{"id":1260,"date":"2015-05-13T09:50:41","date_gmt":"2015-05-13T14:50:41","guid":{"rendered":"http:\/\/it.thelibrarie.com\/weblog\/?p=1260"},"modified":"2015-05-13T09:53:55","modified_gmt":"2015-05-13T14:53:55","slug":"securing-enterprise-wireless","status":"publish","type":"post","link":"https:\/\/it.thelibrarie.com\/weblog\/2015\/05\/securing-enterprise-wireless\/","title":{"rendered":"Securing Enterprise Wireless"},"content":{"rendered":"<p>Our small business is growing into a medium sized business rather quickly. What was acceptable before (BYOD, honor system, etc) is no longer able to be sustained.<\/p>\n<p>I&#8217;ve been at this same company since we had a single Linksys WRT54GS access point with ~40 employees to a 7x Meraki APs (MR18 and MR24&#8217;s) with 3 locations and 200+ employees.<\/p>\n<p>Originally we had a standard WPA\/TKIP with a pre-shared key (PSK) that was given out to those who needed it. Unfortunately this PSK ended up in the hands of so many people that it was difficult to control. I rolled out an NPS server (Windows RADIUS) to allow only those with domain credentials to connect; this alleviated the issue of having non-employees on the network (for the most part), but individuals quickly realized they could add their iPad\/Tablet, phone, and other laptops to the company network.<\/p>\n<p>If that&#8217;s OK with you, here&#8217;s my NPS configuration (I have this on two different NPS servers for redundancy):<br \/>\n<strong>RADIUS Clients<\/strong><\/p>\n<blockquote><p>Friendly name: SuiteNumber_DeviceModel<br \/>\nIP Address: The statically assigned IP of the device<br \/>\nDevice Manufacturer: RADIUS Standard<br \/>\nNAP-Capable: No (for now)<br \/>\nStatus: Enabled<\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_01.png\" alt=\"wireless_01\" width=\"486\" height=\"361\" class=\"alignnone size-full wp-image-1261\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_01.png 486w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_01-300x223.png 300w\" sizes=\"auto, (max-width: 486px) 100vw, 486px\" \/><\/p>\n<p><strong>Connection Request Policies<\/strong><\/p>\n<blockquote><p>Policy Name: I picked &#8220;Secure Wireless Connections&#8221; and Enabled the policy<br \/>\nConditions: NAS Port Type of Wireless-Other OR Wireless-IEEE802.11<br \/>\nSettings: I left these as the defaults as I wanted the Network Policy to dictate the authentication methods<\/p><\/blockquote>\n<p><a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_02.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_02.png\" alt=\"wireless_02\" width=\"615\" height=\"332\" class=\"alignnone size-full wp-image-1262\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_02.png 615w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_02-300x162.png 300w\" sizes=\"auto, (max-width: 615px) 100vw, 615px\" \/><\/a><\/p>\n<p><strong>Network Policies<\/strong><\/p>\n<blockquote><p>Policy Name: I once again picked &#8220;Secure Wireless Connections&#8221; and enabled the policy<br \/>\nConditions: NAS Port Type of Wireless-Other OR Wireless-IEEE802.11 \/ Windows Groups of domain\\domain computers and domain\\domain users<br \/>\nSince I don&#8217;t feel like typing it all out, look at the picture.<\/p><\/blockquote>\n<p><a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_03.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_03.png\" alt=\"wireless_03\" width=\"815\" height=\"501\" class=\"alignnone size-full wp-image-1263\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_03.png 815w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_03-300x184.png 300w\" sizes=\"auto, (max-width: 815px) 100vw, 815px\" \/><\/a><\/p>\n<p>Just point your wireless device(s) to your NPS\/RADIUS server IP with the default port and away you go.<\/p>\n<hr>\n<p>Now to get it with certificate-based security it was a bit more work:<\/p>\n<p>I am assuming that you&#8217;re using an on-premise Certificate Authority and that it&#8217;s already up and running. In my case we have a 2008R2 CA already published in Active Directory. If it&#8217;s not published in AD, you can always have a GPO that pushes the trusted root certificate authority to all domain members.<\/p>\n<p>Anyway, I needed to set it so that every domain joined computer would enroll with a computer certificate against this CA, so I created a GPO called Wireless Settings (I don&#8217;t really like adding things to the default domain policy, so I end up creating new).<br \/>\nUnder Computer Configuration \/ Policies \/ Windows Settings \/ Security Settings \/ Public Key Policies \/ Certificate Services Client &#8211; Auto-Enrollment Settings<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_04.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_04.png\" alt=\"wireless_04\" width=\"1155\" height=\"358\" class=\"alignnone size-full wp-image-1264\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_04.png 1155w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_04-300x93.png 300w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_04-1024x317.png 1024w\" sizes=\"auto, (max-width: 1155px) 100vw, 1155px\" \/><\/a><\/p>\n<p>From this I verified that computers had the appropriate certificates installed by looking at my MMC:<br \/>\nstart, run, MMC<br \/>\nAdd Certificates (Computer account) for the local machine<br \/>\nVerify there&#8217;s a certificate issued to your computername.yourdomainname.tld from the Certificate Authority with hooks into AD<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_05.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_05.png\" alt=\"wireless_05\" width=\"789\" height=\"141\" class=\"alignnone size-full wp-image-1265\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_05.png 789w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_05-300x54.png 300w\" sizes=\"auto, (max-width: 789px) 100vw, 789px\" \/><\/a><\/p>\n<p>Now I finished up my Wireless Settings GPO with some Wireless Network (802.11) Policies. See the picture. Lazy.<br \/>\nThe Profile Name will be the one displayed when people search for available wireless networks and, to the end-user, they will be connecting to this access point. You can actually publish multiple SSID&#8217;s under this name (I only have the &#8220;Linksys47532&#8221; name available currently).<br \/>\n<a href=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_06.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_06.png\" alt=\"wireless_06\" width=\"937\" height=\"759\" class=\"alignnone size-full wp-image-1266\" srcset=\"https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_06.png 937w, https:\/\/it.thelibrarie.com\/weblog\/wp-content\/uploads\/2015\/05\/wireless_06-300x243.png 300w\" sizes=\"auto, (max-width: 937px) 100vw, 937px\" \/><\/a><\/p>\n<p>You&#8217;d have to run<br \/>\n<code>netsh, wlan, show interfaces<\/code><br \/>\nwith an administrative command window to actually see the network being connected to.<\/p>\n<p>When I get around to publishing a computer certificate that can be imported on an iPhone, I&#8217;ll update this post.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our small business is growing into a medium sized business rather quickly. What was acceptable before (BYOD, honor system, etc) is no longer able to be sustained. I&#8217;ve been at this same company since we had a single Linksys WRT54GS access point with ~40 employees to a 7x Meraki APs (MR18 and MR24&#8217;s) with 3 &hellip; <a href=\"https:\/\/it.thelibrarie.com\/weblog\/2015\/05\/securing-enterprise-wireless\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Securing Enterprise Wireless<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,4],"tags":[],"class_list":["post-1260","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-networking"],"_links":{"self":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/1260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/comments?post=1260"}],"version-history":[{"count":4,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/1260\/revisions"}],"predecessor-version":[{"id":1270,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/posts\/1260\/revisions\/1270"}],"wp:attachment":[{"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/media?parent=1260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/categories?post=1260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it.thelibrarie.com\/weblog\/wp-json\/wp\/v2\/tags?post=1260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}