SlideShare a Scribd company logo
1 of 73
Download to read offline
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
PROJECT REPORT
ON
SECURED WIRELESS NETWORK FOR AN ENTERPRISE
Wireless Project - WLS 5507 – 0NA
Submitted To: Submitted By:
Prof. Waleed Ejaz Harkirat Singh Dhillon
Varinder Singh
Tarandeep Kaur
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page1
This Project is regarding the security of an Enterprise Network. In this project we
will create a secure Wlan network using CISCO controller, light Aps and external
Server. Our motive is to secure network by providing every employee of the
company with his/her own username and password in order to connect to the
network. To secure the network we will use WPA2 and AES encryption in our
project.It is not feasible to use a single password for the whole network as it can
expose the network to rogue attacks and hackers resulting in data theft or
compromising the secuirty of whole company’s network.Also, we will introduce
redudancy in the network in case one controller fails the other one can do the job
without a hinch.
The management of the whole network is centeralized i.e. the whole setup can be
managed from one place. Wireless LAN controllers are responsible for
systemwide WLAN functions and provide centralized management. Large
number of
AP’s can be managed by single controller and also easy to deploy and removal of
APs. We created an external DHCP server, which provides IP addresses to the
devices. We can track which devices are connected to the network on this server.
Active directory is also a major part of this project in which we create user
credentials for different users. It provide centralized repository for user account
information, directory authentication, authorization and assignment of right and
permissions. It maintains the relationship between resources and enable them to
work together. A Network Policy has been created for authentication of Wi-Fi
network on RADIUS authentication and authorization sever. A particular user can
be de-authorized, without changing key for everyone. It has ability to direct users
into particular user profiles based on RADIUS attribute. Also we can add new
users and remove retired users. It is potential solution to setup a secured wireless
network for an enterprise.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page2
Acknowledgement
We are grateful to Prof Waleed Ejaz, project in charge for unflinching support,
guidance and pearls of wisdom to enable me to complete this project. The way he
instilled knowledge of the module was undoubtly praise worthy and valuable. We
are also grateful to my Coordinator of Department Prof. Kevin Ramdass and
Mehdi Akbari for the supervision and encouragement during course. We are also
thankful to Humber College as a whole that is doing yeoman’s service by teaching
the learner abreast with the RF technology, telecom, networking etc. knowledge
that is the need of the day. We are grateful to Bhawandeep Singh and Amandeep
Kaur Randhawa for providing us with their project report and work. We found it
utmost useful for guidance and completion of our project.
Last but not the least: We thank all classmates at Humber College for extending
kind cooperation.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page3
INDEX
Contents
1. Network topology.....................................................................................................4
2. Components Used.....................................................................................................5
2. Basic step to be followed in controller configuration..............................................6
4. Setting up Cisco Wireless Controller using Cisco WLAN Express ........................7
(Wired Method)...............................................................................................................7
5. Using the GUI to Create WLANs ..........................................................................12
6. Using the GUI to Configure DHCP Scope.............................................................15
7. Introduction to Virtual Box.......................................................................................19
8. Microsoft Server as Virtual machine ........................................................................20
 Configure DHCP server............................................................................................33
9) 802.1X Authentication via WiFi – Active Directory + Network Policy
Server + Cisco WLAN + Group Policy........................................................................39
10) INTRODUCING REDUNDANCY ON WLC’S...................................................64
REFERENCES..............................................................................................................72
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page4
1. Network topology
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page5
2. Components Used
A. Wireless controller – 2x
a. Hardware Specifications
b. Data Ports - 4 x 1 Gigabit Ethernet Ports
c. Console Port - 1 x RJ45
d. External 48V Power Supply
B. Access points
C. Ethernet cables
D. Console cables
E. Laptop additional server
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page6
2. Basic step to be followed in controller configuration
Figure 2: Controller basic setup
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page7
4. Setting up Cisco Wireless Controller using Cisco WLAN
Express
(Wired Method)
Step 1 Connect the laptop’s wired Ethernet port directly to the service port of
WLC (port no. 1). The port LEDs blink to indicate that both the machines are
properly connected
NOTE: It may take several minutes for the WLC to fully power on to make the
GUI available to the PC. Do not auto-configure the WLC.
