP), and then click Properties. The Protected EAP Properties dialog box opens.

13. In Protected EAP Properties, confirm that Verify the server's identity by validating the certificate is selected.

14. In Trusted Root Certification Authorities, select the trusted root certification authority (CA) that issued the server certificate to your NPS.

15. In the Select Authentication Method list, select Secured password (EAP-MS-CHAP v2).

16. Click Configure. In the EAP MSCHAPv2 Properties dialog box, verify Automatically use my Windows logon name and password (and domain if any) is selected, and click OK.

17. To enable PEAP Fast Reconnect, ensure that Enable Fast Reconnect is selected.

18. To require server cryptobinding TLV on connection attempts, select Disconnect if server does not present cryptobinding TLV.

19. To specify that user identity is masked in phase one of authentication, select Enable Identity Privacy, and in the textbox, type an anonymous identity name, or leave the textbox blank.

NOTE

20. Click OK to close the Protected EAP Properties dialog box.

21. Click OK to close the Security tab.

22. If you want to create additional profiles, click Add, and then repeat the previous steps, making different choices to customize each profile for the wireless clients and network to which you want the profile applied. When you are done adding profiles, click OK to close the Wireless Network Policy Properties dialog box.

In the next section you can order the policy profiles for optimum security.

Set the Preference Order for Wireless Connection Profiles

You can use this procedure if you have created multiple wireless profiles in your wireless network policy and you want to order the profiles for optimal effectiveness and security.

To ensure that wireless clients connect with the highest level of security that they can support, place your most restrictive policies at the top of the list.

For example, if you have two profiles, one for clients that support WPA2 and one for clients that support WPA, place the WPA2 profile higher on the list. This ensures that the clients that support WPA2 will use that method for the connection rather than the less secure WPA.

This procedure provides the steps to specify the order in which wireless connection profiles are used to connect domain member wireless clients to wireless networks.

Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure.

To set the preference order for wireless connection profiles

1. In GPME, in the wireless network properties dialog box for the policy that you just configured, click the General tab.

2. On the General tab, in Connect to available networks in the order of profiles listed below, select the profile that you want to move in the list, and then click either the “up arrow” button or “down arrow” button to move the profile to the desired location in the list.

3. Repeat step 2 for each profile that you want to move in the list.

4. Click OK to save all changes.

In the following section, you can define network permissions for the wireless policy.

Define Network Permissions

You can configure settings on the Network Permissions tab for the domain members to which Wireless Network (IEEE 802.11) Policies apply.

You can only apply the following settings for wireless networks that are not configured on the General tab in the Wireless Network Policy Properties page:

Membership in Domain Admins, or equivalent, is the minimum required to complete these procedures.

To allow or deny connections to specific wireless networks

1. In GPME, in the wireless network properties dialog box, click the Network Permissions tab.

2. On the Network Permissions tab, click Add. The New Permissions Entry dialog box opens.

3. In the New Permission Entry dialog box, in the Network Name (SSID) field, type the network SSID of the network for which you want to define permissions.

4. In Network Type, select Infrastructure or Ad hoc.

5. In Permission, select Allow or Deny.

6. Click OK, to return to the Network Permissions tab.

To specify additional network permissions (Optional)

1. On the Network Permissions tab, configure any or all of the following:

Configure your NPSs

Follow these steps to configure NPSs to perform 802.1X authentication for wireless access:

Register NPS in Active Directory Domain Services

You can use this procedure to register a server running Network Policy Server (NPS) in Active Directory Domain Services (AD DS) in the domain where the NPS is a member. For NPSs to be granted permission to read the dial-in properties of user accounts during the authorization process, each NPS must be registered in AD DS. Registering an NPS adds the server to the RAS and IAS Servers security group in AD DS.

Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure.

To register an NPS in its default domain

On your NPS, in Server Manager, click Tools, and then click Network Policy Server. The NPS snap-in opens.

Right-click NPS (Local), and then click Register Server in Active Directory. The Network Policy Server dialog box opens.

In Network Policy Server, click OK, and then click OK again.

Configure a Wireless AP as an NPS RADIUS Client

You can use this procedure to configure an AP, also known as a network access server (NAS), as a Remote Authentication Dial-In User Service (RADIUS) client by using the NPS snap-in.

Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure.

To add a network access server as a RADIUS client in NPS

1. On your NPS, in Server Manager, click Tools, and then click Network Policy Server. The NPS snap-in opens.

2. In the NPS snap-in, double-click RADIUS Clients and Servers. Right-click RADIUS Clients, and then click New.

3. In New RADIUS Client, verify that the Enable this RADIUS client check box is selected.

4. In New RADIUS Client, in Friendly name, type a display name for the wireless access point.

For example, if you want to add a wireless access point (AP) named AP-01, type AP-01.

