<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: 802.1x Port-based Authentication	</title>
	<atom:link href="/2007/05/08/8021x-port-based-authentication/feed/" rel="self" type="application/rss+xml" />
	<link>/2007/05/08/8021x-port-based-authentication/</link>
	<description>David Szpunar: Owner, Servant 42 and Servant Voice</description>
	<lastBuildDate>Sun, 13 Apr 2008 10:21:34 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>
	<item>
		<title>
		By: Stefan		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-3475</link>

		<dc:creator><![CDATA[Stefan]]></dc:creator>
		<pubDate>Sun, 13 Apr 2008 10:21:34 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-3475</guid>

					<description><![CDATA[Hi List,
I am on that, too.
I tried to auth XP via DLINK switches agaist a free radius server without getting it running smoothly by now.

My questions are:
- I only need MAC-Based placing of the nodes into the VLANs.
  How to avoid the &quot;Please Enter ... to login to network&quot; message at XP ? 
- Anybody out there running a working freeradius config to post it somewhere ?]]></description>
			<content:encoded><![CDATA[<p>Hi List,<br />
I am on that, too.<br />
I tried to auth XP via DLINK switches agaist a free radius server without getting it running smoothly by now.</p>
<p>My questions are:<br />
&#8211; I only need <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span>-Based placing of the nodes into the VLANs.<br />
  How to avoid the &#8220;Please Enter &#8230; to login to network&#8221; message at XP ?<br />
&#8211; Anybody out there running a working freeradius config to post it somewhere ?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David Szpunar		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-2351</link>

		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 14 Feb 2008 15:57:55 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-2351</guid>

					<description><![CDATA[Thanks for the information Andrew! I haven&#039;t had time to pursue this further, but I appreciate you sharing what you&#039;ve found. I&#039;ll definitely check it out when I can look into this some more! For now, I&#039;m simply not even plugging in public network ports physically in the network closet, unless they&#039;re needed. If they are needed, I&#039;m using port security on my HP switches to lock down the port to a single MAC address, and turn off the port if any other addresses are detected. It requires more management, but is simpler to set up for now and there hasn&#039;t been enough of a pressing need to bring the issue to the forefront again yet.]]></description>
			<content:encoded><![CDATA[<p>Thanks for the information Andrew! I haven&#8217;t had time to pursue this further, but I appreciate you sharing what you&#8217;ve found. I&#8217;ll definitely check it out when I can look into this some more! For now, I&#8217;m simply not even plugging in public network ports physically in the network closet, unless they&#8217;re needed. If they are needed, I&#8217;m using port security on my HP switches to lock down the port to a single <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> address, and turn off the port if any other addresses are detected. It requires more management, but is simpler to set up for now and there hasn&#8217;t been enough of a pressing need to bring the issue to the forefront again yet.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Andrew Miehs		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-2350</link>

		<dc:creator><![CDATA[Andrew Miehs]]></dc:creator>
		<pubDate>Thu, 14 Feb 2008 11:06:42 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-2350</guid>

					<description><![CDATA[Hi David,

I am currently looking at the 802.1x issue as well - I am still having problems to get the Windows clients to cause the switch to send anything to the radius server - I am still playing with the windows supplicant client. I am tending now towards MAC based filtering as I have read that the windows client only authenticates on login...

Cisco recently boot &quot;MeetingPlaces&quot; who make the AEGIS supplicant, and this looks like it may work better than the Windows XP thing - and it seems to be free for wired usage.....

Still looking...

Andrew]]></description>
			<content:encoded><![CDATA[<p>Hi David,</p>
<p>I am currently looking at the 802.1x issue as well &#8211; I am still having problems to get the Windows clients to cause the switch to send anything to the radius server &#8211; I am still playing with the windows supplicant client. I am tending now towards <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> based filtering as I have read that the windows client only authenticates on login&#8230;</p>
<p>Cisco recently boot &#8220;MeetingPlaces&#8221; who make the AEGIS supplicant, and this looks like it may work better than the Windows XP thing &#8211; and it seems to be free for wired usage&#8230;..</p>
<p>Still looking&#8230;</p>
<p>Andrew</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David Szpunar		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-120</link>

		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 20 May 2007 18:54:39 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-120</guid>