Figure 3: Wireless controller
The LEDs on the front panel provide the system status:
If the LEDs is off, it means that the WLC is not ready.
If the LEDs is solid green , it means that the WLC is ready
Step 2
Assign a static IP address 192.168.1.X to the laptop to access the WLC GUI
Step 3
Open any one of the following supported web browsers and type
http://192.168.100.10 (the ip address may get changed because the WLC’s are
used in lab experiments, but you can change it to desired ip address by configuring
the WLC through console cable and Putty )
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page8
If you are unable to login into WLC , then join the console cable and open Putty
software for WLC 2504 initial configuration.
Putty>Serial>ok
After that a command box will open and type the following commands for
configuration of WLC-
>Clear config
Are you sure you want to clear configuration ? (y/n) Y
>reset system
The system has unsaved changes.
Would you like to save them now ? (y/n) N
Configuration not saved !
Are you sure you would like to reset the system ? (y/n) Y
This will take some time as the system will be restarted
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page9
When system will come live again, do the following configuration
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page10
Now, the WLC has been configured it can be accessed by typing the ip address
we assigned it in the configuration.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page11
Step 4 Login into WLC
Username- admin
Password- Humber1 (set in configuration)
Step 5 Go to ADVANCE option which appear when you will login into WLC.
After that browse the COMMAND>SET TIME
This option will let you set the current time in order you were unable to
configure it.
It is necessary to set the time because the AP’s will not work if the time is not set
to current time.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page12
5. Using the GUI to Create WLANs
To create WLANs using the GUI, follow these steps:
Step 1 Go to WLANs page.
Figure- Wlan page
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page13
This page lists all of the WLANs currently configured on the controller. For each
WLAN, you can see its WLAN ID, pro le name, type, SSID, status, and security
policies. The total number of WLANs appears in the upper right-hand corner of
the page. If the list of WLANs spans multiple pages, you can access these pages
by clicking the page number links.
Step 2 Create a new WLAN by choosing Create New from the drop-down list
and clicking Go.
After this the following page will pop-up, add the details as you desire.
Wlan> new page
Step 3 From the Type drop-down list, choose WLAN to create a WLAN.
Step 4 In the Profile Name text box, enter up to 32 alphanumeric characters for
the profile name to be assigned to this WLAN. The profile name must be
unique.
Step 5 In the WLAN SSID text box, enter up to 32 alphanumeric characters for
the SSID to be assigned to this WLAN.
Step 6 From the WLAN ID drop-down list, choose the ID number for this WLAN.
Step 7 Click Apply to commit your changes. The WLANs > Edit page appears
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page14
Figure : WLANs > Edit Page
Step 8 Use the parameters on the General, Security, QoS, and Advanced tabs to
configure this WLAN. Seethe sections in the rest of this chapter for instructions
on configuring specific features for WLANs.
Step 9 On the General tab, select the Status check box to enable this WLAN. Be
sure to leave it unselected until you have finished making configuration changes
to the WLAN.
Step 10 Click Apply to commit your changes.
Step 11 Click Save Configuration to save your changes.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page15
6. Using the GUI to Configure DHCP Scope
Step 1 Choose Controller > Internal DHCP Server > DHCP Scope to open the
DHCP Scopes page >DHCP Scopes
NOTE: If you ever want to delete an existing DHCP scope, hover your cursor
over the blue drop-down arrow for that scope and choose Remove.
Step 2 Click New to add a new DHCP scope. The DHCP Scope > New page
appears.
Step 3 In the Scope Name text box, enter a name for the new DHCP scope.
