I've shown how to set up a WPA Enterprise architecture with PEAP-MSCHAPv2. You can find the tutorial here. However, as mentioned in the article, although it's relatively simple to set up, it may not be the most secure way to protect your WiFi. If security is a priority for you or your company, I strongly recommend using EAP-TLS instead. And the good news is that's exactly what I'm going to talk about here!
In this guide, we'll learn how to implement WPA Enterprise access using the most secure protocol for WiFi connections: EAP-TLS.
This lab has been realised using Ubiquiti WiFi equipment, but it can be reproduced on other WPA Enterprise-compatible WiFi hardware. As EAP-TLS is a PKI based, it requires a Certificate Authority (CA). Consequently, we will also configure Active Directory Certificate Services (AD CS) to distribute certificates to Supplicants and to the Authentication Server, which will be an NPS server (Microsoft's RADIUS server).
Active Directory Certificate Services (AD CS) enables the issuance and management of Public Key Infrastructure (PKI) certificates. In this configuration, it will facilitate the provision of certificates that enable every Active Directory user wishing to connect to the company's WiFi to authenticate themselves in complete security.
We have two options for installing the AD CS role: using PowerShell or the Graphical User Interface.
PS C:\Users\administrator.STD> Add-WindowsFeature Adcs-Cert-Authority -IncludeManagementTools
From the ADCS server, we need to create two certificate templates: one for the Authentication Server (NPS), which will generate a Computer certificate, and another for Supplicants, which will allow Domain Users to authenticate themselves.
Finally, click OK to create the template.
Finally, click OK to create the template.
We have two options for installing the NPS role: using PowerShell or the Graphical User Interface.
PS C:\Users\administrator.STD> Install-WindowsFeature NPAS -Restart -IncludeManagementTools
Once the AD CS has been correctly configured, we can request a computer certificate from the NPS server.
To automate the certificate renewal process, we can create a GPO.
C:\> gpupdate
We now need to create a Network Policy in which we define the group of users who can connect and the protocols used.
We now need to configure our UniFi Network Server to integrate the RADIUS (NPS) server.
We'll now look at how supplicants obtain the certificate they'll use for authentication. We'll look at two methods: a manual method and an automatic method via GPO.
C:\> gpupdate
The supplicants should now be able to connect to WPA Enterprise WiFi Access using EAP-TLS.
Contact :