Cisco Aironet 802.11a/b/g Wireless LAN
Client Adapters (CB21AG and PI21AG)
Installation and Configuration Guide for
Windows Vista
Software Release 1.0
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Customer Order Number:
Text Part Number: OL-16534-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following inform ation is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant
to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required
to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not
installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to
comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable
protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation.
Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class A or Class B digital
devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television
communications at your own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its
peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures:
• Turn the television or radio antenna until the interference stops.
• Move the equipment to one side or the other of the television or radio.
• Move the equipment farther away from the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television or radio are on circuits
controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way
We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA,
CCNP, CCSP, CCVP, Cisco, the Cisco
Cisco
Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, iQ Expertise, the iQ logo, iQ
Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The
Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx
States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0805R)
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Window Vista
For Infrastructure Devices1-9
For Client Devices1-9
Inserting the Client Adapter1-10
Inserting a PC-Cardbus Card1-10
Inserting a PCI Card1-11
Changing the Bracket1-11
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
iii
Contents
Inserting the Card1-12
Assembling the Antenna1-13
Mounting the Antenna1-14
Obtaining Client Adapter Software1-17
Installing the Client Adapter Driver and Software1-18
CHAPTER
CHAPTER
2Configuring Wireless Profiles2-1
Overview of Wireless Profiles2-2
Accessing Microsoft Vista Network and Sharing Center2-2
Creating a New Profile and Configuring Basic Settings2-3
Security and Encryption Types2-10
WEP (Shared) Security with Static WEP Keys2-10
WPA and WPA22-10
802.1X with Dynamic WEP Keys2-11
CCKM Fast Secure Roaming2-12
Accessing a Profile That Was Created Previously2-12
Viewing and Changing the Settings of a Profile2-13
Radio Measurement2-18
Advanced Roaming Setting2-19
3Configuring EAP Types3-1
Overview of EAP-FAST3-1
How EAP-FAST Works3-2
Two-Phase Tunneled Authentication3-2
Protected Access Credentials3-3
Server Certificate Validation3-3
iv
Configuring EAP-FAST3-4
Accessing EAP-FAST Properties for Configuration3-4
Configuring EAP-FAST Settings in the Connection Tab3-5
Overview of the User Credentials Tab3-9
Client Certificates3-9
Usernames and Passwords3-9
Configuring EAP-FAST Settings in the User Credentials Tab3-10
Understanding PIN Mode and Token Mode with OTP3-12
Configuring EAP-FAST Settings in the Authentication Tab3-13
Finding the Version of the EAP-FAST Module3-16
Overview of LEAP3-17
How LEAP Works3-17
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Configuring LEAP3-18
Accessing LEAP Properties for Configuration3-18
Configuring LEAP Settings in the Network Credentials Tab3-19
Finding the Version of the LEAP Module3-21
Overview of PEAP-GTC3-21
How PEAP-GTC Works3-22
Configuring PEAP-GTC3-23
Accessing PEAP-GTC Properties for Configuration3-23
Configuring PEAP-GTC Settings in the Connection Tab3-25
Configuring PEAP-GTC Settings in the User Credentials Tab3-27
Understanding PIN Mode and Token Mode with OTP3-29
Understanding PEAP-GTC Authentication3-30
Finding the Version of the PEAP-GTC Module3-30
Contents
CHAPTER
CHAPTER
4Performing Administrative Tasks4-1
Using Microsoft Tools to Perform Administrative Tasks4-2
Overview of Group Policy Objects4-2
Adding a Group Policy Object Editor4-2
Creating a EAP Group Policy Object in Windows Vista4-3
Configuring Machine Authentication for EAP-FAST4-4
Configuring Single Sign-On for EAP-FAST4-5
Configuring Machine Authentication for PEAP-GTC4-5
Configuring Single Sign-On for PEAP-GTC and LEAP4-5
The EAP-FAST XML Schema4-6
The PEAP-GTC XML Schema4-17
The LEAP XML Schema4-23
Logging for EAP Modules4-26
Configuring and Starting Logging4-26
Disabling Logging and Flushing Internal Buffers4-27
Locating Log Files4-28
5Routine Procedures5-1
Removing a Client Adapter5-2
Removing a PC-Cardbus Card5-2
Removing a PCI Card5-2
Upgrading the Client Adapter Software5-3
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
v
Contents
CHAPTER
APPENDIX
APPENDIX
APPENDIX
6Troubleshooting and Diagnostics6-1
Troubleshooting with Cisco Aironet Client Diagnostics6-2
Enabling Client Reporting6-6
AEAP MessagesA-1
EAP-FAST Error Messages and PromptsA-1
PEAP-GTC and LEAP Error Messages and PromptsA-6
Creating Strong PasswordsA-9
Characteristics of Strong PasswordsA-9
Characteristics of Weak PasswordsA-9
Password Security BasicsA-10
BTechnical SpecificationsB-1
CTranslated Safety WarningsC-1
Explosive Device Proximity WarningC-2
Antenna Installation WarningC-3
APPENDIX
Warning for Laptop UsersC-4
DDeclarations of Conformity and Regulatory InformationD-1
Manufacturer’s Federal Communication Commission Declaration of Conformity StatementD-2
Department of Communications – CanadaD-3
Canadian Compliance StatementD-3
European Community, Switzerland, Norway, Iceland, and LiechtensteinD-3
Declaration of Conformity with Regard to the R&TTE Directive 1999/5/ECD-3
Declaration of Conformity StatementD-5
Cisco Aironet CB21AG Wireless LAN Client AdapterD-5
Cisco Aironet PI21AG Wireless LAN Client AdapterD-6
Declaration of Conformity for RF ExposureD-7
Guidelines for Operating Cisco Aironet CB21AG and PI21AG Wireless LAN Client Adapters in JapanD-7
Japanese TranslationD-7
English TranslationD-7
Administrative Rules for Cisco Aironet CB21AG and PI21AG Wireless LAN Client Adapters in
Taiwan
D-8
2.4- and 5-GHz Client AdaptersD-8
Chinese TranslationD-8
English TranslationD-8
5-GHz Client AdaptersD-9
vi
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chinese TranslationD-9
English TranslationD-9
Brazil/Anatel ApprovalD-9
AIR-CB21AG-W-K9D-10
AIR-PI21AG-W-K9D-11
Contents
APPENDIX
APPENDIX
APPENDIX
EChannels, Power Levels, and Antenna GainsE-1
ChannelsE-2
IEEE 802.11aE-2
IEEE 802.11b/gE-3
Maximum Power Levels and Antenna GainsE-4
IEEE 802.11aE-4
IEEE 802.11bE-4
IEEE 802.11gE-5
FAcknowledgments and LicensingF-1
GAbbreviationsG-1
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
vii
Contents
viii
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Preface
The preface provides an overview of this guide, references related publications, and explains how to
obtain other documentation and technical assistance, if necessary.
The following topics are covered in this section:
•Audience, page ix
•Purpose, page ix
•Organization, page x
•Conventions, page x
Audience
Purpose
CautionThis guide pertains specifically to Cisco Aironet CB21AG and PI21AG client adapters on devices that
•Related Publications, page xii
•Obtaining Documentation, Obtaining Support, and Security Guidelines, page xii
This publication is for the person responsible for installing, configuring, and maintaining a Cisco
Aironet IEEE 802.11a/b/g Wireless LAN Client Adapter (CB21AG or PI21AG) on a computer that is
running the Microsoft Windows Vista operating system. This person should understand Windows Vista
and should be familiar with computing devices, network terms, and concepts.
This publication describes the Cisco Aironet CB21AG and PI21AG client adapters on devices that are
running Windows Vista.
are running Window Vista. For information about the Cisco Aironet CB21AG and PI21AG on devices
that are running Windows XP or Cisco Aironet 340, 350, and CB20A wireless LAN client adapters, refer
to the appropriate guides at this URL:
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
ix
Organization
This publication contains the following chapters:
•Chapter 1, “Product Overview and Installation,” describes the Cisco Aironet CB21AG and PI21AG
•Chapter 2, “Configuring Wireless Profiles,” explains how to use the Microsoft Vista Network and
•Chapter 3, “Configuring EAP Types,” explains the Cisco EAP types that are used for authenication
•Chapter 4, “Performing Administrative Tasks,” explains how to obtain Microsoft administrative
•Chapter 5, “Routine Procedures,”provides procedures for common tasks related to the client adapter.
•Chapter 6, “Troubleshooting and Diagnostics,” provides information about diagnosing problems
Preface
client adapters and their role in a wireless network. This chapter also provides information that you
need to know before installing a client adapter and instructions for installing the client adapter
hardware and software.
Sharing Center to create and manage profiles for your client adapter.
to wireless networks.
tools to distribute wireless profiles to users and computers in an Active Directory environment. This
chapter also provides the XML schemas for EAP-FAST, LEAP, and PEAP-GTC.
that might occur when you try to operate the client adapter.
•Appendix A, “EAP Messages,” describes EAP-FAST, PEAP-GTC and LEAP error messages and
•Appendix B, “Technical Specifications,” provides technical specifications for the Cisco Aironet
•Appendix C, “Translated Safety Warnings,” provides translations of the safety warnings that appear
•Appendix D, “Declarations of Conformity and Regulatory Information,”provides declarations of
•Appendix E, “Channels, Power Levels, and Antenna Gains,” lists the IEEE 802.11a, b, and g
•Appendix F, “Acknowledgments and Licensing,” provides information about open-source software
•Appendix G, “Abbreviations,” includes commonly used abbreviations.
Conventions
This publication uses the following conventions to convey instructions and information:
prompts. This appendix also provides guidelines for creating strong passwords.
CB21AG and PI21AG Wireless LAN Client Adapters.
in this publication. The second warning pertains to the PI21AG client adapter, and the third warning
pertains to the CB21AG client adapter.
conformity and regulatory information for the Cisco Aironet CB21AG and PI21AG Wireless LAN
client adapters.
channels supported by the world's regulatory domains as well as the maximum power levels and
antenna gains allowed per data rate.
that is used in the Cisco EAP modules.
•Commands are in boldface.
•Variables are in italics.
•Configuration parameters are capitalized.
•Notes, cautions, and warnings use the following conventions and symbols:
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
x
OL-16534-01
Preface
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
CautionMeans reader be ca reful. In this situation, you might do something that could result in equipment
damage or loss of data.
Warning
Waarschuwing
Varoitus
Attention
Warnung
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar
with standard practices for preventing accidents. (To see translations of the warnings that appear
in this publication, refer to the appendix “Translated Safety Warnings.”)
Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan
veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij
elektrische schakelingen betrokken risico’s en dient u op de hoogte te zijn van standaard
maatregelen om ongelukken te voorkomen. (Voor vertalingen van de waarschuwingen die in deze
publicatie verschijnen, kunt u het aanhangsel “Translated Safety Warnings” (Vertalingen van
veiligheidsvoorschriften) raadplegen.)
Tämä varoitusmerkki merkitsee vaaraa. Olet tilanteessa, joka voi johtaa ruumiinvammaan. Ennen
kuin työskentelet minkään laitteiston parissa, ota selvää sähkökytkentöihin liittyvistä vaaroista ja
tavanomaisista onnettomuuksien ehkäisykeinoista. (Tässä julkaisussa esiintyvien varoitusten
käännökset löydät liitteestä "Translated Safety Warnings" (käännetyt turvallisuutta koskevat
varoitukset).)
Ce symbole d’avertissement indique un danger. Vous vous trouvez dans une situation pouvant
entraîner des blessures. Avant d’accéder à cet équipement, soyez conscient des dangers posés par
les circuits électriques et familiarisez-vous avec les procédures courantes de prévention des
accidents. Pour obtenir les traductions des mises en garde figurant dans cette publication, veuillez
consulter l’annexe intitulée «
Translated Safety Warnings » (Traduction des avis de sécurité).
Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer
Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie
sich der mit elektrischen Stromkreisen verbundenen Gefahren und der Standardpraktiken zur
Vermeidung von Unfällen bewußt. (Übersetzungen der in dieser Veröffentlichung enthaltenen
Warnhinweise finden Sie im Anhang mit dem Titel “Translated Safety Warnings” (Übersetzung der
Warnhinweise).)
Avvertenza
Questo simbolo di avvertenza indica un pericolo. Si è in una situazione che può causare infortuni.
Prima di lavorare su qualsiasi apparecchiatura, occorre conoscere i pericoli relativi ai circuiti
elettrici ed essere al corrente delle pratiche standard per la prevenzione di incidenti. La traduzione
delle avvertenze riportate in questa pubblicazione si trova nell’appendice, “Translated Safety
Warnings” (Traduzione delle avvertenze di sicurezza).
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
xi
Preface
Advarsel
Aviso
¡Advertencia!
Varning!
Dette varselsymbolet betyr fare. Du befinner deg i en situasjon som kan føre til personskade. Før du
utfører arbeid på utstyr, må du være oppmerksom på de faremomentene som elektriske kretser
innebærer, samt gjøre deg kjent med vanlig praksis når det gjelder å unngå ulykker. (Hvis du vil se
oversettelser av de advarslene som finnes i denne publikasjonen, kan du se i vedlegget "Translated
Safety Warnings" [Oversatte sikkerhetsadvarsler].)
Este símbolo de aviso indica perigo. Encontra-se numa situação que lhe poderá causar danos fisicos.
Antes de começar a trabalhar com qualquer equipamento, familiarize-se com os perigos
relacionados com circuitos eléctricos, e com quaisquer práticas comuns que possam prevenir
possíveis acidentes. (Para ver as traduções dos avisos que constam desta publicação, consulte o
apêndice “Translated Safety Warnings” - “Traduções dos Avisos de Segurança”).
Este símbolo de aviso significa peligro. Existe riesgo para su integridad física. Antes de manipular
cualquier equipo, considerar los riesgos que entraña la corriente eléctrica y familiarizarse con los
procedimientos estándar de prevención de accidentes. (Para ver traducciones de las advertencias
que aparecen en esta publicación, consultar el apéndice titulado “Translated Safety Warnings.”)
Denna varningssymbol signalerar fara. Du befinner dig i en situation som kan leda till personskada.
Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och
känna till vanligt förfarande för att förebygga skador. (Se förklaringar av de varningar som
förekommer i denna publikation i appendix "Translated Safety Warnings" [Översatta
säkerhetsvarningar].)
