On Sun, Jan 31, 2010 at 12:09 PM, Mike Diggins mike.digg...@mcmaster.ca wrote:
Why self signed versus CA signed? Ideally I would like my clients to not
be questioned about the certificate at all. Is that even possible with WPA?
If I purchase a CA signed cert, would that eliminate the
On Thu, Jan 28, 2010 at 4:12 AM, Amaru Netapshaak
postfix_am...@yahoo.com wrote:
Hello,
I've got FreeRADIUS querying an OpenLDAP server successfully. Users can login
and
their appropriate VLAN information is returned and everythings great. Right
now, if a user
isnt found in the LDAP
From: Fajar A. Nugraha fa...@fajar.net
To: FreeRadius users mailing list freeradius-users@lists.freeradius.org
Sent: Sun, January 31, 2010 7:20:15 AM
Subject: Re: Allowing Access via 'users' when LDAP fails
On Thu, Jan 28, 2010 at 4:12 AM, Amaru Netapshaak
On Sun, 31 Jan 2010, Fajar A. Nugraha wrote:
On Sun, Jan 31, 2010 at 12:09 PM, Mike Diggins mike.digg...@mcmaster.ca wrote:
Why self signed versus CA signed? Ideally I would like my clients to not
be questioned about the certificate at all. Is that even possible with WPA?
If I purchase a CA
Hi,
But I don't plan on distributing client certificates for authentication. I
intend for them to login with a username and password checked against my
Radius server, so I'm not sure what role the certificate plays in that
process?
the certificate is for the RADIUS server - this will let
On Sun, Jan 31, 2010 at 10:16 PM, Amaru Netapshaak
postfix_am...@yahoo.com wrote:
I need a port to come up IMMEDIATELY on the restricted-vlan,
providing my clients with
a DHCP-assigned address, and then once they log in, their appropriate VLAN
info is found in LDAP via
FreeRADIUS and then the
Hi,
In the Windows WPA setup screen, Protected EAP Properties, there are
options to Validate server certificate, and Connect to these servers.
Do I specify my two Radius servers there? My clients don't have direct
access to my Radius servers, so what actually happens when I enter them
On Mon, Feb 1, 2010 at 12:43 AM, Alan Buxey a.l.m.bu...@lboro.ac.uk wrote:
why use your own CA? well, in the case of EAP-TLS, this gives extra
security... but even in the case of EAP-TTLS or EAP-PEAP - if the RADIUS
server is signed by eg Verisign, then ANYONE can get a verisign certificate
Hi,
what switches? with Cisco you can use various fallthroughs - and you can
ensure that even the non 802.1X clients are catered for MAB will allow
you to send request to RADIUS server and then its your policy that matters..
eg
eg any MAC address, returns an ACCEPT but with a VLAN attribute.
On Sun, 31 Jan 2010, Alan Buxey wrote:
Hi,
In the Windows WPA setup screen, Protected EAP Properties, there are
options to Validate server certificate, and Connect to these servers.
Do I specify my two Radius servers there? My clients don't have direct
access to my Radius servers, so what
Hi,
to these servers client field, just enter the 'common name' entered on
the certificate? I wonder if a wildcard cert would work for this. As in
*.myorg.ca, then entering *.myorg.ca for client servers field. Just asking
because I have one of those.
depends on supplicant - some
11 matches
Mail list logo