Using PEAP and WPA PEAP Authentication Security on a Zebra Wireless Tabletop Printer

Similar documents
Using EAP-TTLS and WPA EAP-TTLS Authentication Security on a Wireless Zebra Tabletop Printer

Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP

WPA - Setup for the Wireless Printers

Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Access Point, PEAP and WPA-PEAP

Zebra Setup Utility, Zebra Mobile Printer, Microsoft IAS, Cisco Access Point, PEAP and WPA-PEAP

Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Controller, PEAP and WPA-PEAP

Zebra Setup Utility, Zebra Mobile Printer, IAS, Symbol / Motorola Access point, PEAP and WPA-PEAP

Aruba PEAP-GTC Supplicant Plug-In Guide

Zebra Setup Utility, Zebra Mobile Printer, NPS, Symbol / Motorola Access point, PEAP and WPA-PEAP

Zebra Mobile Printer, Microsoft IAS, Cisco Controller TLS and WPA-TLS, Zebra Setup Utility

Configuring the Client Adapter through the Windows XP Operating System

Protected EAP (PEAP) Application Note

Configuring the Client Adapter through Windows CE.NET

Configuring Authentication Types

Cisco Secure ACS for Windows v3.2 With PEAP MS CHAPv2 Machine Authentication

Configuring the Client Adapter through the Windows XP Operating System

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients

Configuring Cipher Suites and WEP

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No.

Zebra Setup Utility, Zebra Mobile Printer, Cisco ACS, Cisco Access Point, EAP-FAST, WPA-EAP-FAST

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No.

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

Wireless LAN Security. Gabriel Clothier

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

Lab Configuring LEAP/EAP using Cisco Secure ACS (OPTIONAL)

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No.

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc.

Configuring 802.1X Authentication Client for Windows 8

Configuring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya

Package Content IEEE g Wireless LAN USB Adapter... x 1 Product CD-ROM.x 1

Secure ACS for Windows v3.2 With EAP TLS Machine Authentication

Authentication and Security: IEEE 802.1x and protocols EAP based

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device

Configuring the Access Point/Bridge for the First Time

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

Configuring WPA2 for Windows XP

Securing Your Wireless LAN

FAQ on Cisco Aironet Wireless Security

Configuring a VAP on the WAP351, WAP131, and WAP371

UMDNJ Wireless Documentation Windows 7

New Windows build with WLAN access

Configure 802.1x - PEAP with FreeRadius and WLC 8.3

Configuring the WMIC for the First Time

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No.

HPE IMC BYOD WLAN 802.1X Authentication and Security Check Using inode Configuration Examples

Instructions for connecting to the FDIBA Wireless Network (Windows Vista)

Instructions for connecting to winthropsecure

IEEE 802.1X workshop. Networkshop 34, 4 April Josh Howlett, JRS Technical Support, University of Bristol. Copyright JNT Association

LAB: Configuring LEAP. Learning Objectives

ClearPass QuickConnect 2.0

IMPORTANT INFORMATION FOR CURTIN WIRELESS ACCESS - STUDENT / WINDOWS XP -

Wireless-N Business Notebook Adapter

Using the Cisco Unified Wireless IP Phone 7921G Web Pages

Securewireless Windows 7 Setup Guide

Configuring the Client Adapter

802.1x Radius Setup Guide Working AirLive AP with Win X Radius Server

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

TestsDumps. Latest Test Dumps for IT Exam Certification

Security Setup CHAPTER

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Wireless for Windows 7

Network Security 1. Module 7 Configure Trust and Identity at Layer 2

Using the Cisco Unified Wireless IP Phone 7921G Web Pages

Part 1: Connecting to HawkNET on your Windows XP PC

Connecting to the eduroam Wireless Network. 1. If you are using a PC, move the. 2. Next Click or Tap the Settings. Help Sheet Windows 8.

NCR. Wi-Fi Setup Assistant. User guide

Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS)

b/g/n 1T1R Wireless USB Adapter. User s Manual

SE-WL-PCI-03-11G PCI CARD DRIVERS INSTALLATION. Table of Contents

EAP Authentication with RADIUS Server

Grandstream Networks, Inc. Captive Portal Authentication via RADIUS

CUA-854 Wireless-G Long Range USB Adapter with Antenna. User s Guide

Table of Contents. Chapter1 About g Wireless LAN USB Adapter...1

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

For my installation, I created a VMware virtual machine with 128 MB of ram and a.1 GB hard drive (102 MB).

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

The SSID to use and the credentials required to be used are listed below for each type of account: SSID TO CREDENTIALS TO BE USED:

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

MZ Firmware Release Notes

ilight/gigapop eduroam Discussion Campus Network Engineering

Intelligent IP-Enabled Access Control Solutions

Wireless LAN Profile Setup

802.1x Port Based Authentication

MCSA Guide to Networking with Windows Server 2016, Exam

802.1X Environment Establishment and Telephone Set Configuration Description

simplifying... Wireless Access

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Console Server. Con. Cisco Aironet Port Figure 1: Aironet configuration

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

Protected EAP (PEAP) Application Note

Auburn Montgomery AUM Wi-Fi. Windows 7. User s Guide & System Documentation

Network Access Flows APPENDIXB

NWD271N. User s Guide. WLAN n USB Adapter. Version /2008 Edition 1

Configuring FlexConnect Groups

Network. NEC Portable Projector NP905/NP901W WPA Setting Guide. Security WPA. Supported Authentication Method WPA-PSK WPA-EAP WPA2-PSK WPA2-EAP