Related Publications
Release notes for Cisco Aironet 802.11a/b/g client adapters (CB21AG and PI21AG) for Windows Vista
are located at this URL:
For more information about related Cisco Aironet products, refer to the publications for your
infrastructure device. You can find Cisco Aironet technical documentation at this URL:
Obtaining Documentation, Obtaining Support, and Security
Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback,
security guidelines, and also recommended aliases and general Cisco
What’s
New in Cisco Product Documentation, which also lists all new and revised Cisco technical
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
CHA PTER
1
Product Overview and Installation
This chapter describes the Cisco Aironet CB21AG and PI21AG client adapters and their role in a
wireless network. This chapter also provides information that you need to know before installing a client
adapter and instructions for installing the client adapter hardware and software.
The following topics are covered in this chapter:
•Introduction to the Client Adapters, page 1-2
•Hardware Components, page 1-3
•Software Components, page 1-4
•Network Configurations Using Client Adapters, page 1-4
•Safety information, page 1-6
•Unpacking the Client Adapter, page 1-7
•System Requirements, page 1-8
•Site Requirements, page 1-9
•Inserting the Client Adapter, page 1-10
•Obtaining Client Adapter Software, page 1-17
•Installing the Client Adapter Driver and Software, page 1-18
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-1
Chapter 1 Product Overview and Installation
Introduction to the Client Adapters
Introduction to the Client Adapters
The Cisco Aironet IEEE 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) are radio
modules that provide wireless data communications among fixed, portable, and mobile devices within
both wireless and wired network infrastructures. The client adapters are fully compatible when used in
devices supporting “plug-and-play” (PnP) technology.
The primary function of the client adapters is to transfer data packets through the wireless infrastructure
by communicating with other clients or with access points that are connected to a wired LAN. The
adapters operate similarly to a standard network product except that radios rather than Ethernet cables
make the connection to the wire. No special wireless networking functions are required, and all existing
applications that operate over a network can operate using the adapters.
This document covers the two client adapters described in Table 1-1.
Ta b l e 1-1Client Adapter Types
Client AdapterModel NumberDescriptionIllustration
PC-Cardbus
card
AIR-CB21AGAn IEEE 802.11a/b/g-compliant 2.4- and 5-GHz 54-Mbps client
adapter card radio module with a Cardbus interface that can be
inserted into any device equipped with a 32-bit Cardbus slot. Host
devices can include laptops and notebook computers.
95579
PCI cardAIR-PI21AGAn IEEE 802.11a/b/g-compliant 2.4- and 5-GHz 54-Mbps client
adapter card radio module that can be inserted into any device
equipped with an empty PCI expansion slot, such as a desktop
personal computer.
Terminology
The following terms are used throughout this document:
•client adapter—Refers to both types of adapters.
•PC-Cardbus card or PCI card—Refers to a specific adapter.
•workstation (or station)—Refers to a computing device with an installed client adapter.
•infrastructure device—Refers to a device that connects client adapters to a wired LAN, such as an
access point, bridge, or base station. Throughout this document, access point is used to represent
infrastructure devices in general.
ACTIVITY
STATUS
95580
1-2
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 1 Product Overview and Installation
Hardware Components
The client adapters have three major hardware components: a radio, a radio antenna, and two LEDs.
Radio
The client adapters contain a dual-band radio that is both IEEE 802.11a and 802.11b/g compliant. The
radio uses both direct-sequence spread spectrum (DSSS) technology and orthogonal frequency division
multiplexing (OFDM) technology for client applications in the 2.4-GHz Industrial Scientific Medical
(ISM) frequency band and OFDM technology in the 5-GHz Unlicensed National Information
Infrastructure (UNII) frequency bands. The client adapters operate with other IEEE 802.11a or
802.11b/g-compliant client devices in ad hoc mode or with Cisco Aironet access points and other IEEE
802.11a or 802.11b/g-compliant infrastructure devices in infrastructure mode.
Radio Antenna
The type of antenna used depends on your client adapter:
Hardware Components
LEDs
•PC-Cardbus cards have an integrated, permanently attached 0-dBi gain, dual-band 2.4/5-GHz
diversity antenna. The benefit of the diversity antenna system is improved coverage. The system
works by enabling the card to sample and switch between its two antenna ports in order to select the
optimum port for receiving data packets. As a result, the card has a better chance of maintaining the
radio frequency (RF) connection in areas of interference. The antenna is housed within the section
of the card that hangs out of the Cardbus slot when the card is installed.
•PCI cardshave a 1-dBi gain, dual-band 2.4/5-GHz antenna that is permanently attached by a 6.6-foot
(2-meter) cable. A base is provided with the antenna to enable it to be mounted to a wall or to sit
upright on a desk or other horizontal surface.
The client adapters have two LEDs that glow or blink to indicate the status of the adapter or to convey
system messages.
Ta b l e 1-2LED Operating Messages
Status LED (green)Activity LED (amber)Condition
OffOffClient adapter is not receiving power.
Blinking slowlyOffClient adapter is in power save mode.
OnOffClient adapter has awakened from power save mode.
Alternating blink:Client adapter is scanning for the wireless network
OnOff
OffOn
Tabl e 1-2 provides interpreations of the the LEDs.
for which it is configured.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-3
Software Components
Table 1-2LED Operating Messages (continued)
Status LED (green)Activity LED (amber)Condition
Blinking slowlyBlinking slowlyClient adapter is associated to an access point (in
Blinking quicklyBlinking quicklyClient adapter is transmitting or receiving data
Software Components
You can install both the driver for the CB21AG and PI21AG and the software that runs the adapter by
running a single executable file that is available from Cisco.com. You must execute this file on devices
that are running Windows Vista. This driver and softward can be used only with CB21AG and PI21AG
client adapters.
Chapter 1 Product Overview and Installation
infrastructure mode) or another client (in ad hoc
mode).
while associated to an access point (in infrastructure
mode) or another client (in ad hoc mode).
Network Configurations Using Client Adapters
Client adapters can be used in a variety of network configurations. In some configurations, access points
provide connections to your network or act as repeaters to increase wireless communication range. The
maximum communication range is based on how you configure your wireless network.
This section describes and illustrates the two most common network configurations:
•Ad hoc wireless local area network (LAN)
•Wireless infrastructure with workstations accessing a wired LAN
For examples of more complex network configurations involving client adapters and access points, refer
to the documentation for your access point.
Ad Hoc Wireless LAN
An ad hoc (or peer-to-peer) wireless LAN (see Figure 1-1) is the simplest wireless LAN configuration.
In a wireless LAN using an ad hoc network configuration, all devices equipped with a client adapter can
be linked together and communicate directly with each other. The use of an infrastructure device, such
as an access point, is not required.
1-4
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 1 Product Overview and Installation
Figure 1-1Ad Hoc Wireless LAN
Network Configurations Using Client Adapters
47520
Wireless Infrastructure with Workstations Accessing a Wired LAN
A infrastructure network can be created by placing two or more access points on a LAN. Figure 1-2
shows a microcellular network with workstations accessing a wired LAN through several access points.
This configuration is useful with portable or mobile stations because it enables them to be directly
connected to the wired network even while moving from one microcell domain to another. This process
is transparent, and the connection to the file server or host is maintained without disruption. The mobile
station stays connected to an access point as long as it can. However, when the transfer of data packets
needs to be retried or beacons are missed, the station automatically searches for and associates to another
access point. This process is referred to as seamless roaming.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-5
Safety information
Chapter 1 Product Overview and Installation
Figure 1-2Wireless Infrastructure with Workstations Accessing a Wired LAN
Access Point
(Root Unit)
Wired LAN
Access Point
(Root Unit)
Safety information
Follow the guidelines in this section to ensure proper operation and safe use of the client adapter.
FCC Safety Compliance Statement
The FCC, with its action in ET Docket 96-8, has adopted a safety standard for human exposure to RF
electromagnetic energy emitted by FCC-certified equipment. When used with approved Cisco Aironet
antennas, Cisco Aironet products meet the uncontrolled environmental limits found in OET-65 and ANSI
C95.1, 1991. Proper operation of this radio device according to the instructions in this publication will
result in user exposure substantially below the FCC recommended limits.
Safety Guidelines
•Do not touch or move the antenna while the unit is transmitting or receiving.
•Do not hold any component containing a radio such that the antenna is very close to or touching any
exposed parts of the body, especially the face or eyes, while transmitting.
65999
1-6
•Do not operate the radio or attempt to transmit data unless the antenna is connected; otherwise, the
radio may be damaged.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 1 Product Overview and Installation
•Use in specific environments:
–
The use of wireless devices in hazardous locations is limited to the constraints posed by the
safety directors of such environments.
–
The use of wireless devices on airplanes is governed by the Federal Aviation Administration
(FAA).
–
The use of wireless devices in hospitals is restricted to the limits set forth by each hospital.
Warnings
Observe the following warnings when operating the client adapter. The second warning pertains to the
PI21AG client adapter, and the third warning pertains to the CB21AG client adapter.
Unpacking the Client Adapter
Warning
Warning
Warning
Do not operate your wireless network device near unshielded blasting caps or in an explosive
environment unless the device has been modified to be especially qualified for such use.
In order to comply with FCC radio frequency (RF) exposure limits, antennas should be located at a
minimum of 7.9 inches (20 cm) or more from the body of all persons.
This device has been tested and complies with FCC RF Exposure (SAR) limits in typical laptop
computer configurations and this device can be used in desktop or laptop computers with side
mounted PC Card slots that can provide at least 0.394 in (1 cm) separation distance from the antenna
to the body of the user or a nearby person. Thin laptop computers may need special attention to
maintain antenna spacing while operating. This device cannot be used with handheld PDAs (personal
digital assistants). Use in other configurations may not ensure compliance with FCC RF exposure
guidelines. This device and its antenna must not be co-located or operated in conjunction with any
other antenna or transmitter.
Translated versions of these safety warnings are provided in Appendix B
Unpacking the Client Adapter
Follow these steps to unpack the client adapter:
Step 1Open the shipping container and carefully remove the contents.
Step 2Return all packing materials to the shipping container and save the container.
Step 3Ensure that all items listed in the “Package Contents” section below are included in the shipment. Check
each item for damage.
NoteIf any item is damaged or missing, notify your authorized Cisco sales representative.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-7
System Requirements
Package Contents
Each client adapter is shipped with the following items:
•1-dBi gain antenna permanently attached by a 6.6-ft (2-m) cable, antenna base, low-profile bracket,
two mounting screws, and two plastic wall anchors (PCI cards only)
•Quick Start Guide: Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG)
•Cisco Aironet 802.11a/b/g Wireless Adapters (CB21AG and PI21AG) CD
System Requirements
In addition to the items shipped with the client adapter, you also need the following items in order to
install and use the adapter:
•One of the following computing devices running Windows Vista.
–
Laptop or notebook computer equipped with a 32-bit Cardbus slot
–
Desktop personal computer equipped with an empty PCI expansion slot
Chapter 1 Product Overview and Installation
•Windows Vista Service Pack 1 or Windows Vista with hotfix KB932063 and hotfix KB935222
NoteYou must obtain these hotfix patches from the Microsoft site. You must also contact Microsoft
directly for any support that you need for these patches.
NoteThe client adapter software supports Windows Vista Business, Enterprise, and Ultimate
operating systems.
•1 GHz 32-bit (x86) or 64-bit (x64) processor.
•1 GB of system memory
•40 GB hard drive with at least 15 GB of available space
•The appropriate tools for removing your computer’s cover and expansion slot dust cover and for
mounting the antenna base (for PCI cards)
•If your wireless network uses EAP-TLS or PEAP authentication, Certificate Authority (CA) and
user certificates for EAP-TLS authentication or CA certificate for PEAP authentication
•If your wireless network uses PEAP (EAP-GTC) authentication with a One-Time Password (OTP)
user database:
1-8
–
A hardware token device from OTP vendors or the Secure Computing SofToken program
(version 2.1 or later)
–
Your hardware or software token password
•All necessary infrastructure devices (such as access points, servers, gateways, user databases, etc.)
must be properly configured for any authentication type you plan to enable on the client.
•The following information from your system administrator:
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 1 Product Overview and Installation
–
The logical name for your workstation (also referred to as client name)
–
The protocols necessary to bind to the client adapter, such as TCP/IP
–
The case-sensitive service set identifier (SSID) for your RF network
–
If your network setup does not include a DHCP server, the IP address, subnet mask, and default
gateway address of your computer
–
The wired equivalent privacy (WEP) keys of the access points with which your client adapter
will communicate, if your wireless network uses static WEP for security
–
The username and password for your network account
–
Protected access credentials (PAC) file if your wireless network uses EAP-FAST authentication
with manual PAC provisioning
Site Requirements
This section discusses the site requirements for both infrastructure and client devices.
Site Requirements
For Infrastructure Devices
Because of differences in component configuration, placement, and physical environment, every
network application is a unique installation. Therefore, before you install any wireless infrastructure
devices (such as access points, bridges, and base stations, which connect your client adapters to a wired
LAN), a site survey must be performed to determine the optimum placement of these devices to
maximize range, coverage, and network performance.
NoteInfrastructure devices are installed and initially configured prior to client devices.
For Client Devices
Because the client adapter is a radio device, it is susceptible to RF obstructions and common sources of
interference that can reduce throughput and range. Follow these guidelines to ensure the best possible
performance:
•Install the client adapter in an area where large steel structures such as shelving units, bookcases,
and filing cabinets will not obstruct radio signals to and from the client adapter.
•Install the client adapter away from microwave ovens. Microwave ovens operate on the same
frequency as the client adapter and can cause signal interference.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-9
Inserting the Client Adapter
Inserting the Client Adapter
This section provides instructions for inserting a PC-Cardbus card or PCI card into your computer.
CautionThese procedures and the physical connections they describe apply generally to conventional Cardbus
slots and PCI expansion slots. In cases of custom or nonconventional equipment, be alert to possible
differences in Cardbus slot and PCI expansion slot configurations.
Inserting a PC-Cardbus Card
Step 1Before you begin, examine the card. One end has a dual-row, 68-pin connector. The card is keyed so it
can be inserted only one way into the Cardbus slot.
NoteThe PC-Cardbus slot, if supported, is usually on the left or right side of a laptop computer,
depending on the model.
