802.1x Authentication Overview


Small business owners and homeowners interested in establishing a high-level and reliable security infrastructure for use with the USR2249 22 Mbps Wireless Access Point or the USR8022 22 Mbps Wireless Cable/DSL Router in conjunction with Windows XP or 2000 and Windows 2000 Internet Authentication Service, should strongly consider the deployment of 802.1x. 802.1x is a type of data protection and user authentication technology using the Extensible Authentication Protocol – Tunneled Transport Layer Security (EAP-TTLS) protocol, which requires a password from the end user for authentication. This password authentication practice is checked against a database for the purposes of logging in securely. Standard user passwords are checked against an authentication database. Once successfully logged in, the password information is maintained and privately held in an encrypted format. This security design affords the IT guru at the office or home the ability to realize safe, secure protection from would be hackers (internally or otherwise) for each client/computer/laptop. In addition, 802.1x is a useful tool for controlling user traffic to a protected network.

In a nutshell, how does 802.1x work?


Essentially, when an initial 802.1x communication begins with an unauthenticated supplicant on the client side (“client” meaning an employee’s computer/laptop, for example), the client device attempts to connect with an 802.11 authenticator (i.e., 802.1x USR2249 22 Mbps Wireless Access Point). The USR2249 22 Mbps Wireless Access Point responds by enabling a port for passing only Extensible Authentication Protocol (EAP) packets from the client to an authentication server located on the wired side of the USR2249 22 Mbps Wireless Access Point. The USR2249 22 Mbps Wireless Access Point blocks all other traffic, such as HTTP, DHCP, and POP3 packets, until the USR2249 22 Mbps Wireless Access Point can verify the client's identity using a Radius server. Once authenticated, the USR2249 22 Mbps Wireless Access Point opens the client's port for other types of traffic.

While this may sound tricky or marginally complicated, in fact, 802.1x is easy to implement and manage. Essentially a three-stage process – Scanning for Windows Update, Setting up the Server, and Configuring the Certificate Infrastructure – 802.1x delivers peak, seamless performance without sacrificing time and resources. Simply put, if you’re looking for the latest built-in security technology that doesn’t compromise your company’s growth or your family’s evolving computer needs, the solution is clear: 802.1x Authentication. The balance of this FAQ will cover the steps necessary to install 802.1x.

Note: These instructions are intended to serve as an overview and as such, assume a certain degree of IT acumen.

Note: In order to configure 802.1x for your USR2249 or your USR8022, you must have the latest firmware upgrade. Visit your corresponding product support page for the latest firmware.

Note: Windows XP Home users will need to upgrade to Windows XP in order to successfully

802.1x Authentication: Scanning for Updates


This first stage, Scanning for Updates, is necessary. In order to successfully run and execute 802.1x, you must update each client computer to Windows 2000 Service Pack 4 (SP4). Follow the instructions below to scan your system for necessary updates:

Note: Depending on the number of updates needed, this may take a while. In addition, you should consider performing an Update Scan as a regular exercise on a weekly or monthly basis. This will better ensure you’ve the latest service pack attributes and thus, allow your 802.1x authentication to perform as smoothly as possible.

  1. Open a Web browser and type http://windowsupdate.microsoft.com
  2. Follow the on-screen instructions to complete the update scan. A list of all necessary updates will appear. Update accordingly.
  3. Once you’ve successfully installed all necessary updates, run another update to verify you – in fact – have all service components installed. Failure to update all required service pack attributes will result in failed 802.1x certificate authentication.

802.1x Authentication: Setting up the Server


Installing the Windows 2000 Domain Controller

  1. Run dcpromo.exe from the command prompt.

  2. Follow all of the default prompts, making certain to ensure that DNS is installed and enabled during installation.

Installing the required services

  1. Go to the Control Panel and select the Add/Remove Programs Applet

  2. .
  3. Select Add/Remove Windows Components.

  4. Ensure that the following options are selected:

    • Certificate Services (This will warn you that the computer cannot be renamed and join or leave a domain after installing the certificate services.  Select Yes.

    • From the Internet Information Services (IIS) category, select World Wide Web Server.

    • From the Networking Services category, select Dynamic Host Configuration Protocol (DHCP), and Internet Authentication Service (DNS should already be selected and installed).

  5. Select Next.

  6. Select the default Enterprise root CA option and select Next.

  7. Enter the appropriate information to identify your Certificate Authority and select Next.

  8. Select Next.

  9. Select Ok and click Finish.

Configuring the DHCP server.

  1. Click Start, select Programs, Administrative Tools, and DHCP.

  2. Right-click your server and select New Scope.

  3. Click Nextwhen the New Scope Wizard Begins

  4. .
  5. Enter a practical name of the scope and its description, and select Next.