Step 4 Click Apply. When the DHCP Scopes page reappears, click the name of
the new scope. The DHCP Scope > Edit page appears DHCP Scope > Edit Page
Step 5 In the Pool Start Address text box, enter the starting IP address in the range
assigned to the clients.
NOTE: This pool must be unique for each DHCP scope and must not include the static IP
Step 6 In the Pool End Address text box, enter the ending IP address in the range
assigned to the clients.
NOTE: This pool must be unique for each DHCP scope and must not include the
static IP addresses of routers or other servers.
Step 7 In the Network text box, enter the network served by this DHCP scope.
This IP address is used by the management interface with Netmask applied, as
configured on the Interfaces page.
Step 8 In the Netmask text box, enter the subnet mask assigned to all wireless
clients.
Step 9 In the Lease Time text box, enter the amount of time (from 0 to 65536
seconds) that an IP address is granted to a client.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page16
Step 10 In the Default Routers text box, enter the IP address of the optional router
connecting the controllers. Each router must include a DHCP forwarding agent,
which allows a single controller to serve the clients of multiple controllers.
Step 11 In the DNS Domain Name text box, enter the optional domain name
system (DNS) domain name of this DHCP scope for use with one or more DNS
servers.
Step 12 In the DNS Servers text box, enter the IP address of the optional DNS
server. Each DNS server must be able to update a client’s DNS entry to match the
IP address assigned by this DHCP scope.
Step 13 In the NetBIOS Name Servers text box, enter the IP address of the
optional Microsoft Network Basic Input Output System (NetBIOS) name server,
such as the Internet Naming Service (WINS) server.
Step 14 From the Status drop-down list, choose Enabled to enable this DHCP
scope or choose Disabled to disable it.
Step 15 Click Apply to commit your changes.
Step 16 Click Save Configuration to save your changes.
Step 17 Choose DHCP Allocated Leases to see the remaining lease time for
wireless clients. The DHCP Allocated Lease page appears, showing the MAC
address, IP address, and remaining lease time for the wireless clients
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page17
 Using the GUI to Configure Dynamic Interfaces to configure a
primary DHCP server for a management, AP-manager, or dynamic
interface that will be assigned to the WLAN.
Step 1 Choose WLANs to open the WLANs page.
Step 2 Click the ID number of the WLAN for which you wish to assign an
interface. The WLANs > Edit
NOTE: When you want to use the internal DHCP server, you must set the
management interface IP address of the controller as the DHCP server IP address.
Step 3 On the General tab, unselect the Status check box and click Apply to
disable the WLAN.
Step 4 Re-click the ID number of the WLAN.
Step 5 On the General tab, choose the interface for which you configured a
primary DHCP server to be used with this WLAN from the Interface drop-down
list.
Step 6 Choose the Advanced tab to open the WLANs > Edit (Advanced) page.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page18
Step 7 If you want to define a DHCP server on the WLAN that will override the
DHCP server address on the interface assigned to the WLAN, select the DHCP
Server Override check box and enter the IP address of the desired DHCP server
in the DHCP Server IP Address text box. The default value for the check box is
disabled.
Note the preferred method for configuring DHCP is to use the primary DHCP
address assigned to a particular interface instead of the DHCP server override.
Note DHCP Server override is applicable only for the default group.
Step 8 If you want to require all clients to obtain their IP addresses from a DHCP
server, select the DHCP Address. Assignment required check box. When this
feature is enabled, any client with a static IP address is not allowed on the
network. The default value is disabled.
Note DHCP Address. Assignment required is not supported for wired guest
LANs.
Step 9 Click Apply to commit your changes.
Step 10 On the General tab, select the Status check box and click Apply to
reenable the WLAN.
Step 11 Click Save Configuration to save your changes.
Figure : WLAN>Edit>Advanced
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page19
7. Introduction to Virtual Box
What is Virtual Box?