Chapter 1 Product Overview and Installation
Step 2Turn on your computer and let the operating system boot up completely.
Step 3Hold the card with the Cisco label facing up and insert it into the Cardbus slot, applying just enough
pressure to make sure it is fully seated (see
properly.
CautionDo not force the card into your computer’s Cardbus slot. Forcing it will damage both the card and the
slot. If the card does not insert easily, remove the card and reinsert it.
Figure 1-3Inserting a PC-Cardbus Card into a Computer
NoteThe configuration profiles for PC-Cardbus cards are tied to the slot in which the card is inserted.
Therefore, you must always insert your PC-Cardbus card into the same slot or create profiles for
both slots. See Chapter 4 for information on creating profiles for your client adapter.
Figure 1-3). The green LED lights when the card is inserted
32617
1-10
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 1 Product Overview and Installation
Step 4If the Found New Hardware Wizard window appears, click Cancel.
NoteIf you do not click Cancel, the wizard will attempt to install software for the client adapter but
will be unable to find it.
Step 5Go to the “Installing the Client Adapter Driver and Software” section on page 1-18.
Inserting a PCI Card
You must perform the following procedures in the order listed below to insert a PCI card:
•If required, change the bracket (see the “Changing the Bracket” section on page 1-11).
•Insert the card (see the “Inserting the Card” section on page 1-12).
•Assemble the antenna (see the “Assembling the Antenna” section on page 1-13).
•Mount the antenna (see the “Mounting the Antenna” section on page 1-14).
Inserting the Client Adapter
Changing the Bracket
The PCI card is shipped with a full-profile bracket attached. If the PC into which you are inserting the
PCI card requires the card to use a low-profile bracket, follow these steps to change brackets.
Step 1Remove the two screws that attach the bracket to the card. See Figure 1-4.
Figure 1-4Changing the PCI Card Bracket
ACTIVITY
STATUS
1
1
1
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Bracket screws
95581
1-11
Inserting the Client Adapter
Step 2Slide the bracket away from the card; then tilt the bracket to free the antenna cable.
CautionDo not pull on the antenna cable or detach it from the PCI card. The antenna is meant to be permanently
Step 3Hold the low-profile bracket to the card so that the LEDs slip through their corresponding holes on the
Step 4Insert the screws that you removed in Step 1into the holes on the populated side of the card near the
Inserting the Card
Step 1Turn off the PC and all its components.
attached to the card.
bracket.
bracket (see
Follow the steps below to insert a PCI card into your PC.
Figure 1-4) and tighten.
Chapter 1 Product Overview and Installation
Step 2Remove the computer cover.
NoteOn most Pentium PCs, PCI expansion slots are white. Refer to your PC documentation for slot
identification.
Step 3Remove the screw from the top of the CPU back panel above an empty PCI expansion slot. This screw
holds the metal bracket on the back panel.
CautionStatic electricity can damage your PCI card. Before removing the card from the anti-static packaging,
discharge static by touching a metal part of a grounded PC.
Step 4Locate an empty PCI expansion slot inside your computer.
Step 5Slip your card’s antenna through the opening near the empty expansion slot so that it is located outside
of the computer. See
Figure 1-5.
1-12
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 1 Product Overview and Installation
Figure 1-5Inserting a PCI Card into a PC
2
1
Inserting the Client Adapter
ACTIVITY
STATUS
3
ACTIVITY
STATUS
95582
1
2
3
Step 6Tilt the card to enable the LEDs to slip through the opening in the CPU back panel. See the enlarged
view in
Step 7Press the card into the empty slot until its connector is firmly seated.
CautionDo not force the card into the expansion slot; this could damage both the card and the slot. If the card
does not insert easily, remove it and reinsert it.
Step 8Reinstall the screw on the CPU back panel and replace the computer cover.
Assembling the Antenna
Follow the steps below to assemble the PCI card’s antenna.
Step 1Slide the antenna through the opening in the bottom of the antenna base.
Antenna cable
LEDs
Card edge connector
Figure 1-5.
Step 2Position the antenna so its notches are facing the Cisco label on the front of the base. See Figure 1-6.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-13
Inserting the Client Adapter
Figure 1-6Inserting the Antenna into Its Base
2
Chapter 1 Product Overview and Installation
1
3
1
2
3
Step 3Press the antenna cable into the receptacle on the top of the base as shown in Figure 1-6.
Step 4Press the antenna straight down into the receptacle until it clicks into place.
Mounting the Antenna
Because the PCI card is a radio device, it is susceptible to RF obstructions and common sources of
interference that can reduce throughput and range. Follow these guidelines to ensure the best possible
performance:
•Place the PCI card’s antenna in an area where large steel structures such as shelving units,
•Place the antenna away from microwave ovens and 2.4- and 5.8-GHz cordless phones. These
95584
Antenna
Notch
Antenna base
bookcases, and filing cabinets will not obstruct radio signals being transmitted or received.
products can cause signal interference because they operate in the same frequency range as the PCI
card.
1-14
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 1 Product Overview and Installation
Follow the steps below to position the PCI card’s antenna on a flat horizontal surface or to mount it to a
wall.
Step 1Perform one of the following:
•If you want to use the antenna on a flat horizontal surface, position the antenna so it is pointing
straight up. Then go to Step
•If you want to mount the antenna to a wall, go to Step 2.
Step 2Drill two holes in the wall that are 1.09 in. (2.8 cm) apart. Figure 1-7 shows the distance between the
mounting holes on the bottom of the antenna base.
Figure 1-7Bottom of Antenna Base
Inserting the Client Adapter
7.
1.09 inches
95597
Step 3Tap the two supplied wall anchors into the holes.
Step 4Drive the two supplied screws into the wall anchors, leaving a small gap between the screw head and the
anchor.
Step 5Position the mounting holes on the bottom of the antenna base over the screws (see Figure 1-8) and pull
down to lock in place.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-15
Inserting the Client Adapter
Figure 1-8Mounting the Antenna
Step 6The antenna rotates 90 degrees from its base. For optimal reception, position the antenna so it is pointing
straight up (see
Chapter 1 Product Overview and Installation
95595
Figure 1-9).
Figure 1-9Rotating the Antenna
95596
1-16
Step 7Boot up your PC.The green LED lights when the card is inserted properly.
Step 8If the Found New Hardware Wizard window appears, click Cancel.
Step 9Go to the “Installing the Client Adapter Driver and Software” section on page 1-18.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 1 Product Overview and Installation
Obtaining Client Adapter Software
The software is provided on the CD that shipped with your client adapter; however, Cisco recommends
retrieving it from Cisco.com to ensure that you have the latest version.
•To obtain the version of the software on the CD, open the FileList.txt file on the CD root directory.
•To obtain the version of the latest software on Cisco.com, follow these steps:
Step 1Make sure that you have a Cisco.com username and password.
Step 2If you do not have a Cisco.com username and password, go to Cisco’s main page (http://www.cisco.com)
and click Register (top). Follow the instructions to create a username and password.
Step 3Use your computer’s web browser to access the following URL:
Step 4http://www.cisco.com/public/sw-center/
Step 5Click Wireless Software.
Step 6Click Client Adapters and Client Software.
Step 7Click Cisco Aironet Wireless LAN Client Adapters.
Obtaining Client Adapter Software
Step 8Follow one of these steps:
Step 9If you are using a PC-Cardbus card, click Cisco Aironet 802.11a/b/g CardBus Wireless LAN Client
Adapter (CB21AG).
Step 10If you are using a PCI card, click Cisco Aironet 802.11a/b/g PCI Wireless LAN Client Adapter
(PI21AG).
Step 11When prompted, enter your Cisco.com username and password, and click OK.
Step 12Click Windows Vista.
Step 13Under Available Releases, determine whether the Install Wizard file on Cisco.com has a later version
number than the file on the CD. If it does, proceed to the next step. If it does not, use the Install Wizard
file on your CD.
Step 14Click the link with the latest release number.
Step 15Click the software file (WinClient-802.11a-b-g-Vista-Ins-Wizard-vxx.exe), where xx is the version
number.
Step 16Click the Download button.
Step 17Read and accept the terms and conditions of the Software License Agreement. Click Agree to accept the
terms and condition, or click Decline not to accept. Save the file to your device.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-17
Chapter 1 Product Overview and Installation
Installing the Client Adapter Driver and Software
Installing the Client Adapter Driver and Software
CautionDo not eject your client adapter at any time during the installation process, including during the reboot.
Follow these steps to use to install the client software on a device that is running Windows Vista.
Step 1Double-click WinClient-802.11a-b-g-Vista-Ins-Wizard-vxx.exe. A window appears that asks you if
you want to run the softward file.
Step 2Click Run. The Cisco Aironet Installation Program - InstallShield window appears (see Figure 1-10).
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
1-21
Installing the Client Adapter Driver and Software
Chapter 1 Product Overview and Installation
1-22
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
CHA PTER
2
Configuring Wireless Profiles
This chapter explains how to use the Microsoft Vista Network and Sharing Center to create and manage
profiles for your client adapter.
The following topics are covered in this chapter:
•Overview of Wireless Profiles, page 2-2
•Accessing Microsoft Vista Network and Sharing Center, page 2-2
•Creating a New Profile and Configuring Basic Settings, page 2-3
•Accessing a Profile That Was Created Previously, page 2-12
•Viewing and Changing the Settings of a Profile, page 2-13
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
2-1
Chapter 2 Configuring Wireless Profiles
Overview of Wireless Profiles
Overview of Wireless Profiles
A wireless profile is a set of of configuration parameters that you (or your network administrator) can
create and manage in the Microsoft Vista user interface. You can connect to a wireless network with the
profile, which includes the wireless network name, the network security type, the network encryption
type, and other feature configurations.
You can create several different profiles that enable you to connect to wireless networks in different
locations. For example, you might want to create and manage profiles that allow you to use your client
adapter at the office, at home, and in public areas, such as airport terminals. After the profiles are created,
you can switch between them without having to configure your client adapter each time you move to a
new location.
Accessing Microsoft Vista Network and Sharing Center
To create and manage wireless profiles, you must access the Microsoft Vista Network and Sharing
Center.
To access the Network and Sharing Center window, follow these steps:
Step 1Double-click the networking icon (two computer monitors) in the system tray at the bottom right corner
of the screen. A small dialog box appears (see
Figure 2-1Networking Icon in System Tray
Step 2Click Network and Sharing Center. The Network and Sharing window appears (see Figure 2-2).
Figure 2-1).
2-2
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
Figure 2-2Network and Sharing Center Window
Creating a New Profile and Configuring Basic Settings
Step 3To set up a wireless profile, click Set up a connection or network in the Tasks area.
NoteYou can also access the Network and Sharing Center by choosing Start > Control Panel > Network
and Sharing Center.
Creating a New Profile and Configuring Basic Settings
To create a wireless profile, follow these steps:
Step 1Open the Network and Sharing Center window (see the “Accessing Microsoft Vista Network and Sharing
Center” section on page 2-2).
Step 2Click Set up a connection or network in the Tasks area. The Set up a connection or network dialog box
appears (see
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Figure 2-3).
2-3
Creating a New Profile and Configuring Basic Settings
Figure 2-3Set up a connection or network Dialog Box
Chapter 2 Configuring Wireless Profiles
Step 3In the Choose a connection option area, click Manually connect to a wireless network.
Step 4Click Next. A Manually connect to a wireless network dialog box appears (see Figure 2-4.)
Step 5From the Choose a wireless adapter drop-down list, choose the option for the
Cisco
Aironet 802.11a/b/g Wireless Adapter (see Figure 2-4).
NoteClient adapters might not be easy to identify in the Choose a wireless adapter drop-down list
because the adapters might be generically named (for example, Wireless Network Connection
or Wireless Network Connection 2). If you have multiple client adapters on your device, choose
Network and Sharing Center > Manage network connections. In the Views drop-down list,
choose Details to see which generic name corresponds with which client adapter. When you
view the details of available network connections, the client adapter is identified in the Device
Name column.
2-4
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
Figure 2-4Manually connect to a wireless network Dialog Box—Choose a wireless adapter
Creating a New Profile and Configuring Basic Settings
Step 6Click Next. Another Manually connect to a wireless network dialog box appears (see Figure 2-5).
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
2-5
Creating a New Profile and Configuring Basic Settings
Figure 2-5Manually connect to a wireless network Dialog Box—Enter information for the
wireless network you want to add
Chapter 2 Configuring Wireless Profiles
Step 7In this dialog box, enter information for the wireless network that you want to add.Ta ble 2-1 lists and
describes general settings for the profile. Follow the instructions in the table to configure these settings.
2-6
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
Ta b l e 2-1Profile Management General Settings
SettingWhat to Enter
Network nameEnter the service set identifier (SSID). The network name and the SSID
Security typeFrom the Security type drop-down list, choose the method that is used
Creating a New Profile and Configuring Basic Settings
are the same.
Range: The network consists of 1 to 32 case-sensitive characters.
Default: A blank field
to secure a connection to the wireless network. The choices are the
following:
•No authentication (Open)—Open system authentication with no
encryption
•WEP (also called Shared)—Open system authentication with
Wired Equivalent Privacy (WEP)
•WPA2-Personal—Wi-Fi Protected Access 2 (WPA2)
authentication with a preshared key (designed for networks without
a RADIUS infrastructure)
•WPA-Personal—WPA with a preshared key (designed for networks
without a RADIUS infrastructure)
•WPA2-Enterprise—802.1X authentication (designed for medium
and large infrastructure mode networks)
•WPA-Enterprise—802.1X authentication (designed for medium
and large infrastructure mode networks)
•802.1x—802.1X authentication with WEP (also known as dynamic
WEP).
•CCKM—Cisco Centralized Key Management
For more information about these security types, see the “Security and
Encryption Types” section on page 2-10.
Default: None. You must choose a security type to create a wireless
profile.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
2-7
Creating a New Profile and Configuring Basic Settings
Table 2-1Profile Management General Settings (continued)
SettingWhat to Enter
Encryption typeEncryption choices are determined by the security type that you choose.
Chapter 2 Configuring Wireless Profiles
From the Encryption type drop-down list, choose an available method.
The choices are the following:
•If you choose No authentication (Open), your encryption choice is
None.
