Hi all,
I am not sure what you mean by native, but the SecureW2 TTLS Client has been
ported successfully to Vista and will be released soon as a BETA.
In an early experiment with SecureW2 I have also implemented the server side
of TTLS in IAS (Windows 2K). I left it alone as I figured no one woul
Having TTLS support in Windows would be great. It would make so much
sense for implementers. It would be a miracle really! I'm all for it.
Call me skeptical but I don't see it happening. I participated in the
IEEE working groups a few years back and had the opportunity to ask
that specific ques
On Feb 8, 2007, at 2:30 PM, Walt Reynolds wrote:
In a conversation I had with Microsoft, it was implied that if
there is a demand for it, Microsoft would add TTLSv0 into the
native Vista OS.
Since there is a lot of talk on the EAP types today, I thought I
would post my own question. How
In a conversation I had with Microsoft, it was implied that if there is
a demand for it, Microsoft would add TTLSv0 into the native Vista OS.
Since there is a lot of talk on the EAP types today, I thought I would
post my own question. How many of you out there would like to have
TTLSv0 native
This sounds like something similar I am working with Microsoft on. But
it only occurs if switching between a wireless card that does, to one
that does not, support AES. Below is the scenario (This assumes AES and
TKIP are both available on the same AP)
1. Using a machine that has not connect
Here is the link I was originally looking for it is deploying a secure
wireless network using MS. It talks about IAS, group policy for XP,
Vista, and Longhorn.
http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/ed80211.msp
x
-Original Message-
From: Tom Rixom [mailto:[EMAIL P
Hi Lee,
Thanks, I was looking for the specific EAP configuration setting which
is available when creating a new SSID.
http://www.microsoft.com/library/media/1033/technet/images/community/columns
/cableguy/cg070306_big.gif
The reason I started looking into PEAPv0 configuration is that SecureW2
c
To access Active Directory-based wireless network policy settings,
follow these steps: 1. On the domain controller, start the Active
Directory Users and Computers snap-in.
2. Right-click the domain object in the console tree, and then click
Properties.
3. Click the Group Policy tab.
4. Click Def
Does anyone now the group policy setting for something like this?
Regards,
Tom
> -Oorspronkelijk bericht-
> Van: Frank Bulk [mailto:[EMAIL PROTECTED]
> Verzonden: donderdag 8 februari 2007 17:16
> Aan: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> Onderwerp: Re: [WIRELESS-LAN] PEAPv0 questions
>
Belden is OEMing Extricom:
http://www.wirelessinsightasia.com/article.asp?id=1700
Frank
-Original Message-
From: Ringgold, Clint [mailto:[EMAIL PROTECTED]
Sent: Thursday, February 08, 2007 10:05 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Looking for alternativ
I think group policies would help out there.
Regards,
Frank
-Original Message-
From: Tom Rixom [mailto:[EMAIL PROTECTED]
Sent: Thursday, February 08, 2007 10:07 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] PEAPv0 questions
Hi all,
If we are going to talk about PEA
With regular APs we are seeing about 3-5 walls of penetration where as
with these products we are seeing more like 5-7 walls. Yes I know it
depends on what the walls are made of and all but still an average.
Also you don't have to worry about another Project for Sensors. They
are built-in.
IMHO
Hi all,
If we are going to talk about PEAP, could someone maybe answer me the
following questions?
Are these PEAPv0 implementations also used on public computers (accessible
by different users, without admin privileges)?
And if so can those non-admin users access the PEAP configuration via the
n
Here we are using PEAP-MSCHAPv2 and WPA/TKIP with the built-in clients - XP,
Vista & Mac
- Michael
Michael McGuire
Network Administrator
Moravian College
Center for Information Technology
610.625.7760
[EMAIL PROTECTED]
-Original Message-
From: Julian Y. Koh [mailto:[EMAIL PROTECTED]
Sen
> -Original Message-
> Can you please let me know if your school is currently using
> 802.1x and LEAP?
802.1x and PEAP TTLS, and WPA/WPA2 PEAP TTLS
If you can let me know if you are using a
> supplicant client or just the vendor supplied utilities, I
> would appreciate it.
Built
Based on a previous survey (which I don't have at my fingertips now),
PEAPv0/MSCHAPv2 is one of the most popular, followed by EAP-TTLS (SecureW2
is a great help), and if it's a Cisco shop, LEAP.
PEAPv0 is the lowest hanging fruit as far as native operating system and
device vendor supplicant sup
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
At 09:58 -0500 02/08/2007, Joseph Karam wrote:
>Any other
>insights would be appreciate as to how schools are supporting a secure
>wireless network.
Northwestern is using PEAP-MSCHAPv2 and WPA2/AES.
-BEGIN PGP SIGNATURE-
Version: PGP Desktop
All,
We are in the process of expanding our wireless network to the entire
campus. We are making the wireless network secure - meaning users need
to authenticate and traffic will be encrypted. We have been using
802.1x and LEAP (WPA v1) in two residence halls to pilot a secure
wireless setu
Hi All
We're doing some testing before a roll-out and are seeing some issues where
some clients cannot connect with TKIP encryption. A debug shows that the
client gets authenticated but when it comes time to complete the TKIP Group
Key Exchange, the client re-initiates the 802.1x process all over
19 matches
Mail list logo