How to connect to Wi-Fi

MZ Firmware Release Notes

Configuring WEP and WEP Features

Securing a Wireless LAN

Transcription:

Using PEAP and WPA PEAP Authentication Security on a Zebra Wireless Tabletop Printer Q. What is PEAP? A. Protected Extensible Authentication Protocol is an IEEE 802.1x EAP security method that uses an initial TLS handshake to authenticate a server to a client using PKI (Public Key Infrastructure) cryptography X.509 digital certificates. Using the secure tunnel established by the TLS handshake, a RADIUS (Remote Authentication Dial-In User Service) server is used to authenticate a client using legacy username and password authentication before allowing wireless access onto the network. The server proves its identity to the client by passing a digital certificate to the printer. An optional root certificate can be stored on the client which is used to help prove the identity of the server. The printer authenticates to the server by sending its username and password inside the secure TLS tunnel. Encryption keys are then generated securing all communications traffic between the wireless client and the network. In this example we will be using a Cisco Aironet 1200 access point (the EAP authenticator), and a Windows version of the popular FreeRadius authentication server. The firmware level on the Cisco access point used for this test was 12.3(7)JA. Information on FreeRadius appears later in this document. The version of PEAP supported in the TLS tunnel is the Microsoft implementation of MS-CHAPv2. Note: Zebra Desktop and Tabletop Printers currently do not support the use of the optional root Certificate being stored on the printers with PEAP. Our first example will be standard PEAP, which uses WEP encryption. Our second example will b e WPA PEAP, which uses TKIP encryption.

Configure the Cisco 1200 AP for PEAP authentication. In the SSID Manager select your SSID, set Open Authentication with EAP, and no Key Management as shown in the following two screen shots:

In the Encryption Manager set WEP Encryption to Mandatory: Next, configure a RADIUS server entry in the Server Manager. Select the IP address for your RADIUS server and enter its shared secret (we will edit the shared secret on the RADIUS server in the next step). By default the FreeRadius server listens on TCP ports 1812 and 1813. Select the RADIUS server s IP address in the Default Server Priorities (EAP Authentication section).

Configure the FreeRadius server for PEAP authentication. The FreeRadius server is available under the GNU General Public License (GPL), and is freely downloadable from the internet. For our example we will be using a Windows build of the server that can be downloaded from the FreeRadius.net website (http://www.freeradius.net). To install this version of the FreeRadius server you will need a computer system running Windows XP. Download and install the server. In the FreeRadius.net group click the Edit Clients.conf icon. At the bottom of the file add the following lines to create our test network. This will allow for a range of access points that must also be configured with this same shared secret. client 192.168.1.0/24 { secret = password shortname = private-network-3 } Save the file and open the Eap.conf file for editing. If necessary, edit the line that reads default_eap_type to select the PEAP protocol. Save the file if changes are made. default_eap_type = peap Next we will create user credentials that our printer will use to login to the network. Open the Users file. Just below the user FreeRADIUS.net-Client add a PEAP user peap as shown below. Save the file if changes are made. # Test PEAP user peap Auth-Type := eap, User-zebra1 == "zebra1" Service-Type = Login-User The RADIUS server should now be configured correctly. Start the server in debug mode by selecting the appropriate icon. Once the server is initialized it will be ready to process requests and authenticate users.

The Printer must have firmware x.15.x or higher. Configure Printer for PEAP authentication. To configure the printer use ZebraNet Bridge Enterprise V1.2.1 or higher. the Wireless Setup Wizard. From Tools, select Select PEAP form the drop down list in Security Mode and set the user name and password used on the RADIUS server. Click next to view the ZPL: ^XA ^WIP,10.17.50.91,255.255.255.0,10.17.50.1 ^WAD,D ^WEOFF,1,O,H,,,, ^WP0,0 ^WR,,,,100 ^WStestnet,I,L ^NBS ^WLOFF,zebra1,zebra1 ^WKOFF,,,, ^WX07,zebra1,zebra1 ^XZ ^XA ^JUS ^XZ Click Next to send ZPL to the printer.

The following is an example of the Free Radius log after a successful connection.

The access point s event log should also contain information regarding the printer s successful connection. Next, we will modify the settings on the Cisco access point and the Zebra mobile printer to use WPA PEAP. WPA increases security further by using TKIP (Temporal Key Integrity Protocol) as an encryption scheme instead of WEP. All the Cisco access point settings are the same as shown previously for standard PEAP except for the changes shown in the following two screenshots. Configure the Cisco 1200 AP for WPA PEAP authentication. In the Encryption Manager click Cipher, and select TKIP from the dropdown box.

In the SSID Manager configure WPA as shown below. Configure the ZebraNet Printer for WPA PEAP authentication. The Printer must have firmware x.15.x or higher. To configure the printer use ZebraNet Bridge Enterprise V1.2.1 or higher. the Wireless Setup Wizard. From Tools, select Select WPA-PEAP form the drop down list in Security Mode and set the user name and password used on the RADIUS server.

Click next to view the ZPL: ^XA ^WIP,10.17.50.91,255.255.255.0,10.17.50.1 ^WAD,D ^WEOFF,1,O,H,,,, ^WP0,0 ^WR,,,,100 ^WStestnet,I,L ^NBS ^WLOFF,zebra1,zebra1 ^WKOFF,,,, ^WX13,zebra1,zebra1 ^XZ ^XA ^JUS ^XZ Click Finish to sent the ZPL to the printer.

The following is an example of the Free Radius log after a successful WPA connection. The access point s event log should also contain information regarding the printer s successful connection.