•If you choose WEP, your only encryption choice is WEP.
•If you choose WPA2-Personal, you can choose AES or TKIP.
•If you choose WPA-Personal, you can choose AES or TKIP.
•If you choose WPA2-Enterprise, your encryption choice is AES,
TKIP, AES (MFP), or TKIP (MFP).
•If you choose WPA-Enterprise, your encryption choice is AES or
TKIP.
•If you choose 802.1x, your only encryption choice is WEP.
•If you choose CCKM, your encryption choices are WEP, AES, and
TKIP.
For more information about these encryption types, see the “Security
and Encryption Types” section on page 2-10.
Default: The default that appear in the Encryption type drop-down list
is determined by what you selected in the Security type drop-down list.
Security Key/Passphrase •If you choose No authentication (Open), a Security Key/Passphrase
is not necessary.
•If you choose the WEP security type, enter the WEP key.
•If you choose the WPA2-Personal security type, enter the WPA2
preshared key.
•If you choose the WPA-Personal security type, enter the WPA
preshared key.
•For the WPA2-Enterprise and WPA-Enterprise security types, see
Chapter 3, “Configuring EAP Types.” The enterprise network EAP
type determines the credentials that the client adapter must use for
authentication.
•If you choose the 802.1x security type, a Security Key/Passphrase
is not necessary.
NoteContact the wireless network administrator for the network
WEP key, the WPA2-Personal preshared key, or the
WPA-Personal preshared key.
Display charactersCheck this check box if you want to view the characters that you enter
into the Security Key/Passphrase field. If you do not check this check
box, the key or passphrase that you enter appears as black dots.
2-8
Default: Not checked.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
Table 2-1Profile Management General Settings (continued)
SettingWhat to Enter
Start this connection
automatically
Connect even if the network
is not broadcasting
Step 8After you enter all required settings, click Next. Another Manually connect to a wireless network dialog
box appears (see
Creating a New Profile and Configuring Basic Settings
Check this check box if you want the device to connect automatically
whenever the wireless network is in range. If you do not check this
check box, you must manually connect to this wireless network from
the Connect to a network dialog box, which you can access through the
Network and Sharing Center.
Default: For the No authentication (Open) security type, this check box
is unchecked. For all other security types, this check box is checked.
Check this check box if you want the device to attempt to connect even
if the wireless network is not broadcasting its name.
Default: Not checked.
Figure 2-6).
Figure 2-6Manually connect to a wireless network Dialog Box—Successfully added
<network
name>
Step 9Click Connect to to connect to a wireless network, including the one for which you have created a
profile. Or click Change connection settings to change the profile settings. See the
Changing the Settings of a Profile” section on page 2-13 for more information.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
“Viewing and
2-9
Security and Encryption Types
Security and Encryption Types
The dialog box in Figure 2-5 includes the settings that allow you to configure how the client adapter
associates to an access point, authenticates to a wireless network, and encrypts and decrypts data. The
following sections provide explanations of options that are available in the Security type drop-down list,
the Encryption type drop-down list, and the Security Key/Passphrase field of this dialog box.
WEP (Shared) Security with Static WEP Keys
You can protect your data as it is transmitted through your wireless network by encrypting it through the
use of wired equivalent privacy (WEP) encryption keys. With WEP encryption, the transmitting device
encrypts each packet with a WEP key, and the receiving device uses that same key to decrypt each
packet.
The WEP keys used to encrypt and decrypt transmitted data can be statically associated with your client
adapter. Static WEP keys are either 40 or 128 bits in length. 128-bit WEP keys offer more security than
40-bit WEP keys.
Each profile can be assigned a static WEP keys. If the device receives a packet that is not encrypted with
the appropriate key (as the WEP keys of all devices that are to communicate with each other must match),
the device discards the packet and never delivers it to the intended receiver.
Chapter 2 Configuring Wireless Profiles
You do not need to re-enter the static WEP key each time the client adapter is inserted or the Windows
device is rebooted because the key is stored (in an encrypted format for security reasons) in the Windows
profile store.
You can obtain a static WEP key from your network administrator.
NoteWEP encryption is not considered safe enough for today’s wireless networks. We do not recommend that
you use it in enterprise wireless networks.
WPA and WPA2
Wi-Fi Protected Access (WPA) and WPA2 are standards-based security solutions from the Wi-Fi
Alliance that provide data protection and access control for wireless LAN systems. WPA is compatible
with the IEEE 802.11i standard but was implemented prior to the standard’s ratification; WPA2 is the
Wi-Fi Alliance’s implementation of the ratified IEEE 802.11i standard.
WPA and WPA2 can use Temporal Key Integrity Protocol (TKIP) and message integrity check (MIC)
for data protection or the stronger Advanced Encryption Standard encryption algorithm using Counter
Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP). Both WPA
and WPA2 use 802.1X for authenticated key management.
Both WPA and WPA2 support two mutually exclusive key management types: WPA/WPA2 and
WPA/WPA2 passphrase (also known as WPA pre-shared key or WPA-PSK). Using WPA or WPA2,
clients and the authentication server authenticate to each other using an EAP authentication method, and
the client and server generate a pairwise master key (PMK). The server generates the PMK dynamically
and passes it to the access point. Using WPA or WPA2 passphrase, however, you configure a passphrase
(or pre-shared key) on both the client and the access point, and that passphrase is used as the PMK.
2-10
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
•WPA2 -Personal—WPA2 authentication with a preshared key. WPA2-Personal is suitable for
environments without a Remote Authentication Dial-In User Service (RADIUS) infrastructure (for
example, a small office or ho me o ffice network). W PA2-Personal supports the u s e of a p re share d
key (PSK).Obtain the preshared key from your system admi nistrator. When you choose
WPA2 -Personal as you r secur ity type, your encryptio n type is TKIP or A ES.
•WPA-Personal—WPA with a preshared key. Like WPA2-Perso nal, W PA-Personal is suitable for
environments without a RA DIU S infr astr uc ture . Ob tain t he pr e share d key from yo ur syste m
administrator. When you choose WPA-Personal as your security type, your encryption type is TKIP
or AES.
•WPA2 -Enterprise—WPA2 -Enterprise requires authentication in two phases: the first is an open
system authenticatio n, and th e second use s 802.1X wi th an Exten sible A uthent ication Prot ocol
(EAP) authentication method. See chapter Chapter 3, “ Configuring E AP Types,” for more
information about supp orted EAP me thods. Whe n you choose WPA2-Enterprise as your security
type, your encr ypt ion typ e is T KI P o r AE S.
•WPA-Enterprise—WP A-Enterprise also uses 802.1X authentication and is designed for medium and
large infrastructure mode networks. See chapter for more information about supported EAP
methods. When you cho ose WPA-Enterprise as you securi ty type , yo ur e ncry ptio n type is TKIP o r
AES.
Security and Encryption Types
802.1X with Dynamic WEP Keys
The standard for wirel ess LAN se curity, as defined by IEEE, is called 802.1X f or 80 2.11 , or simply
802.1X. An acc ess poi nt tha t sup port s 80 2.1X and it s pr otocol , E xten sibl e A uthe nticat ion Proto col
(EAP), acts as the interface between a wireless client and an authentication server, such as a RADIUS
server, to which the access point communicates over the wired network.
Dynamic WEP ke ys are cr eated as part o f the EAP aut hentication process. Dynamic WEP keys with EAP
offer a higher degree of security than static WEP keys.
When you choose t he 8 02. 1X w it h WEP e ncryp tion , you can con figure t he pro file to use five different
authentication me thods of dy na mic WEP key cre ation :
•Smart Card or other certificate—for more information about smart cards and other certification
NoteFor more inform ation about EAP a uthenti cation me thods, see Cha pter 3, “Configuring EAP Types.”
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
2-11
Accessing a Profile That Was Created Previously
CCKM Fast Secure Roaming
Some applications that run on a client device may require fast roaming between access points. Voice
applications, for example, require it to prevent delays and gaps in conversation. CCKM fast secure
roaming is enabled automatically for CB21AG and PI21AG clients using WPA/WPA2/CCKM with
LEAP, EAP-FAST, EAP-TLS, PEAP (EAP-GTC), or PEAP (EAP-MSCHAP V2). However, this feature
must be enabled on the access point.
During normal operation, EAP-enabled clients mutually authenticate with a new access point by
performing a complete EAP authentication, including communication with the main RADIUS server.
However, when you configure your wireless LAN for CCKM fast secure roaming, EAP-enabled clients
securely roam from one access point to another without the need to reauthenticate with the RADIUS
server. Using Cisco Centralized Key Management (CCKM), an access point that is configured for
wireless domain services (WDS) uses a fast rekeying technique that enables Cisco client devices to roam
from one access point to another typically in under 150 milliseconds (ms). CCKM fast secure roaming
ensures that there is no perceptible delay in time-sensitive applications such as wireless Voice over IP
(VoIP), enterprise resource planning (ERP), or Citrix-based solutions.
Chapter 2 Configuring Wireless Profiles
Accessing a Profile That Was Created Previously
After you have created a profile and configured its basic settings (see the “Creating a New Profile and
Configuring Basic Settings” section on page 2-3), you can change the settings by accessing the
properties of the profile.
To access the profile, follow these steps:
Step 1Open the Network and Sharing Center (see the “Accessing Microsoft Vista Network and Sharing Center”
section on page 2-2).
Step 2In the Network and Sharing window (see Figure 2-7), click Manage wireless networks in the Tasks
area.
2-12
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
Figure 2-7Network and Sharing Center Window
Viewing and Changing the Settings of a Profile
Step 3In the Manage wireless networks window that appears, double-click the profile that contains the settings
that you want to change. A Wireless Network properties dialog box appears (see Figure 2-8). See the
“Viewing and Changing the Settings of a Profile” section on page 2-13 for information about modifying
the profile that you have selected.
Viewing and Changing the Settings of a Profile
To access a profile whose settings you want to view or change, follow the procedure in the “Accessing
a Profile That Was Created Previously” section on page 2-12. To view or change the settings of a profile,
follow these steps:
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
2-13
Viewing and Changing the Settings of a Profile
Step 1In the Connection tab of the Wireless Network properties dialog box (see Figure 2-8), view the wireless
network’s Name, SSID (service set identifier), Network Type (for example, Access point for an
infrastructure-mode network), and the Network Availability (specifies the availability for types of users).
You cannot change these settings in this dialog box.
Step 2In the Connection tab, check or uncheck the check boxes that are available. Table 2-2 lists and describes
these check boxes. Follow the instructions in the table to configure these settings.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
Ta b l e 2-2Profile Management General Settings
SettingWhat to Enter
Connect automatically when
this network is in range
Connect to a more preferred
network if available.
Connect even if the network
is not broadcasting
Enable Cisco connection
settings
Viewing and Changing the Settings of a Profile
Check this check box if you want the device to connect automatically
whenever the wireless network is in range. If you do not check this
check box, you must manually connect to this wireless network from
the Connect to a network dialog box, which you can access through the
Network and Sharing Center.
NoteYou configured this setting when you first created the wireless
profile. See the Start this connection automatically check box
in
Table 2-1 on page 2-7.
Check this check box to connect to a wireless network that you prefer
more than the wireless network specified in this profile. To designate
the order in which your profiles connect when more than one network
is available, Choose Control Panel > Manage Wireless Networks.
You can order your wireless profiles in this window.
Check this check box if you want the device to attempt to connect even
if the wireless network is not broadcasting its name.
NoteYou configured this setting when you first created the wireless
profile. See the Connect even if the network is not broadcasting
check box in
Check this check box to view, configure, and enable Radio
Measurement and Advanced Roaming. When you check the Enable Cisco connection settings check box, the Configure button is no longer
dimmed. Click on the Configure Button to open the Cisco Connection
Settings dialog box. See the
page 2-18 and the “Advanced Roaming Setting” section on page 2-19
for more information about these Cisco connection settings.
Table 2-1 on page 2-7.
“Radio Measurement” section on
Step 3Click the Security tab to change security settings. The security settings on the Security tab appear (see
Figure 2-9).
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
Step 4In this dialog box, configure security settings that are available for this profile. Table 2-3 lists and
describes security settings. Follow the instructions in the table to configure these settings.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
Ta b l e 2-3Profile Management General Settings
SettingWhat to Enter
Security typeFrom Security type drop-down list, choose the method that is used to
Encryption typeEncryption choices are determined by the security type that you choose.
Viewing and Changing the Settings of a Profile
authenticate a connection to the wireless network. The choices are the
following:
•No authentication (Open)
•Shared
•WPA2-Personal
•WPA-Personal
•WPA2-Enterprise
•WPA-Enterprise
•802.1X
•CCKM
From the Encryption type drop-down list, choose an available method.
The choices are the following:
•If you choose No authentication (Open), your encryption choice is
None or WEP.
•If you choose Shared, your only encryption choice is WEP.
•If you choose WPA2-Personal you can choose AES or TKIP.
•If you choose WPA-Personal, you can choose AES or TKIP.
•If you choose, WPA2-Enterprise, you can choose AES, TKIP, AES
(MFP), TKIP (MFP).
•If you choose WPA-Enterprise, you can choose AES or TKIP.
•If you choose 802.1x, your only encryption choice is WEP.
•If you choose CCKM, you can choose AES, WEP, or TKIP.
Network security keyEnter the network security key that you obtain from the network
administrator.
NoteThe Network security key field only appears when you choose
No authentication (Open) with WEP encryption, Shared,
WPA2-Personal, or WPA-Personal as the security type.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
2-17
Viewing and Changing the Settings of a Profile
Table 2-3Profile Management General Settings (continued)
SettingWhat to Enter
Choose a network
authentication method
Chapter 2 Configuring Wireless Profiles
From the Choose a network authentication method drop-down list,
choose an authentication method. The choices are the following:
•Smart Card or other certificate
•Protected EAP (PEAP)
•LEAP
•PEAP-GTC
•EAP-FAST
NoteSmart Card and Protected EAP (PEAP) are provided by
Microsoft. These methods were not tested by Cisco on the
CB21AG or the PI21AG client adapter.
NoteThe Choose a network authentication method drop-down list
appears only when you choose WPA2-Enterprise,
WPA-Enterprise, 802.1X, or CCKM as the security type.