					<description><![CDATA[Hunter - I&#039;ve posted the first set of details on our &lt;a href=&quot;http://infotech.lakeviewchurch.org/2007/05/18/wireless-8021x-authentication-overview/&quot; rel=&quot;nofollow&quot;&gt;802.1x wireless&lt;/a&gt; implementation.  More to come.  We aren&#039;t using certificates yet, mainly because of the PKI infrastructure required...either we have to pay a lot for third-party certificates, or do an in-house CA (Certificate Authority).  I&#039;ve configured an in-house test CA before, but that system failed a while back and without adequate backups for the root cert (actually I had backups, but they wouldn&#039;t restore on a new machine properly) I was left without PKI for now.  It&#039;ll come in the future, but I need to learn more about it and do it the right way, the first was more of a half-live lab :-)

I did have certificate-based WPA working with that test PKI at one point, however!  This was still back on the Linksys test AP.]]></description>
			<content:encoded><![CDATA[<p>Hunter &#8211; I&#8217;ve posted the first set of details on our <a href="http://infotech.lakeviewchurch.org/2007/05/18/wireless-8021x-authentication-overview/" rel="nofollow">802.1x wireless</a> implementation.  More to come.  We aren&#8217;t using certificates yet, mainly because of the PKI infrastructure required&#8230;either we have to pay a lot for third-party certificates, or do an in-house CA (Certificate Authority).  I&#8217;ve configured an in-house test CA before, but that system failed a while back and without adequate backups for the root cert (actually I had backups, but they wouldn&#8217;t restore on a new machine properly) I was left without PKI for now.  It&#8217;ll come in the future, but I need to learn more about it and do it the right way, the first was more of a half-live lab :-)</p>
<p>I did have certificate-based <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span> working with that test PKI at one point, however!  This was still back on the Linksys test AP.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Hunter French		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-119</link>

		<dc:creator><![CDATA[Hunter French]]></dc:creator>
		<pubDate>Sun, 20 May 2007 17:35:31 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-119</guid>

					<description><![CDATA[David, that would be great. We are migrating to a certificate based WPA from WEP (yikes!). We are currently in the process of building our PKI infrastructure.]]></description>
			<content:encoded><![CDATA[<p>David, that would be great. We are migrating to a certificate based <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span> from WEP (yikes!). We are currently in the process of building our PKI infrastructure.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Wireless 802.1x Authentication: Overview		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-116</link>

		<dc:creator><![CDATA[Wireless 802.1x Authentication: Overview]]></dc:creator>
		<pubDate>Sat, 19 May 2007 03:52:32 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-116</guid>

					<description><![CDATA[[...] been asked to post some information on how I implemented 802.1x authentication in our wireless network. This [...]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] been asked to post some information on how I implemented 802.1x authentication in our wireless network. This [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David Szpunar		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-112</link>

		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Fri, 18 May 2007 14:18:18 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-112</guid>

					<description><![CDATA[Hunter - I&#039;ll see what I can do; I&#039;ll get a post started but not sure when I&#039;ll have time to finish it.  I probably won&#039;t get down to the screenshot level but I can give a more in-depth overview of the process I used.  Do note that we&#039;re not using certificates yet.]]></description>
			<content:encoded><![CDATA[<p>Hunter &#8211; I&#8217;ll see what I can do; I&#8217;ll get a post started but not sure when I&#8217;ll have time to finish it.  I probably won&#8217;t get down to the screenshot level but I can give a more in-depth overview of the process I used.  Do note that we&#8217;re not using certificates yet.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Hunter French		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-111</link>

		<dc:creator><![CDATA[Hunter French]]></dc:creator>
		<pubDate>Fri, 18 May 2007 13:25:44 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-111</guid>

					<description><![CDATA[David - Perhaps you have another blog post on the way about the process you followed to implement 802.1x in your wireless environment.  Thanks, Hunter]]></description>
			<content:encoded><![CDATA[<p>David &#8211; Perhaps you have another blog post on the way about the process you followed to implement 802.1x in your wireless environment.  Thanks, Hunter</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: David Szpunar		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-101</link>

		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 10 May 2007 15:24:26 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-101</guid>

					<description><![CDATA[Matthew,

We&#039;ve only recently been able to do most of what I&#039;ve mentioned due to replacing our non-managed core switches with managed switches, and at the same time implementing a WLAN solution that has multiple VLAN capability built-in.  Employees can still get to the internal network over wireless, but it&#039;s encrypted (still a combination of WPA-PSK for some and WPA with 802.1x for others, moving to all-802.1x in the future).  A separate network for public use is operating on a different VLAN, going through our Nomadix AG-3000 access device.  The fact that we can use the same access points to do all this (actually we could run up to 16 separate networks on the same APs, each with individualized settings, or 32 if we used an advanced mode) is amazing, and well worth the money in my opinion!

