Use this procedure to configure a Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) wireless profile.
Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure.
|To configure a PEAP-MS-CHAP v2 wireless profile for computers running Windows 7 and Windows Vista|
Open the New Wireless Network (IEEE 802.11) Policies Properties dialog box.
On the General tab, in Policy Name, type a new name for your policy, or leave the default.
In Description, type a description of your policy.
Select Use Windows to configure wireless network settings for clients to specify that WLAN AutoConfig is used to configure wireless network adapter settings.
On the General tab, do one of the following:
To add and configure a new profile, click Add, and then select Infrastructure.
To edit an existing profile, select the profile you want to modify, and then click Edit.
On the Connection tab, in Profile Name, if you are adding a new profile, type a name for the profile. If you are editing a profile that is already added, use the existing profile name, or modify the name as needed.
In Network Name(s) (SSID), type the service set identifier (SSID) for your wireless APs, and then click Add.
If your deployment uses multiple SSIDs and each wireless AP uses the same wireless security settings, repeat this step to add the SSID for each wireless AP to which you want this profile to apply.
If your deployment uses multiple SSIDs and the security settings for each SSID do not match, configure a separate profile for each group of SSIDs that use the same security settings. For example, if you have one group of wireless APs configured to use WPA2-Enterprise and AES, and another group of wireless APs to use WPA-Enterprise and TKIP, configure a profile for each group of wireless APs.
To specify that wireless clients automatically connect to wireless APs for which the SSID is specified in Network Name(s) (SSID), select Connect automatically when this network is in range.
To specify that wireless clients connect to networks in order of preference, select Connect to a more preferred network if available.
If you deployed wireless access points that are configured to suppress the broadcast beacon, select Connect even if the network is not broadcasting.
Enabling this option can create a security risk because wireless clients will probe for and attempt connections to any wireless network. By default, this setting is not enabled.
Click the Security tab. In Select the security methods for this network, in Authentication, select WPA2-Enterprise if it is supported by your wireless AP and wireless client network adapters. Otherwise, select WPA-Enterprise.
Selecting WPA2 exposes settings for Fast Roaming that are not displayed if WPA is selected. The default settings for Fast Roaming are sufficient for most wireless deployments.
In Encryption, select AES, if it is supported by your wireless AP and wireless client network adapters. Otherwise, select TKIP.
The settings for both Authentication and Encryption must match the settings configured on your wireless AP.
In Select a network authentication method, select Microsoft: Protected EAP (PEAP).
In Authentication mode, select from the following, depending on your needs: User or Computer authentication, Computer authentication, User authentication, Guest authentication. By default, User or Computer authentication is selected.
In Max Authentication Failures, specify the maximum number of failed attempts allowed before the user is notified that authentication has failed. By default, the value is set to “1.”
To specify that user credentials are held in cache, select Cache user information for subsequent connections to this network.
Click Advanced, and then configure the following:
To configure advanced 802.1X settings, in IEEE 802.1X, select Enforce advanced 802.1X settings, and then configure the following settings, depending on your needs: Max Eapol-Start Msgs, Held Period, Start Period, and Auth Period.
When the advanced 802.1X settings are enforced, the default values are sufficient for most wireless deployments.
To enable Single Sign On, select Enable Single Sign On for this network.
To specify when Single Sign On occurs, select either Perform immediately before User Logon or Perform immediately after User Logon, depending on your needs.
The remaining default values in Single Sign On are sufficient for typical wireless deployments.
To specify the maximum amount of time, in seconds, in which 802.1X authentication must complete and authorize network access, in Max delay for connectivity (seconds), enter a value, depending on your needs.
To allow dialogs during Single Sing On, select Allow additional dialogs to be displayed during Single Sign On.
To specify that wireless computers are placed on one virtual local area network (VLAN) at startup, and then transitioned to a different network after the user logs on to the computer, select This network uses different VLAN for authentication with machine and user credentials.
To enable Fast Roaming, in Fast Roaming, select Enable Pairwise Master Key (PMK) Caching. The default values for PMK Time to Live (minutes) and Number of entries in PMK Cache are typically sufficient for Fast Roaming.
Select This network uses pre-authentication, if your wireless AP is configured for pre-authentication. The default value of 3 is typically sufficient for Maximum Pre-authentication attempts.
To specify that cryptography adheres to the FIPS 140-2 certified mode, select Perform cryptography in FIPS 140-2 certified mode.
Click OK to save your settings and return to the Security tab.
Click Properties. The Protected EAP Properties dialog box opens.
In Protected EAP Properties, verify that Validate server certificate is selected.
In Trusted Root Certification Authorities, select the trusted root certification authority (CA) that issued the server certificate to your server running Network Policy Server (NPS).
This setting limits the trusted root CAs that clients trust to the selected CAs. If no trusted root CAs are selected, then clients trust all root CAs listed in their trusted root certification authority store.
To specify which Remote Authentication Dial-In User Service (RADIUS) servers your wired access clients must use for authentication and authorization, in Connect to these servers, type then name of each RADIUS server, exactly as it appears in the subject field of the server certificate. Use semicolons to specify multiple RADIUS server names.
For improved security and a better user experience, select Do not prompt user to authorize new servers or trusted certification authorities.
In Select Authentication Method, select Secured Password (EAP-MS-CHAP v2).
To enable PEAP Fast Reconnect, select Enable Fast Reconnect.
To specify that Network Access Protection (NAP) performs system health checks on clients to ensure they meet health requirements, before connections to the network are permitted, select Enforce Network Access Protection.
To require cryptobinding Type-Length-Value (TLV), select Disconnect if server does not present cryptobinding TLV.
To configure your clients so that they will not send their identity in plaintext before the client has authenticated the RADIUS server, select Enable Identity Privacy, and then in Anonymous Identity, type a name or value, or leave the field empty.
For example, if Enable Identity Privacy is enabled and you use “guest” as the anonymous identity value, the identity response for a user with identity alice@realm is guest@realm. If you select Enable Identity Privacy but do not provide an anonymous identity value, the identity response is @realm.
Click Configure. In the EAP MSCHAPv2 Properties dialog box, verify Automatically use my Windows logon name and password (and domain if any) is selected, click OK, and then click OK to close Protected EAP Properties.
Click OK to save your settings and close the Security tab, and then click OK again to close Vista Wireless Network Policy.