5. In Address (IP or DNS), type the IP address or fully qualified domain name (FQDN) for the NAS.

If you enter the FQDN, to verify that the name is correct and maps to a valid IP address, click Verify, and then in Verify Address, in the Address field, click Resolve. If the FQDN name maps to a valid IP address, the IP address of that NAS will automatically appear in IP address. If the FQDN does not resolve to an IP address you will receive a message indicating that no such host is known. If this occurs, verify that you have the correct AP name and that the AP is powered on and connected to the network.

Click OK to close Verify Address.

6. In New RADIUS Client, in Shared Secret, do one of the following:

7. In New RADIUS Client, on the Advanced tab, in Vendor name, specify the NAS manufacturer name. If you are not sure of the NAS manufacturer name, select RADIUS standard.

8. In Additional Options, if you are using any authentication methods other than EAP and PEAP, and if your NAS supports the use of the message authenticator attribute, select Access Request messages must contain the Message-Authenticator attribute.

9. Click OK. Your NAS appears in the list of RADIUS clients configured on the NPS.

Create NPS Policies for 802.1X Wireless Using a Wizard

You can use this procedure to create the connection request policies and network policies required to deploy either 802.1X-capable wireless access points as Remote Authentication Dial-In User Service (RADIUS) clients to the RADIUS server running Network Policy Server (NPS). After you run the wizard, the following policies are created:

Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure.

Create policies for 802.1X authenticated wireless by using a wizard

1. Open the NPS snap-in. If it is not already selected, click NPS (Local). If you are running the NPS MMC snap-in and want to create policies on a remote NPS, select the server.

2. In Getting Started, in Standard Configuration, select RADIUS server for 802.1X Wireless or Wired Connections. The text and links below the text change to reflect your selection.

3. Click Configure 802.1X. The Configure 802.1X wizard opens.

4. On the Select 802.1X Connections Type wizard page, in Type of 802.1X connections, select Secure Wireless Connections, and in Name, type a name for your policy, or leave the default name Secure Wireless Connections. Click Next.

5. On the Specify 802.1X Switches wizard page, in RADIUS clients, all 802.1X switches and wireless access points that you have added as RADIUS Clients in the NPS snap-in are shown. Do any of the following:

6. Click Next. On the Configure an Authentication Method wizard page, in Type (based on method of access and network configuration), select Microsoft: Protected EAP (PEAP), and then click Configure.

7. On the Edit Protected EAP Properties wizard page, in Certificate issued, ensure that the correct NPS certificate is selected, and then do the following:

8. Click OK. The Edit Protected EAP Properties dialog box closes, returning you to the Configure 802.1X wizard. Click Next.

9. In Specify User Groups, click Add, and then type the name of the security group that you configured for your wireless clients in the Active Directory Users and Computers snap-in. For example, if you named your wireless security group Wireless Group, type Wireless Group. Click Next.

10. Click Configure to configure RADIUS standard attributes and vendor-specific attributes for virtual LAN (VLAN) as needed, and as specified by the documentation provided by your wireless AP hardware vendor. Click Next.

11. Review the configuration summary details, and then click Finish.

Your NPS policies are now created, and you can move on to joining wireless computers to the domain.

Join New Wireless Computers to the Domain

The easiest method to join new wireless computers to the domain is to physically attach the computer to a segment of the wired LAN (a segment not controlled by an 802.1X switch) before joining the computer to the domain. This is easiest because wireless group policy settings are automatically and immediately applied and, if you have deployed your own PKI, the computer receives the CA certificate and places it in the Trusted Root Certification Authorities certificate store, allowing the wireless client to trust NPSs with server certs issued by your CA.

Likewise, after a new wireless computer is joined to the domain, the preferred method for users to log on to the domain is to perform log on by using a wired connection to the network.

Other domain-join methods

In cases where it is not practical to join computers to the domain by using a wired Ethernet connection, or in cases where the user cannot log on to the domain for the first time by using a wired connection, you must use an alternate method.

Join the Domain and Log On by using the IT Staff Computer Configuration Method

Domain member users with domain-joined wireless client computers can use a temporary wireless profile to connect to an 802.1X-authenticated wireless network without first connecting to the wired LAN. This temporary wireless profile is called a bootstrap wireless profile.

A bootstrap wireless profile requires the user to manually specify their domain user account credentials, and does not validate the certificate of the Remote Authentication Dial-In User Service (RADIUS) server running Network Policy Server (NPS).

After wireless connectivity is established, Group Policy is applied on the wireless client computer, and a new wireless profile is issued automatically. The new policy uses the computer and user account credentials for client authentication.