Public wi-fi isn&#039;t an option for many, or at least it&#039;s easy to see the benefits if that&#039;s the direction you want to go.  At the same time, security isn&#039;t an option either, but it isn&#039;t always easy in a church environment where the default is often &quot;trust.&quot;  Not that trust is a bad thing, but &quot;trust everyone&quot; is a bad policy.  Security is a balance between risk and convenience (and cost), so my recommendation is to put it on your projects list, but don&#039;t sweat it in the short term if it&#039;s worked so far.  If you have problems, bump it up the priority list!  The potential problems could be big, but the risk that there could be a problem is something only you can figure out for your environment.]]></description>
			<content:encoded><![CDATA[<p>Matthew,</p>
<p>We&#8217;ve only recently been able to do most of what I&#8217;ve mentioned due to replacing our non-managed core switches with managed switches, and at the same time implementing a WLAN solution that has multiple VLAN capability built-in.  Employees can still get to the internal network over wireless, but it&#8217;s encrypted (still a combination of <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-PSK for some and <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span> with 802.1x for others, moving to all-802.1x in the future).  A separate network for public use is operating on a different VLAN, going through our Nomadix AG-3000 access device.  The fact that we can use the same access points to do all this (actually we could run up to 16 separate networks on the same APs, each with individualized settings, or 32 if we used an advanced mode) is amazing, and well worth the money in my opinion!</p>
<p>Public wi-fi isn&#8217;t an option for many, or at least it&#8217;s easy to see the benefits if that&#8217;s the direction you want to go.  At the same time, security isn&#8217;t an option either, but it isn&#8217;t always easy in a church environment where the default is often &#8220;trust.&#8221;  Not that trust is a bad thing, but &#8220;trust everyone&#8221; is a bad policy.  Security is a balance between risk and convenience (and cost), so my recommendation is to put it on your projects list, but don&#8217;t sweat it in the short term if it&#8217;s worked so far.  If you have problems, bump it up the priority list!  The potential problems could be big, but the risk that there could be a problem is something only you can figure out for your environment.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Matthew Irvine		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-99</link>

		<dc:creator><![CDATA[Matthew Irvine]]></dc:creator>
		<pubDate>Wed, 09 May 2007 23:58:08 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-99</guid>

					<description><![CDATA[I&#039;m embarrassed to admit, but all of our APs are straight into the switches with everything else, so are our wired ports in public areas.  I don&#039;t have the budget to change it now, and my boss doesn&#039;t see it as a problem.  I&#039;ve got to convince him that without pulling those APs into a guest VLAN or at least behind the firewall, that we are quite vulnerable.]]></description>
			<content:encoded><![CDATA[<p>I&#8217;m embarrassed to admit, but all of our APs are straight into the switches with everything else, so are our wired ports in public areas.  I don&#8217;t have the budget to change it now, and my boss doesn&#8217;t see it as a problem.  I&#8217;ve got to convince him that without pulling those APs into a guest VLAN or at least behind the firewall, that we are quite vulnerable.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Clif Guy		</title>
		<link>/2007/05/08/8021x-port-based-authentication/comment-page-1/#comment-97</link>

		<dc:creator><![CDATA[Clif Guy]]></dc:creator>
		<pubDate>Wed, 09 May 2007 19:34:53 +0000</pubDate>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/#comment-97</guid>

					<description><![CDATA[We&#039;ve thought about doing exactly what you&#039;re considering.  I&#039;ve resisted on the principle of &quot;less is more.&quot;  With every idea for something new in our network I&#039;m weighing the impact of greater complexity into the decision.  We run HP switches too.  We have no secure WiFi - all WiFi is on our guest VLAN.  For now, we have decided to put network ports in public places on our guest VLAN too.  I&#039;m hoping that will provide sufficient security without increasing the management complexity.]]></description>
			<content:encoded><![CDATA[<p>We&#8217;ve thought about doing exactly what you&#8217;re considering.  I&#8217;ve resisted on the principle of &#8220;less is more.&#8221;  With every idea for something new in our network I&#8217;m weighing the impact of greater complexity into the decision.  We run HP switches too.  We have no secure WiFi &#8211; all WiFi is on our guest VLAN.  For now, we have decided to put network ports in public places on our guest VLAN too.  I&#8217;m hoping that will provide sufficient security without increasing the management complexity.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