Cache user information for
subsequent connections to
this network
Radio Measurement
You can enable or disable the radio measurement feature in the Cisco Connection Settings dialog box,
which is available from the profile’s Connection tab in the Wireless Network properties dialog box (see
Step 2 in the “Viewing and Changing the Settings of a Profile” section on page 2-13 to get to the Cisco
Connection Settings dialog box).
When you check the Enable Radio Measurement check box, the radio measurement feature is enabled.
The client driver advertises support for the Cisco wireless LAN radio measurement feature by including
a radio measurement information element when the client associates with the access point. The client
can then service radio measurement requests that the network infrastructure sends.
NoteAfter you choose the network authentication method, click the
Settings button to configure the authentication methods. For
more information about the authentication method settings, see
the EAP-FAST, PEAP-GTC, and LEAP administrator guides.
Check this check box if you want user information stored for later
connections through this profile to the network.
NoteThe Cache user information for subsequent connections to this
network check box appears only when you choose
WPA2-Enterprise, WPA-Enterprise, 802.1X, or CCKM as the
security type. These security types rely on a network
authentication method that requires user credentials.
2-18
When you uncheck the Enable Radio Measurement check box, the client does not advertise the radio
measurement information element. The client cannot service radio measurement requests that the
network infrastructure sends.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 2 Configuring Wireless Profiles
Advanced Roaming Setting
You can enable or disable the advanced roaming feature in the Cisco Connection Settings dialog box,
which is available from the profile’s Connection tab in the Wireless Network properties dialog box (see
Step 2 in the “Viewing and Changing the Settings of a Profile” section on page 2-13 to get to the Cisco
Connection Settings dialog box).
Check the Enable Advanced Roaming Setting check box to enable the advanced roaming feature.
Uncheck the check box to disable the feature.
You can choose from five roaming policies to meet the needs of your wireless network. The roaming
policy is the level of aggressiveness for roaming. From the Roaming Option drop-down list, choose
roaming policy:
•Ve r y L ow —Roaming aggressiveness is very low. The client maintains connection with the current
access point until its RSSI and transmit rate drop to the values where it may loose connection. The
client roams to another access point only when it might loose connection with the current access
point. This roaming policy prioritizes connection to the current AP rather than performance. This
policy is best suited for environments in which only one access point is present.
•Low—Roaming aggressiveness is low . The client maintains co nnection with the curr ent access point
until its RSSI and transmit rate drop to values where performance is heavily degraded. This policy
is best suited for en viron me nts i n whic h a ccess poi nts are dist rib uted sp arsel y.
Viewing and Changing the Settings of a Profile
•Normal—Roaming aggressiveness is norma l. The c lient main tains conne ction wit h the curr ent
access point until its RSSI and transmit rate drop to values where performance is degraded. This
policy gives balanced priorities to roaming aggressiveness and performance.
•High—Roaming aggressiveness is high . The RSSI and rate thr esholds are set to high values to
increase the aggressiveness of roaming. This policy is best suited for environments in which many
access points are closely distributed and in which the user moves around at a faster pace.
•Very High—Roaming aggressiveness is very high. The RSSI and rate thresholds are set to values
that give the best performance. This policy is best suited for environments in which multiple access
points are present and in which the user can switch to the best performing access points at any time.
•Default—The default roaming policy is Normal. This roaming policy is set in the client driver.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
2-19
Viewing and Changing the Settings of a Profile
Chapter 2 Configuring Wireless Profiles
2-20
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
CHA PTER
3
Configuring EAP Types
This chapter explains the EAP types that are used for authenication to wireless networks.
The following topics are covered:
•Overview of EAP-FAST, page 3-1
•How EAP-FAST Works, page 3-2
•Configuring EAP-FAST, page 3-4
•Overview of LEAP, page 3-17
•How LEAP Works, page 3-17
•Configuring LEAP, page 3-18
•Overview of PEAP-GTC, page 3-21
•How PEAP-GTC Works, page 3-22
•Configuring PEAP-GTC, page 3-23
Overview of EAP-FAST
NoteFor additional information about EAP-FAST, see RFC4851.
EAP-FAST is an EAP method that enables secure communication between a client and an authentication
server by using Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within the
tunnel, data in the form of type, length, and value (TLV) objects are used to send further
authentication-related data between the client and the authentication server.
EAP-FAST supports the TLS extension as defined in RFC 4507 to support the fast re-establishment of
the secure tunnel without having to maintain per-session state on the server. EAP-FAST-based
mechanisms are defined to provision the credentials for the TLS extension. These credentials are called
Protected Access Credentials (PACs).
EAP-FAST provides the following:
•Mutual authentication
An EAP server must be able to verify the identity and authenticity of the client, and the client must
be able to verify the authenticity of the EAP server.
•Immunity to passive dictionary attacks
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-1
How EAP-FAST Works
Chapter 3 Configuring EAP Types
Many authentication protocols require a password to be explicitly provided (either as cleartext or
hashed) by the client to the EAP server. The communication of the weak credential (such as a
password) must be immune from eavesdropping.
•Immunity to man-in-the-middle (MitM) attacks
In establishing a mutually authenticated protected tunnel, the protocol must prevent adversaries
from successfully interjecting information into the communication between the client and the EAP
server.
•Flexibility to enable support for most password authentication interfaces
Many different password interfaces exist to authenticate a client—for example, Microsoft Challenge
Handshake Authentication Protocol (MS-CHAP), Lightweight Directory Access Protocol (LDAP),
and One-Time Password (OTP). EAP-FAST provides support for these different password types.
•Efficiency in computational and power resources
Especially when using wireless media, clients have limited computational and power resources.
EAP-FAST enables network access communication to occur in a more efficient manner.
•Flexibility to extend the communications inside the tunnel
Because network infrastructures are becoming increasingly complex, authentication, authorization,
and accounting is also becoming more complex. For example, there are instances in which multiple
existing authentication protocols are required to achieve mutual authentication. Also, different
protected conversations might be required to achieve the proper authorization when a client has
successfully authenticated.
•Minimize authentication server requirements for per-user authentication
With large deployments, it is typical to have several servers that act as authentication servers for
several clients. A client uses the same shared secret to secure a tunnel in much the same way that is
uses a username and password to gain access to the network. EAP-FAST facilitates the use of a
single strong shared secret by the client, while enabling the authentication servers to minimize the
per-user and device state that they must cache and manage.
How EAP-FAST Works
The following sections describe how EAP-FAST works:
•Two-Phase Tunneled Authentication, page 3-2
•Protected Access Credentials, page 3-3
•Server Certificate Validation, page 3-3
Two-Phase Tunneled Authentication
EAP-FAST uses a two-phase tunneled authentication process.
In the first phase of authentication, EAP-FAST employs the TLS handshake to provide an authenticated
key exchange and to establish a protected tunnel between the client and the authentication server. The
tunnel protects client identity information from disclosure outside the tunnel. During this phase, the
client and the server engage in EAP-FAST version negotiation to ensure that they are using a compatible
version of the protocol.
3-2
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
After the tunnel is established, the second phase of authentication begins. The client and server
communicate further to establish the required authentication and authorization policies. This phase
consists of a series of requests and responses that are encapsulated in TLV objects. The TLV exchange
includes the EAP method to be used within the protected tunnel. For more information about TLV
objects and format, see section 4.2 of RFC
The EAP-FAST module offers a variety of EAP-FAST configuration options, including whether
automatic or manual PAC provisioning is used to establish a tunnel, whether or not server certificate is
used to establish a tunnel, what type of user credentials to use for authentication and provisioning, and
what type of authentication method to use to in the established tunnel.
Protected Access Credentials
Protected Access Credentials (PACs) are credentials that are distributed to clients for optimized network
authentication. PACs can be used to establish an authentication tunnel between the client and the
authentication server (the first phase of authentication as described in the
Authentication” section on page 3-2). A PAC consists of, at most, three components: a shared secret, an
opaque element, and other information.
The shared secret component contains the pre-shared key between the client and authentication server.
Called the PAC-Key, this pre-shared key establishes the tunnel in the first phase of authentication.
How EAP-FAST Works
4851.
“Two-Phase Tunneled
The opaque component is provided to the client and is presented to the authentication server when the
client wants to obtain access to network resources. Called the PAC-Opaque, this component is a variable
length field that is sent to the authentication server during tunnel establishment. The EAP server
interprets the PAC-Opaque to obtain the required information to validate the client's identity and
authentication. The PAC-Opaque includes the PAC-Key and may contain the PAC's client identity.
The PAC might contain other information. Called PAC-Info, this component is a variable length field
that is used to provide, at a minimum, the authority identity of the PAC issuer (the server that created the
PAC). Other useful but not mandatory information, such as the PAC-Key lifetime, can also be conveyed
by the PAC-issuing server to the client during PAC provisioning or refreshment.
PACs are created and issued by a PAC authority, such as Cisco Secure ACS, and are identified by an ID.
A user obtains his or her own copy of a PAC from a server, and the ID links the PAC to a profile.
Persistent PACs, such as machine PACs, are stored in the EAP-FAST registry and encrypted. These PACs
are also protected with access control lists (ACLs) so only designated users (the owners of the PACs)
and members of privileged user groups (for example, administrators) can access them. Machine PACs
are stored globally so that all users of a machine can use the PACs.
All PACs are encrypted and tied to the host machine with Microsoft Crypto API (CryptoProtectData).
PACs cannot be copied and used on other machines.
All non-persistent PACs, such as User Authorization PACs, are stored in volatile memory and do not
persist after reboot or after a user has logged off.
Server Certificate Validation
As a part of TLS negotiation in the first phase of EAP-FAST authentication, the authentication server
presents the client with a certificate. The client must verify the validity of the EAP server certificate and
also examines the EAP server name that is presented in order to determine if the server can be trusted.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-3
Configuring EAP-FAST
Configuring EAP-FAST
This section explains how to configure EAP-FAST module settings, such as connection settings, user
credentials, and authentication methods. The following topics are covered:
•Accessing EAP-FAST Properties for Configuration, page 3-4
•Configuring EAP-FAST Settings in the Connection Tab, page 3-5
•Configuring EAP-FAST Settings in the User Credentials Tab, page 3-10
•Configuring EAP-FAST Settings in the Authentication Tab, page 3-13
•Finding the Version of the EAP-FAST Module, page 3-16
Accessing EAP-FAST Properties for Configuration
To access the EAP-FAST Properties window, perform the following steps:
Step 1Click the Start button on the lower-left corner of the desktop.
Chapter 3 Configuring EAP Types
Step 2From the right pane, right-click Network.
Step 3Select Properties.
Step 4From the left pane, select Manage wireless networks.
Step 5Double-click the wireless network.
Step 6From the Wireless Network properties window, select the Security tab (see Figure 3-1).
3-4
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Figure 3-1Wireless Network Properties Window
Configuring EAP-FAST
Step 7Select Cisco EAP-FAST from the "Choose a network authentication method" drop down list.
Step 8Click the Settings button.
Step 9Click the Connection tab, the User Credentials tab, the Authentication tab, or the About tab. For more
information about configuring settings in those tabs, see the
“Configuring EAP-FAST Settings in the
Connection Tab” section on page 3-5, the “Configuring EAP-FAST Settings in the User Credentials Tab”
section on page 3-10, and the “Configuring EAP-FAST Settings in the Authentication Tab” section on
page 3-13. For information about finding the version of the module on the device, see the “Finding the
Version of the EAP-FAST Module” section on page 3-16.
Configuring EAP-FAST Settings in the Connection Tab
The EAP-FAST Connection tab includes settings for the establishment of an outer Transport Layer
Security (TLS) tunnel. Settings include identity protection, the use of a Protected Access Credential
(PAC), PAC provisioning, the use of authenticated server certificates to establish the tunnel, and the use
of a Trusted Root Certificate Authority (CA) from a list of Trusted Root CA certificates.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-5
Configuring EAP-FAST
Chapter 3 Configuring EAP Types
You can configure connection settings from the Connection tab (see Figure 3-2).
Figure 3-2Connection Tab in EAP-FAST Properties Window
3-6
Table 3-2 lists and describes all connection settings.
Ta b l e 3-1Connection Settings
Connection SettingsDescription
Use anonymous outer identityCheck this box to enable identity privacy protection.
Default: On
Outer identity fieldEnter an outer identity if the Use anonymous outer identity check box
is checked. Follow an administrator’s instructions, or follow
RFC
4282 for guidelines about what to enter in the outer identity
field.
Default: anonymous
NoteThe maximum number of characters allowed in this field
is
256.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Table 3-1Connection Settings (continued)
Connection SettingsDescription
Use Protected Access
Credential (PAC)
Allow automatic PAC
provisioning
Configuring EAP-FAST
Check this box to enable the use of a PAC to establish a tunnel. When
this box is checked, PAC provisioning is requested. If this box is not
checked, EAP-FAST acts as PEAP and uses only the authenticated
server certificate to establish the tunnel every time.
The PAC is a unique shared credential used to mutually authenticate
a client and a server. The PAC is associated with a specific client
username and a server authority ID. A PAC removes the need for PKI
and digital certificates. The PAC is distributed or imported to the
client automatically or manually.
Manual PAC provisioning generates the PAC file locally on the AAA
or EAP-FAST server. With manual provisioning, the user credentials
are supplied to the server to generate the PAC file for that user. This
PAC must then be manually installed on the client device.
Default: On
Check this box to enable the automatic retrieval of a PAC during
EAP-FAST authentication.
Automatic PAC provisioning enables the automatic retrieval of a PAC
during EAP-FAST authentication. Automatic PAC provisioning uses
TLS with a Diffie-Hellman Key Agreement protocol to establish a
secure tunnel. In addition, MSCHAPv2 is used to authenticate the
client and for early man-in-the-middle (MITM) attack detection.
Default: On
PAC AuthoritySelect a PAC authority from the drop-down list.
Default: None
NoteThe drop-down list contains the names of all of the PAC
authorities from which you have previously provisioned a
tunnel PAC. If you have not provisioned a PAC, then "none"
is the only option. You can also select "none" to force the host
to request provisioning a PAC.
ImportClick the Import button to manually import a PAC file. When you
click on this button, the Import Protected Access Credentials (PAC)
File window appears. If you need to enter a password for the PAC file
that you have selected, a password window will appear.
After you have selected and imported a valid PAC file, the PAC
authority is added to the PAC authority drop-down list.