Additionally, as part of the PEAP-MS-CHAP v2 mutual authentication using the new profile instead of the bootstrap profile, the client validates the credentials of the RADIUS server.

After you join the computer to the domain, use this procedure to configure a Single Sign On bootstrap wireless profile, before distributing the wireless computer to the domain-member user.

To configure a Single Sign On bootstrap wireless profile

Create a bootstrap profile by using the procedure in this guide named Configure a Wireless Connection Profile for PEAP-MS-CHAP v2, and use the following settings:

2. In the properties of the Wireless Network Policy within which you created the new bootstrap profile, on the General tab, select the bootstrap profile, and then click Export to export the profile to a network share, USB flash drive, or other easily accessible location. The profile is saved as an *.xml file to the location that you specify.

3. Join the new wireless computer to the domain (for example, through an Ethernet connection that does not require IEEE 802.1X authentication) and add the bootstrap wireless profile to the computer by using the netsh wlan add profile command.

4. Distribute the new wireless computer to the user with the procedure to “Log on to the domain using computers running Windows 10.”

When the user starts the computer, Windows prompts the user to enter their domain user account name and password. Because Single Sign On is enabled, the computer uses the domain user account credentials to first establish a connection with the wireless network and then log on to the domain.

Log on to the domain using computers running Windows 10

1. Log off the computer, or restart the computer.

2. Press any key on your keyboard or click on the desktop. The logon screen appears with a local user account name displayed and a password entry field below the name. Do not log on with the local user account.

3. In the lower left corner of the screen, click Other User. The Other User log on screen appears with two fields, one for user name and one for password. Below the password field is the text Sign on to: and then the name of the domain where the computer is joined. For example, if your domain is named example.com, the text reads Sign on to: EXAMPLE.

4. In User name, type your domain user name.

5. In Password, type your domain password, and then click the arrow, or press ENTER.

Join the Domain and Log On by using Bootstrap Wireless Profile Configuration by Users

With this method, you complete the steps in the General steps section, then you provide your domain-member users with the instructions about how to manually configure a wireless computer with a bootstrap wireless profile. The bootstrap wireless profile allows the user to establish a wireless connection and then join the domain. After the computer is joined to the domain and restarted, the user can log on to the domain through a wireless connection.

General steps

1. Configure a local computer administrator account, in Control Panel, for the user.

2. Provide your domain users with the instructions for configuring a bootstrap wireless profile, as documented in the following procedure To configure a bootstrap wireless profile.

3. Additionally, provide users with both the local computer credentials (user name and password), and domain credentials (domain user account name and password) in the form DomainName\UserName, as well as the procedures to “Join the computer to the domain,” and to “Log on to the domain,” as documented in the Windows Server 2016 Core Network Guide.

To configure a bootstrap wireless profile

1. Use the credentials provided by your network administrator or IT support professional to log on to the computer with the local computer's Administrator account.

2. Right-click the network icon on the desktop, and click Open Network and Sharing Center. Network and Sharing Center opens. In Change your networking settings, click Set up a new connection or network. The Set Up a Connection or Network dialog box opens.

3. Click Manually connect to a wireless network, and then click Next.

4. In Manually connect to a wireless network, in Network name, type the SSID name of the AP.

5. In Security type, select the setting provided by your administrator.

6. In Encryption type and Security Key, select or type the settings provided by your administrator.

7. Select Start this connection automatically, and then click Next.

8. In Successfully addedYour Network SSID, click Change connection settings.

9. Click Change connection settings. The Your Network SSID Wireless Network property dialog box opens.

10. Click the Security tab, and then in Choose a network authentication method, select Protected EAP (PEAP).

11. Click Settings. The Protected EAP (PEAP) Properties page opens.

12. In the Protected EAP (PEAP) Properties page, ensure that Validate server certificate is not selected, click OK twice, and then click Close.

13. Windows then attempts to connect to the wireless network. The settings of the bootstrap wireless profile specify that you must provide your domain credentials. When Windows prompts you for an account name and password, type your domain account credentials as follows: Domain Name\User Name, Domain Password.

To join a computer to the domain

1. Log on to the computer with the local Administrator account.

2. In the search text box, type PowerShell. In search results, right-click Windows PowerShell, and then click Run as administrator. Windows PowerShell opens with an elevated prompt.

3. In Windows PowerShell, type the following command, and then press ENTER. Ensure that you replace the variable DomainName with the name of the domain that you want to join.

Add-Computer DomainName

4. When prompted, type your domain user name and password, and click OK.

5. Restart the computer.

6. Follow the instructions in the previous section Log on to the domain using computers running Windows 10.

www.itclatam.com 2020/12/09 16:29