  6. Define the IP address range that you prefer DHCP to administer to your clients.  Change the subnet mask as necessary for your IP subnet. Select Next.

  7. To add exclusions (optional) from the address range you've specified, you may handle that at this time. Otherwise, select Next.

  8. Set the DHCP lease (the default is 8 days) to whatever works for your particular situation. When ready, select Next.

  9. Because it is much easier to set the DHCP options here, select Yes, I want to configure these options now and select Next.

  10. Enter the router for your subnet, or if this is for a local network only, leave it blank.  Select Next.

  11. For the Parent Domain, enter the domain you entered for the Domain Controller Setup, and enter that server address in the IP address field. Click Next.

  12. Click Next.

  13. Select Yes, I want to activate this scope now, click Next, then Finish.

  14. Right-click once again on the server and select Authorize

Setting up the Certificate Authority

  1. Click Start, select Programs, Administrative Tools, and Certification Authority

  2. .
  3. Right-click Policy Settings. Select New and Certificate to Issue.

  4. Select Authenticated Session and Smartcard Logon (select more than one by holding down the Ctrl key), and Select OK.

  5. Click Start, select Programs, Administrative Tools, and Active Directory Users and Computers.

  6. Right-click the active directory domain and select Properties.

  7. Select the Group Policy tab, making sure the Default Domain Policy is highlighted and click Edit.

  8. Under Computer Configuration, select Windows Settings, Security Settings, and Public Key Policies. Right-click Automatic Certificate Request Settings, select New, and Automatic Certificate Request.

  9. When the Certificate Request Wizard appears, select Next. Select the Computer Certificate Template and click Next.

  10. Ensure that your certificate authority is checked and click Next.  Review the policy change information and click Finish.

  11. Open up a command prompt (Select Start, Run, type cmd and click Enter). Type secedit/refreshpolicy machine_policy . This may take a few minutes.

Setting up the Radius Internet Authentication Service

  1. Click Start, select Programs, Administrative Tools, Internet Authentication Service.

  2. Right-click Clients and select New Client.

  3. Assign a name for your USR2249 Access Point and click Next.

  4. Enter the IP address of your USR2249 Access Point and set a shared secret. Select Finish.

  5. Right-Click Remote Access Policies and select New Remote Access Policy.

  6. Name the policy eap-tls and select Next.

  7. Click Add... Even if you do not intend to set any restrictions for using eap-tls to access the network, a condition is still required. For this reason, select Day-And-Time-Restrictions and click Add....

  8. Click Permitted and click OK. Select Next.

  9. Select Grant remote access permission and click Next.

  10. Click Edit Profile... and select the Authentication tab. Make sure Extensible Authentication Protocolis selected and Smart Card or other Certificate is set. Deselect any other authentication methods listed. Click OK.

  11. Windows will ask if you wish to view the Help topic for EAP. Select No to proceed with the installation. Click Finish.

Enabling the Remote Access Login for Users

  1. Click Start, select Programs, Administrative Tools, and Active Directory Users and Computers.

  2. Double-click the user for authentication application purposes. The user's account properties will appear.

  3. Select the Dial-in tab and select Allow access. Click OK.

 

The setup of the Authentication Server is complete. Proceed to the set up of your client certificate infrastructure.



802.1x Authentication: Configuring the Certificate Infrastructure


Getting the Client Certificate

  1. Connect the client to a network that doesn't require port authentication.

  2. Open Microsoft Explorer in Windows XP, and go to http://the name of your server here/certsrv

  3. Authenticate to the server using the account created at the end of the server setup.

  4. Ensure that Request a certificate is selected and click Next.

  5. Ensure that User certificate request: User Certificate is selected and click Next.

  6. Click Submit.

  7. Click Install this certificate.

  8. A certificate confirmation message will appear. Click Yes.

Enable 802.1x authentication for wireless card

  1. Open the properties for your wireless connection, either by

    • Right-clicking My Network Places from the desktop, selecting Properties, or

    • Opening the Control Panel, selecting Network Connections (located under Network and Internet Connections if in Category View)

  2. Right-click Wireless Network Connection and select Properties.

  3. Select the Authentication Tab, and ensure that Enable network access control using IEEE 802.1X is selected, and Smart Card or other Certificate is selected from the EAP type.

Enabling the Encryption (Optional)

  1. Encryption is enabled for each specific wireless network to which you connect.  To enable encryption for a wireless network, click the Wireless Networks tab. 

  • Select the wireless network to enable dynamic WEP from under Available Networks. Select Configure.

  • Select Data encryption (WEP enabled) and ensure The key is provided for me automatically is also selected.

  •