Default: Enabled
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-7
Configuring EAP-FAST
Chapter 3 Configuring EAP Types
Table 3-1Connection Settings (continued)
Connection SettingsDescription
Validate server certificateCheck this box to use an authenticated server certificate to establish
a tunnel. You can check both the Use Protected Access Credentials (PAC) box and the Validate Server Certificate box at the same time.
If both are checked, you can select one or more Trusted Root CA
certificates from the list of trusted Certificate Authority certificates
that are installed on the host system.
The EAP-FAST module always tries to use the PAC first if both check
boxes are checked. The module uses the server certifcate if the PAC
is missing or rejected by the server.
If both check boxes are unchecked, EAP-FAST functions as PEAP
does without validating server certificate. We do not recommend
leaving both boxes unchecked because the module bypasses
fundamental trust validation.
Default: Off
Connect to only these serversCheck this box to enter an optional server name that must match the
server certificate that is presented by the server. You can enter
multiple server names; separate multiple server names with
semicolons. The EAP-FAST module only allows connections to
continue without prompting if the subject field (CN) in the server
certificate matches the server names that you enter in this field.
Default: Off
NoteYou can use an asterisk (*) as a wildcard character in server
names only if the asterisk appears before the first period (.) in
the name.domain.com format. For example, “*.cisco.com”
matches any server name that ends with “.cisco.com.” If you
put an asterisk anywhere else in the server name, it is not
treated as a wildcard character.
Trusted Root CASelect one of more Trusted Root CA certificates from the list of
certificates that are installed on the system. Only trusted CA
certificates that are installed on the host system are displayed in the
drop-down list.
To view details about the selected Trusted Root CA certificate,
double-click the certificate name. Double-clicking the certificate
name opens the Windows certificate property screen, where
certificate details are available.
Default: None
Do not prompt user to authorize
new servers or trusted
certificate authorities.
Check this box if you do not want the user to be prompted to authorize
a connection when the server name does not match or the server
certificate is not signed by one of the Trusted Root CA certiticates
that was selected. If this box is checked, the authentication fails.
Default: Off
3-8
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Overview of the User Credentials Tab
The EAP-FAST module supports the use of both a client certificate and a username and password as user
credentials for authentication and provisioning.
Client Certificates
If a client certificate is used, the EAP-FAST module automatically obtains the client certificate from the
Windows certificate store of the current user. The EAP-FAST module finds the user certificate that
matches the username of the user who is logged on. The certificate cannot be expired.
If multiple user certificates are available, the EAP-FAST module prompts the user to select one, and that
selection is saved to the profile. By default, the user certificate is sent securely through TLS
renegotiation or through the EAP-TLS inner method in the protected TLS tunnel. If the EAP-FAST
server does not start TLS renegotiation to request the client certificate after the tunnel is established, then
the EAP-FAST module sends the certificate through the EAP-TLS inner method.
The EAP-FAST module administrator can configure the EAP-FAST module XML schema to send the
user certificate without using these security measures.
Configuring EAP-FAST
Usernames and Passwords
If a username and password are used, the user provide one of the following types of username and
password:
•Windows username and password—The Windows username and password are used as network
access credentials. The user is not prompted to enter the username and password unless the password
is invalid or must be changed.
•Prompted user credentials—The user is prompted during authentication for credentials. These
credentials are credentials that are separate from the Windows username and password, such as
Lightweight Directory Access Protocol (LDAP) credentials.
•Saved user credentials—These are user credentials that are entered as part of the EAP-FAST
configuration. The user is not prompted for credentials during authentication unless the saved
credentials fail or have expired. New credentials that the user enters after successful authentication
are saved automatically in the configuration. The user does not have to return to the configuration
screen to change the old saved credentials.
•One-time password (OTP)—The user must manually enter a OTP. New PIN mode and next token
mode for OTP are supported.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-9
Configuring EAP-FAST
Configuring EAP-FAST Settings in the User Credentials Tab
The user can configure user credentials from the User Credentials tab (see Figure 3-3).
Figure 3-3User Credentials Tab in EAP-FAST Properties Window
Chapter 3 Configuring EAP Types
3-10
Table 3-2 lists and describes all options for user credentials.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Ta b l e 3-2User Credentials Options
User CredentialsDescription
Use a certificate on this
computer
Use one-time passwordClick this radio button to use a one-time password (OTP). For more
Use Windows username and
password
Prompt automatically for
username and password
Use saved username and
password
Configuring EAP-FAST
Click this radio button to automatically obtain the client certificate
from the Windows certificate store of the current user.
Default: Off
information about OTP, see the
Mode with OTP” section on page 3-12.
Default: Off
Click this radio button to use the Windows username and password as
the EAP-FAST username and password for network authentication.
Default: On
Click this radio button to require the user to enter a separate
EAP-FAST username and password in addition to a Windows
username and password with every authentication attempt. This
options supports non-Windows passwords, such as LDAP.
Default: Off
Click this radio button so that the user is not required to enter an
EAP-FAST username and password each time. Authentication occurs
automatically as needed using a saved user name and password,
which are registered with the backend server.
Default: Off
“Understanding PIN Mode and Token
When selecting this option, the user must enter the following:
•Username—Enter the username and the domain name in one of
these two formats:
–
Domain-qualified user name—domain\user
–
User Principal Name (UPN)—user@domain.com
•Password—Enter a password. This encrypted password is stored
in the EAP-FAST configuration.
•Confirm password—Enter the password again to verify that it
was entered correctly.
NoteThe maximum number of characters allowed for the username
and password is 256.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-11
Configuring EAP-FAST
Understanding PIN Mode and Token Mode with OTP
New PIN mode for OTP is supported. If a new PIN is needed, the backend server sends a text message
(for example, “Enter New PIN”) to indicate that a new PIN is neeeded. The EAP-FAST module displays
a prompt window that includes the text message from the server (see
might prompt the user twice to confirm the new PIN that the user entered.
Figure 3-4New PIN Prompt Window
Chapter 3 Configuring EAP Types
Figure 3-4). The backend server
Next Token mode for OTP is also supported. If the next token is needed, the backend server sends a text
message (for example, “Enter Next PASSCODE:”) to indicate that the next token is needed. The
EAP-FAST module displays a prompt window that includes the text message sent from the server
(see
Figure 3-5). The user must get the next token from the OTP device or from the software and enter
it in the prompt field.
Figure 3-5Next Token Prompt Window
3-12
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Configuring EAP-FAST Settings in the Authentication Tab
The EAP-FAST module supports three authentication methods: EAP-GTC, EAP-MSCHAPv2, and
EAP-TLS.
These three authentication methods use the following types of credentials:
The EAP-GTC module is bundled with the EAP-FAST module. The EAP-GTC module is not registered
with the EAPHost framework; it is not available to other applications.
A modified version of the EAP-MSCHAPv2 module is also bundled with the EAP-FAST module. This
modified version is used in anonymous TLS provisioning mode to support the modification of
EAP-MSCHAPv2 challenges. This same module also supports user authentication in authentication
mode without modification.
The EAP-FAST module uses the standard EAP-TLS module that is shipped with Windows Vista.
The user can select only one of these three inner authentication methods through the user interface.
Although other third-party EAP methods are registered with the EAPHost framework and can be selected
in the administrator interface, these methods have not been officially tested.
Configuring EAP-FAST
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-13
Configuring EAP-FAST
Chapter 3 Configuring EAP Types
You can choose settings for authentication in the Authentication tab (see Figure 3-6).
Figure 3-6Authentication Tab in EAP-FAST Properties Window
3-14
Table 3-3 lists and describes options for authentication.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Ta b l e 3-3Authentication Settings
Authentication SettingsDescription
Select an authentication
method
Configuring EAP-FAST
Select the inner tunnel EAP method from the drop-down list.
Available methods are EAP-GTC, EAP-MSCHAPv2, EAP-TLS, and
Any Method.
The Any Method option allows the EAP-FAST module to choose any
of the supported methods that the EAP server requests. The method
must also be appropriate to the user credentials that are used.
Default: Any Method
NoteEAP-GTC is the only option available if you selected the Use
one-time password radio button in the User Credentials tab.
NoteEAP-TLS is the only option available if you selected the Use
a certificate on this computer radio button in the User
Credentials tab.
NoteThe use of the Any Method value to allow all methods is
unsupported by Cisco or Microsoft and is not recommended.
This configuration is used “as-is”; Cisco makes no guarantee
that there will not be adverse performance to the system if
unsupported methods are used. Unsupported methods should
never be used in a production environment.
ConfigureClick the Configure button to configure EAP-TLS options. This
option is available only if EAP-TLS is the selected authentication
method. When you click this button, the standard Windows Vista
EAP-TLS Properties Screen appears.
Default: Disabled
Enable fast reconnectCheck this box to allow session resumption.
The EAP-FAST module supports fast reconnect (also called session
resumption) by using the User Authorization PAC. When you enable
fast reconnect, you can roam or return from suspend mode without
re-entering your credentials. Fast reconnect can be used across
different network access servers.
Default: On
NoteIf you switch profiles, logs off, or reboot, fast reconnect is not
attempted. You must be reauthenticated.
Enable posture validationCheck this box to allow the health information of the host machine to
be queried.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-15
Configuring EAP-FAST
Finding the Version of the EAP-FAST Module
Follow these steps to learn the current version of the EAP-FAST module on the device:
Step 1Access the EAP-FAST Properties window. The procedure for accessing this window is detailed in the
“Accessing EAP-FAST Properties for Configuration” section on page 3-4.
Step 2Click the About tab (see Figure 3-7). The version number, copyright information, and open-source
software information are in this tab.
Figure 3-7About Tab in EAP-FAST Properties Window
Chapter 3 Configuring EAP Types
3-16
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Overview of LEAP
Cisco LEAP is an authentication protocol that is designed for use in IEEE 802.11 wireless local are
networks (WLANs). Important features of LEAP include the following:
•Mutual authentication between the network infrastructure and the user.
•Secure derivation of random, user-specific cryptographic session keys.
•Compatibility with existing and widespread network authentication mechanisms (for example,
RADIUS).
•Computational speed.
Although Cisco LEAP is a Cisco proprietary protocol, it is based on existing IETF and IEEE standards.
Cisco LEAP relies on the following:
•Extensible Authentication Protocol (EAP)
EAP was originally designed to provide an framework so that new authentication methods could be
introduced into Point-to-Point Protocol (PPP). Before EAP existed, entirely new PPP authentication
protocols had to be defined to create new authentication methods. However, with EAP, new
authentication types simply require the definition of a new EAP type. A new EAP type comprises a
set of set of EAP request and response messages and their associated semantics.
•Extensible Authentication Protocol over LAN (EAPOL)
Overview of LEAP
Although originally designed to operate as part of PPP, EAP is flexible enough to be mapped to most
types of framed link layer. With a wireless access point, this link layer is a wireless LAN, not PPP.
The IEEE 802.1X EAP over LAN (EAPOL) specifies a method for encapsulating EAP packets in
Ethernet packets so that they can be transmitted over a LAN.
•Encryption and Key Exchange
The 802.11 specification allows for data traffic between the client and access point to be encrypted
using an encryption key. As a result of key exchange through WPA, WPA2, CCKM, or WEP, the
client and the network access device derive the same pair of keys—one key for broadcast and
multicast traffic from the network access device and another key for all other packets.
•Remote Authentication Dial-In User Service (RADIUS) Servers
Network access servers (such as WLAN access points) often rely on a centralized AAA server to
authenticate clients on their behalf. One of the more popular types of AAA servers is a RADIUS
server. Extensions to the RADIUS protocol have been defined to allow the transfer of the EAP
packets between the authentication server and the network access server. In this case, the network
access server is a relay agent; the authentication conversation takes place between the client and the
RADIUS server. The RADIUS server informs the access point of the result of the authentication and
whether to allow the client to access the network. Other parameters might be returned as well,
including session keys for use between the client and the access point.
How LEAP Works
Because most RADIUS servers support the MS Challenge Handshake Authentication Protocol
(MS-CHAP), MS-CHAP is the basis for LEAP. The protocol consists of the authenticator sending a
random challenge to client. The client’s data encryption standard (DES) encrypts the challenge by using
an MD4 hash of the password. The authenticator then verifies the response by using its knowledge of the
client username and password.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-17
Configuring LEAP
Chapter 3 Configuring EAP Types
During authentication, the access point acts as a transparent relay for the conversation between the client
and the RADIUS server. The EAPOL header is removed from EAPOL packets that come from the client.
The contents of the EAPOL packet are added as an EAP attribute to a RADIUS request packet and sent
to the RADIUS server. RADIUS packets from the server have the EAP attribute contents added to an
EAPOL packet and sent to the client. The access point never examines the contents of the EAP data.
When the client associates to an access point, the access point sends an EAP identity request to the client.
The client responds with a username. The RADIUS server then formats a LEAP challenge EAP attribute.
The client sends a LEAP challenge response back to the RADIUS server.
If the user is invalid, the RADIUS server sends a RADIUS access-deny message that contains an EAP
failure attribute. If the user is valid, the server sends a RADIUS access-challenge packet with an EAP
success attribute. The client responds with a LEAP challenge. The server responds with a RADIUS
access-accept packet that contains an EAP attribute with the LEAP challenge response. This packet also
contains a Cisco vendor-specific attribute that informs the access point of the value of the encryption
key. The client verifies the challenge response. If the response is invalid, client disassociates and
attempts to find another access point.
802.11 supports the use of up to four encryption keys for the traffic between a client and its access point.
The access point uses one of the key indices for the session key. This key has a different value for each
connection between the client and the access point.
The session key is derived from the user password and the contents of the LEAP challenges and
responses that go to and from the client. 802.11 encryption might be based on a 40-bit key or a 128-bit
key. The key derivation routines provide a key that is longer than needed.
Configuring LEAP
This section explains how to configure LEAP module settings. The following topics are covered in this
section:
•Accessing LEAP Properties for Configuration, page 3-18
•Configuring LEAP Settings in the Network Credentials Tab, page 3-19
•Finding the Version of the LEAP Module, page 3-21
Accessing LEAP Properties for Configuration
To access the LEAP Properties window, perform the following steps:
Step 1Click the Start button on the lower-left corner of the desktop.
Step 2From the right pane, right-click Network.
Step 3Select Properties.
Step 4From the left pane, select Manage Wireless Networks.
Step 5Double-click the wireless network.
Step 6From the Wireless Network properties window, select the Security tab (see Figure 3-1).
3-18
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Figure 3-8Wireless Network Properties Window
Configuring LEAP
Step 7Select LEAP from the "Choose a network authentication method" drop down list.
Step 8Click the Settings button. You are now ready to configure settings for LEAP.
Configuring LEAP Settings in the Network Credentials Tab
The user provides one of the following types of network credentials:
•Windows username and password—The Windows username and password are used as network
access credentials. The user is not prompted to enter a username and password if this option is
selected.
•Prompted user credentials—The user is prompted during authentication for credentials. These
credentials are credentials that are separate from the Windows username and password, such as
Lightweight Directory Access Protocol (LDAP) credentials.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-19
Configuring LEAP
Chapter 3 Configuring EAP Types
•Saved user credentials—These are user credentials that are entered as part of the LEAP
configuration. The user is not prompted for credentials during authentication unless the saved
credentials fail or have expired. New credentials that the user enters after successful authentication
are saved automatically in the configuration. The user does not have to return to the configuration
screen to change the old saved credentials.
You can configure LEAP network credentials settings from the Network Credentials tab (see Figure 3-9).
Figure 3-9Network Credentials Tab in LEAP Properties Window
Table 3-4 lists and describes LEAP network credentials settings.
Ta b l e 3-4LEAP Network Credentials Settings
LEAP Network Credentials
Settings
Use Windows username and
password
Description
Click this radio button to use the Windows username and password as
the LEAP username and password for network authentication.
Default: On
3-20
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
Click this radio button to require the user to enter a separate LEAP
username and password, which are registered with the backend
server, in addition to a Windows username and password with every
authentication attempt.
Default: Off
Click this radio button so that the user is not required to enter a LEAP
username and password with each Windows login. Authentication
occurs automatically as needed using a saved username and
password, which are registered with the backend server.
Default: Off
When selecting this option, the user must do the following:
•Enter a username in the Username field.
•Enter a password in the Password field.
•Confirm password—Enter the password again to verify that it
was entered correctly.
NoteThe maximum number of characters allowed for the username
The following three scenarios for credentials entry are supported by the LEAP module:
•Boot time—During this state, no users are logged on. The LEAP module uses machine credentials
for network authentication. The LEAP module does not prompt the user for information but instead
obtains the machine credentials by using Microsoft’s Local Security Authority (LSA) API.
•Pre-Logon—During this state, Microsoft’s Layer 2 credential provider (L2NA) queries the LEAP
module through Microsoft’s EAPHost APIs for types of credentials that are needed. The LEAP
module indicates the appropriate type: Windows, network, or none. The user enters the appropriate
credentials in a Microsoft L2NA prompt.
•Post-Logon—Although the user has already logged on, the LEAP module might need to prompt the
user for network credentials because a card was inserted or because network authentication failed.
The LEAP module invokes the EapInvokeInteractiveUI API, which is a Microsoft EAPHost API. A
LEAP credentials prompt appears, and the user must enter a username and password.
Finding the Version of the LEAP Module
The LEAP module version number, copyright information, and open-source software information are in
About tab (see
Figure 3-9).
and password is 256.
Overview of PEAP-GTC
Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. While
EAP was originally created for use with PPP, it has since been adopted for use with IEEE 802.1X, which
is Network Port Authentication. Since its deployment, a number of weaknesses in EAP have become
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-21
How PEAP-GTC Works
Chapter 3 Configuring EAP Types
apparent. These weaknesses include a lack of protection of user identity, notification messages, or the
EAP negotiation; no standardized mechanism for key exchange; no built-in support for fragmentation
and reassembly; no support for acknowledged success or failure indicators; and a lack of support for fast
reconnect.
Protected Extensible Authentication Protocol (PEAP) addresses these weaknesses by wrapping the EAP
protocol within a Transport Layer Security (TLS) channel. Any EAP method running within PEAP is
provided with the following:
•Identity protection—The identity exchange is encrypted, and client certificates are provided after
negotiation of the TLS channel.
•Header protection—Because the EAP method conversation is conducted within a TLS channel, the
EAP header is protected against modification.
•Protected negotiation—Within PEAP, the EAP conversation is authenticated; integrity and replay
are protected on a per-packet basis; and the EAP method negotiation that occurs within PEAP is
protected, as are error messages sent within the TLS channel.
•Support for key exchange—To provide keying material for a wide range of link-layer ciphersuites,
EAP methods should provide a key hierarchy that generates authentication and encryption keys, as
well as initialization vectors. By relying on the TLS key derivation method, PEAP provides the
required keying material for any EAP method running within it.
•Packet fragmentation and reassembly—Because EAP does not include support for fragmentation
and reassembly, individual EAP methods need to include this capability. By including support for
fragmentation and reassembly within PEAP, methods leveraging PEAP do not need to support
fragmentation and reassembly on their own.
•Acknowledged success or failure indications—By sending success or failure indications within the
TLS channel, PEAP provides support for protected termination of the EAP conversation.
Acknowledged indications prevent an attacker from carrying out denial-of-service (DOS) attacks by
spoofing EAP failure messages or by tricking the EAP peer into accepting a rogue NAS by spoofing
an EAP success message.
•Fast reconnect—Where EAP is used for authentication in wireless networks, the EAP method
should be able to quickly reauthenticate when the client is roaming between access points. PEAP
supports fast reconnect by leveraging the TLS session resumption facility. Any EAP method running
within PEAP can use fast reconnect.
•Dictionary attack resistance—By conducting the EAP conversation within a TLS channel, PEAP
protects an EAP method that might be subject to offline dictionary attacks if the EAP conversation
had been conducted in the clear.
How PEAP-GTC Works
PEAP-GTC works in two phases.
In phase 1, an authentication server performs TLS authentication to create an encrypted tunnel and to
achieve server-side authentication in a manner that is similar to Web server authentication that uses
Secure Sockets Layer (SSL). When phase 1 of PEAP is successfully completed, all data is encrypted,
including all sensitive user information.
3-22
Phase 2 is extensible. The client can authenticate by using the GTC method within the TLS tunnel.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Configuring PEAP-GTC
This section explains how to configure PEAP-GTC module settings. The following topics are covered:
•Accessing PEAP-GTC Properties for Configuration, page 3-23
•Configuring PEAP-GTC Settings in the Connection Tab, page 3-25
•Configuring PEAP-GTC Settings in the User Credentials Tab, page 3-27
Accessing PEAP-GTC Properties for Configuration
To access the PEAP-GTC Properties window, perform the following steps:
Step 1Click the Start button on the lower-left corner of the desktop.
Step 2From the right pane, right-click Network.
Step 3Select Properties.
Step 4From the left pane, select Manage Wireless Networks.
Configuring PEAP-GTC
Step 5Double-click the wireless network.
Step 6From the Wireless Network properties window, select the Security tab (see Figure 3-10).
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-23
Configuring PEAP-GTC
Chapter 3 Configuring EAP Types
Figure 3-10Wireless Network Properties Window
3-24
Step 7Select PEAP-GTC or LEAP from the "Choose a network authentication method" drop down list.
Step 8Click the Settings button. You are now ready to configure settings for PEAP-GTC.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Configuring PEAP-GTC Settings in the Connection Tab
You can configure connection settings from the PEAP-GTC Connection tab (see Figure 3-11).
Figure 3-11Connection Tab in PEAP-GTC Properties Window
Configuring PEAP-GTC
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-25
Configuring PEAP-GTC
Chapter 3 Configuring EAP Types
Table 3-5 lists and describes PEAP-GTC connection settings.
Ta b l e 3-5PEAP-GTC Connection Settings
PEAP-GTC Connection SettingsDescription
Use anonymous outer identityCheck this box to enable identity privacy protection. If this box is
checked, the Outer identity field is enabled, and the outer identity in
this field is used in response to an EAP identity request, which is sent
in the clear.
Default: On
Outer identity fieldEnter an outer identity if the Use anonymous outer identity check box
is checked. Follow an administrator’s instructions, or follow
RFC
4282 for guidelines about what to enter in the outer identity
field.
Default: anonymous
NoteThe maximum numberl of characters allowed in this field
is
256.
Validate server certificateCheck this box to validate the server certificate that is used to
establish a tunnel.
If the Validate server certificate box is checked and the Do not
prompt user to authorize new servers or trusted certificate
authorities box is checked, you must select one or more Trusted Root
CA certificates from the list of trusted Certificate Authority
certificates that are installed on the host system.
If the Validate server certificate box is checked but the Do not
prompt user to authorize new servers or trusted certificate
authorities box is not checked, the list can be empty, and the user is
prompted to validate the certificate. If authentication succeeds, then
the Root CA that signed the server certificate is marked as trusted in
the profile. The name of the server is then added to the Connect to
only these servers field.
Default: On
Connect to only these serversCheck this box to enter an optional server name that must match the
server certificate that is presented by the server. You can enter
multiple server names; separate multiple server names with
semicolons. The PEAP-GTC module only allows connections to
continue without prompting if the subject field (CN) or the subject
alternative name in the server certificate matches the server names
that you enter in this field.
Default: Off
NoteYou can use an asterisk (*) as a wildcard character in server
names only if the asterisk appears before the first period (.) in
the name.domain.com format. For example, “*.cisco.com”
matches any server name that ends with “.cisco.com.” If you
put an asterisk anywhere else in the server name, it is not
treated as a wildcard character.
3-26
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Table 3-5PEAP-GTC Connection Settings (continued)
PEAP-GTC Connection SettingsDescription
Trusted Root Certificate
Authority (CA)
Do not prompt user to authorize
new servers or trusted
certificate authorities.
Enable fast reconnectCheck this box to allow session resumption.
Configuring PEAP-GTC
Select one of more Trusted Root CA certificates from the list of
certificates that are installed on the system. Only trusted CA
certificates that are installed on the host system are displayed in the
drop-down list, so you must make sure that the desired trusted root
CA certificate is installed.
To view details about the selected Trusted Root CA certificate,
double-click the certificate name. Double-clicking the certificate
name opens the Windows certificate property screen, where
certificate details are available.
Default: None
Check this box if you do not want the user to be prompted to authorize
a connection when the server name does not match or the server
certificate is not signed by one of the Trusted Root CA certiticates
that was selected. If this box is checked and the server certificate is
not trusted, the authentication fails.
Default: Off
The PEAP-GTC module supports fast reconnect (also called session
resumption). When you enable fast reconnect, you can roam without
re-entering your credentials. Fast reconnect can be used across
different network access servers.
Default: On
NoteIf you switch profiles, log off, or reboot, fast reconnect is not
attempted. You must be reauthenticated.
Configuring PEAP-GTC Settings in the User Credentials Tab
The PEAP-GTC module supports OTP and a username and password as user credentials for
authentication.
The user provides one of the following types of username and password:
•One-time password (OTP)—The user must manually enter a OTP. New PIN mode and next token
mode for OTP are supported.
•Windows username and password—The Windows username and password are used as network
access credentials. The user is always prompted to enter a password unless PEAP-GTC is configured
to use single sign-on (SSO) or the password is cached.
•Prompted user credentials—The user is prompted during authentication for credentials. These
credentials are credentials that are separate from the Windows username and password, such as
Lightweight Directory Access Protocol (LDAP) credentials.
•Saved user credentials—These are user credentials that are entered as part of the PEAP-GTC
configuration. The user is not prompted for credentials during authentication unless the saved
credentials fail or have expired. New credentials that the user enters after successful authentication
are saved automatically in the configuration. The user does not have to return to the configuration
screen to change the old saved credentials.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-27
Configuring PEAP-GTC
Chapter 3 Configuring EAP Types
The user can configure PEAP-GTC user credentials from the User Credentials tab (see Figure 3-12).
Figure 3-12User Credentials Tab in PEAP-GTC Properties Window
3-28
Table 3-2 lists and describes options for PEAP-GTC user credentials.
Ta b l e 3-6PEAP-GTC User Credentials Options
User CredentialsDescription
Use one-time passwordClick this radio button to use a one-time password (OTP). In this
mode, credentials are never cached. Each time the server asks for
credentials, the user is prompted to supply credentials.
For more information about OTP, see the “Understanding PIN Mode
and Token Mode with OTP” section on page 3-12.
Default: Off
Use Windows username and
password
Click this radio button to use the Windows username and password as
the PEAP-GTC username and password for network authentication.
This mode only affects single sign-on authentication when the login
screen has one set of credentials instead of two sets of credentials,
which is the case for the Prompt automatically for username and
password option.
Default: On
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 3 Configuring EAP Types
Table 3-6PEAP-GTC User Credentials Options (continued)
User CredentialsDescription
Prompt automatically for
username and password
Use saved username and
password
Configuring PEAP-GTC
Click this radio button to require the user to enter a separate
PEAP-GTC username and password, which are registered with a
RADIUS server, in addition to a Windows username and password
with every authentication attempt. This option supports non-Windows
passwords, such as LDAP.
Default: Off
Click this radio button so that the user is not required to enter a
PEAP-GTC username and password with each Windows login.
Authentication occurs automatically as needed using a saved
username and password, which are registered with the backend server.
Default: Off
When selecting this option, the user must enter the following:
•Username—Enter the username and the domain name in one of
these two formats:
–
Domain-qualified username—domain\user
–
UPN—user@domain.com
•Password—Enter a password. This encrypted password is stored
in the PEAP-GTC configuration.
•Confirm password—Enter the password again to verify that it
was entered correctly.
NoteThe maximum number of characters allowed for the username
and password is 256.
Understanding PIN Mode and Token Mode with OTP
New PIN mode for OTP is supported. If a new PIN is needed, the backend server sends a text message
(for example, “Enter New PIN”) to indicate that a new PIN is neeeded. The PEAP-GTC module displays
a prompt window that includes the text message from the server (see
might prompt the user twice to confirm the new PIN that the user entered.
Figure 3-13New PIN Prompt Window
Figure 3-13). The backend server
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
3-29
Configuring PEAP-GTC
Chapter 3 Configuring EAP Types
Next Token mode for OTP is also supported. If the next token is needed, the backend server sends a text
message (for example, “Enter Next PASSCODE:”) to indicate that the next token is needed. The
PEAP-GTC module displays a prompt window that includes the text message sent from the server
(see
Figure 3-14). The user must get the next token from the OTP device or from the software and enter
it in the prompt field.
Figure 3-14Next Token Prompt Window
Understanding PEAP-GTC Authentication
The PEAP-GTC module prompts the user for a username and password (or PIN for OTP) if the
supplicant is configured to prompt for credentials during Windows logon or after the user is notified of
an authentication error or failure.
If the user password expires, the PEAP-GTC modules prompts the user to enter a new password and to
confirm the new password.
Finding the Version of the PEAP-GTC Module
The PEAP-GTC module version number, copyright information, and open-source software information
are in About tab (see
Figure 3-12).
3-30
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
CHA PTER
4
Performing Administrative Tasks
This chapter explains how to obtain Microsoft administrative tools to distribute wireless profiles to users
and computers in an Active Directory environment. This chapter also provides the XML schemas for
EAP-FAST, LEAP, and PEAP-GTC.
The following topics are covered in this chapter:
•Using Microsoft Tools to Perform Administrative Tasks, page 4-2
•The EAP-FAST XML Schema, page 4-6
•The PEAP-GTC XML Schema, page 4-17
•The LEAP XML Schema, page 4-23
•Logging for EAP Modules, page 4-26
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
4-1
Chapter 4 Performing Administrative Tasks
Using Microsoft Tools to Perform Administrative Tasks
Using Microsoft Tools to Perform Administrative Tasks
You must perform administrative tasks, such as the distribution of wireless profiles to users and
computers within an Active Directory environment, by creating Microsoft Group Policy Objects with a
Microsoft Group Policy Object Editor. Detailed discussion of these Microsoft solutions and their
functionality is beyond the scope of this Cisco document.
The following sections contain preliminary information and references to assist you in finding out more
about performing administrative tasks with Microsoft tools:
•Overview of Group Policy Objects, page 4-2
•Adding a Group Policy Object Editor, page 4-2
•Creating a EAP Group Policy Object in Windows Vista, page 4-3
Overview of Group Policy Objects
Group Policy is an infrastructure that allows you to specify managed configurations for users and
computers in an Active Directory directory service environment. Group Policy settings are contained in
Group Policy objects (GPOs). GPOs exist in a domain and can be linked to the following Active
Directory containers: sites, domains, or organizational units (OUs).
For more information about GPOs and the GPO Editor, refer to the Microsoft Windows Server
TechCenter at this URL:
Before you configure a Group Policy Object, you must add a Group Policy Object Editor snap-in. To add
the snap-in, perfom the following steps:
Step 1Open the MMC:
a. Click the Start button on the lower-left corner of the desktop.
b. Enter mmc in the Searchbox and press Enter.
NoteTo open an existing or saved MMC console, browse to the snap-in console or a shortcut to the snap-in
console in Windows Explorer, and then double-click it.
You can also open an existing MMC console from another console in which you are working. To do this,
click the File menu, and then click Open.
4-2
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 4 Performing Administrative Tasks
Step 2Add the Group Policy Object Editor snap-in:
a. Go to File > Add/Remove Snap-in...
The Add or Remove Snap-ins dialog box is displayed.
b. From the Add or Remove Snap-ins dialog box, highlight Group Policy Object Editor in the
Available snap-ins list, and click the Add button.
The Select Group Policy Object dialog box is displayed.
c. From the Select Group Policy Object dialog box, click Browse.
The Browse for a Group Policy Object dialog box is displayed.
d. From the Browse for a Group Policy Object dialog box, select the Domains/O Us tab.
e. Select your domain controller from the Look in drop down list.
f. Click OK.
g. From the Select Group Policy Object dialog box, click Finish.
h. From the Add or Remove Snap-ins dialog box, click OK.
Using Microsoft Tools to Perform Administrative Tasks
Now the Group Policy Object Editor is ready for use.
Creating a EAP Group Policy Object in Windows Vista
To create a new EAP group policy object , perform the following steps:
Step 1In the Default Domain Policy pane, select Windows Settings > Security Settings > Wireless Network
Policies.
Step 2Right-click Wireless Network Policies and select Create a New Policy.
Step 3Set your wireless network properties, such as SSID, encryption, and authentication method.
Step 4Select the EAP method.
Step 5Open properties for the desired EAP modules and configure the settings.
•EAP-FAST—In the Advanced Security screen, you can configure supplicant settings such as
machine authentication and SSO. For more information about machine authentication, see the
“Configuring Machine Authentication for EAP-FAST” section on page 4-4. For more information
about SSO see the “Configuring Single Sign-On for EAP-FAST” section on page 4-5.
•PEAP-GTC—In the Advanced Security screen, you can configure supplicant settings such as
machine authentication and SSO. For more information about machine authentication, see the
“Configuring Machine Authentication for PEAP-GTC” section on page 4-5. For more information
about SSO see the “Configuring Single Sign-On for PEAP-GTC and LEAP” section on page 4-5
•LEAP—In the Advanced Security screen, you can configure supplicant settings for SSO. FOr more
information about SSO, see the
“Configuring Single Sign-On for PEAP-GTC and LEAP” section on
page 4-5
NoteYou can configure settings for a wired network by selecting the Wired Network Policy object.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
4-3
Using Microsoft Tools to Perform Administrative Tasks
Step 6After you are done, save the GPO. You can refresh the Vista client by running "gpupdate /force" to force
update of the GPO. You should see the new profile being added to Vista machine.
After you create a GPO network profile, it cannot be changed by the user on the Vista machine.
On the General tab of a wireless network policy, you can configure a name and description for the policy,
specify whether the WLAN AutoConfig service is enabled, and configure a list of wireless network
policies and their settings in a preferred order. You can also export profiles as XML files and import
XML files as wireless profiles.
For detailed information about configuring policies, exporting profiles, and importing profiles, see the
following documentation:
•Windows Vista Wireless Networking Evaluation Guide
You can enable machine authentication from the Advanced Security screen when you create a Group
Policy Object.
The EAPHost notifies the EAP-FAST module that the current authentication is a machine authentication.
Machine authentication is achieved by using one of the following:
•a machine PAC
•a machine certificate
•a machine password
The EAP-FAST module attempts to fetch the machine PAC first. If a machine PAC is unavailable, the
EAP-FAST module attempts to fetch a machine certificate. If a machine certificate is unavailable, the
EAP-FAST module attempts to fetch the machine password for the machine account in the Active
Directory.
When the machine is authenticated with either a machine certificate or a machine password, the
EAP-FAST module then requests the provisioning of a machine PAC for subsequent use. If neither a
machine certificate nor a machine password is available, the EAP-FAST module requests a machine PAC
during the next successful user authentication after a user has logged on. If an existing machine PAC is
invalid or expired, the EAP-FAST module relies on this process to request a new machine PAC.
Because machine authentication is integrated with and supported by the Windows 802.1X supplicant,
the EAP-FAST module is only responsible for authentication to gain network access. Additional network
operations to support machine authentication, such as DHCP, machine-level GPO, and other related
network services, are the responsibility of the operating system and the 802.1X supplicant.
4-4
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 4 Performing Administrative Tasks
Using Microsoft Tools to Perform Administrative Tasks
Configuring Single Sign-On for EAP-FAST
SSO is supported by Microsoft Windows Vista in the following ways:
•Windows user credentials are passed to the EAP-FAST module through the EAPHost interface. The
system does not prompt the user to provide additional credentials if the EAP-FAST module is
configured to use Windows user credentials for network authentication and if the network profile is
configured for single sign-on.
•Non-Windows network credentials are collected during the Microsoft Windows Vista logon process.
The EAP-FAST module requests the logon module to prompt the user for these network credentials.
•If necessary, the EAP-FAST module is able to prompt the user for additional network credentials
before the user logs in to Microsoft Windows Vista.
If network credentials are stored in the configuration, the EAP-FAST module has access to these
credentials before the user logs in to Microsoft Windows Vista.
Configuring Machine Authentication for PEAP-GTC
The PEAP-GTC module supports machine authentication only via the machine password. The
PEAP-GTC module gets the machine password from Windows through Microsoft’s Local Security
Authority (LSA) API. The user is not prompted for the password.
Machine authentication is enabled and configured on the supplicant.
Configuring Single Sign-On for PEAP-GTC and LEAP
For both the PEAP-GTC module and the LEAP module, single sign-on (SSO) is supported by Microsoft
Windows Vista in the following ways:
•Windows user credentials are passed to the module through the EAPHost interface. The system does
not prompt the user to provide additional credentials if the module is configured to use Windows
user credentials for network authentication and if the network profile is configured for single
sign-on.
•Non-Windows network credentials are collected during the Microsoft Windows Vista logon process.
The module requests the logon module to prompt the user for these network credentials.
•The Windows 802.1X supplicant handles the Group Policy process and ensures that it is
synchronized and exercised with the Window’s logon process.
•If necessary, the module is able to prompt the user for additional network credentials before the user
logs in to Microsoft Windows Vista.
•If network credentials are stored in the configuration, the module has access to these credentials
before the user logs in to Microsoft Windows Vista.
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
4-5
The EAP-FAST XML Schema
The EAP-FAST XML Schema
The EAP-FAST module stores all settings in the Native EAP method section of the network profile as
XML by using the following schema:
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 4 Performing Administrative Tasks
<xs:documentation>
An aid-group is a set of A-IDs that are all trusted equally. Any A-ID in the group can be utilized.
Auto-grouping means that when an untrusted A-ID is accepted by the end-user then that A-ID is grouped
with the A-ID(s) that were already trusted for that profile, hence automatically creating and growing an
A-ID group based on user actions. The advantage of an A-ID group is that if a profile initially starts
with the same trusted A-ID(1) and then at some point the end-user authorizes the use of a new A-ID(2)
when using this profile it will accept A-ID(2) without bothering the end-user a second
time.</xs:documentation>
If true, then when the client is about to do unauthenticated provisioning, the user will be prompted to
allow or disallow the unauthenticated provisioning.</xs:documentation>
<xs:documentation>if true, then unauthenticated provisioning is allowed to occur until it
succeeds and a PAC is received, then only authenticated provisioning will be
allowed.</xs:documentation>
<xs:documentation>This indicates that only those PACs referenced in this element (as
well as PACs that are auto-provisioned to this profile when this profile is in use) shall be used for
validation. </xs:documentation>
</xs:annotation>
</xs:element>
</xs:choice>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:element name="doNotUsePac" type="Empty">
<xs:annotation>
<xs:documentation>Will not utilize PAC for authentication.</xs:documentation>
</xs:annotation>
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
<xs:documentation>Format rules same as for unprotectedIdentityPattern. Typical
pattern: [username]@[domain] or if password source is this profile then the pattern would be the actual
string to send as the username. </xs:documentation>
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 4 Performing Administrative Tasks
<xs:documentation>If the [username] and/or [domain] placeholders are used in the pattern then:
if a client certificate is used for authentication then placeholder's values shall be obtained from the CN
field of the client certificate. if the credentials are obtained from the end-user then these shall be
obtained from the information the user enters. if the credentials are obtained from the operating system
then these shall be obtained from the information the logon provides. Typical pattern:
anonymous@[domain] for tunneled methods or [username]@[domain] for non-tunneled methods. If the
credential source is this profile then the pattern would be the actual string to send as the username (no
placeholders).</xs:documentation>
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
4-13
The EAP-FAST XML Schema
<xs:annotation>
<xs:documentation>This is a reference to an OS pre-stored certificate.</xs:documentation>
</xs:annotation>
</xs:element>
</xs:choice>
</xs:complexType>
<xs:complexType name="CertificateIdentifier">
<xs:simpleContent>
<xs:annotation>
<xs:documentation>SHA 1 hash over the whole binary certificate in X509 format that uniquely
identifies a certificate in the global list of trusted CAs for the machine (OS managed store in
windows).</xs:documentation>
</xs:annotation>
<xs:extension base="NonEmptyString">
<xs:attribute name="reference" type="xs:boolean">
Chapter 4 Performing Administrative Tasks
<xs:annotation>
<xs:documentation>true means the element value is a file reference to a certificate in PEM format,
the post-process tool will retrieve the certificate file, convert to a hash, populate the certificateId
element, and set the reference to false to indicate this is the SHA1 hash over that
certificate.</xs:documentation>
</xs:annotation>
</xs:attribute>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="Empty"/>
<xs:simpleType name="NonEmptyString">
<xs:restriction base="xs:string">
<xs:minLength value="1"/>
</xs:restriction>
</xs:simpleType>
4-14
<xs:complexType name="ServerRuleFormat">
<xs:simpleContent>
<xs:extension base="NonEmptyString">
<xs:attribute name="match" use="required">
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Chapter 4 Performing Administrative Tasks
<xs:simpleType>
<xs:restriction base="xs:string">
<xs:enumeration value="exactly"/>
<xs:enumeration value="endsWith"/>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="ServerValidationRules">
<xs:choice minOccurs="0" maxOccurs="unbounded">
<xs:annotation>
The EAP-FAST XML Schema
<xs:documentation>
Optional only when product allows user to trust server. In which case it allows a profile that has no server
validations rules to start with and when a user validates an untrusted server the validation process still
validates the server name.</xs:documentation>
<xs:documentation>Either Subject: CN (Common Name) - typically a simple ASCII string.Or
Subject: DN (Domain Name) - a composite of a set of DC (Domain Component)
attributes</xs:documentation>
<xs:documentation>if the server certificate fails to validate then if this is true the end-user will be
asked to validate the server. If they do so then appropriate trustedCaCerts will be remembered as well
as the server name fields so it will be automatically trusted in the future.</xs:documentation>
</xs:annotation>
</xs:element>
</xs:sequence>
</xs:complexType>
<xs:complexType name="ValidateWithSpecificPacs">
4-16
<xs:choice minOccurs="0" maxOccurs="unbounded">
<xs:annotation>
<xs:documentation>This is optional because it allows the profile to indicate that we want the engine
to validate the server PACs but that the PACs will be dynamically added by the end-user actions or via
unauthenticated provisioning rather than being statically defined here in the
profile.</xs:documentation>
</xs:annotation>
Cisco Aironet 802.11a/b/g Wireless LAN Client Adapters (CB21AG and PI21AG) Installation and Configuration Guide for Windows Vista
OL-16534-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.