Virtual Box is a free, open source, cross-platform application for creating,
managing and running virtual machines (VMs) – computers whose hardware
components are emulated by the host computer, the computer that runs the
program. How do I get it?
The easiest way to get the latest version of Virtual Box is to download it from the
download page of the Virtual Box website – http://www.virtualbox.org
There you can download the correct version for your platform, or if you’re using
Linux you can click through to find a list of instructions for various Linux
distributions.
For each Linux distribution you’re given the option of downloading either the
“i386”or “amd64” option. “i386” is the 32 bit version; “amd64” is the 64 bit
version. If you’re not sure which version of the operating system you’re using
you’re almost certainly using the 32 bit version and so you will want to download
the “i386” version of Virtual Box.
Installing Virtual Box is just like installing any other program on your platform,
so you shouldn’t have any problem with the installation. If you do get stuck
though, you can read the installation guide on the Virtual Box website.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page20
8. Microsoft Server as Virtual machine
To create a new virtual machine, you need to start VirtualBox In the toolbar, click
the New button. The New Virtual Machine Wizard is displayed in a new window
Click the Next button to move though the various steps of the wizard. The wizard
enables you to configure the basic details of the virtual machine. On the VM
Name and OS Type step, enter a descriptive name for the virtual machine in the
Name (Microsoft server 2012) field and select the operating system (Microsoft
Windows) and version (Windows 2012 64 bit) that you are going to install from
the drop-down lists, as shown in Figure 10. It is important to select the correct
operating system and version as this determines the default settings for Virtual
Box uses for the virtual machine. You can change the settings later after you have
created the virtual machine.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page21
On the Memory step, you can simply accept the default. This is the amount of
host memory (RAM) that Virtual Box assigns to the virtual machine when it runs.
You can change the settings of the virtual machine later, when you import the
template into Oracle VDI.
Figure : Memory size setup
On the Virtual Hard Disk step, ensure Start-up Disk is selected (see Figure) ,
select Create new hard disk and click Next. The Virtual Disk Creation Wizard
is displayed in a new window so you can create the new virtual disk.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page22
Figure : Virtual Hard Disk Step
On the following steps, select VDI (Virtual Box Disk Image) as the file type,
dynamically allocated as the storage details, and accept the defaults for the
virtual disk file location and size, and then click Create to create the virtual disk.
When the virtual disk is created, the Virtual Disk Creation Wizard is closed and
you are returned to the Summary step of the New Virtual Machine Wizard. Click
Create to create the virtual machine. The wizard is closed and the newly-created
virtual machine is listed in Oracle VM Virtual Box Manager, as shown in Figure
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page23
Figure-: Virtual Machine Added
Since you want to install an operating system in the virtual machine, you need to
make sure the virtual machine can access the installation media. To do this, you
edit the virtual machine settings. In Oracle VM VirtualBox Manager, select the
virtual machine and then in the toolbar click the Settings button. The Settings
window is displayed. In the navigation on the left, select Storage as shown in
Figure.
In the Storage Tree section, select Empty below the IDE Controller. The
CD/DVD Drive attributes are displayed. Click the CD/DVD icon next to the
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page24
CD/DVD Drive drop-down list and select the location of the installation media,
as follows:
drive to the host's physical CD/DVD
drive,
select Host Drive <drive-name>.
To insert an ISO image in the virtual CD/DVD drive, select Choose a virtual
CD/DVD disk file and browse for the ISO image.
Figure : Virtual Machine Storage Settings
Click OK to apply the storage settings. The Settings window is closed. If you
connected the virtual machine's CD/DVD drive to the host's physical CD/DVD
drive, insert the installation media in the host's CD/DVD drive now. You are now
ready to start the virtual machine and install the operating system.
In Oracle VM VirtualBox Manager, select the virtual machine and click the Start
button in the toolbar. A new window is displayed, which shows the virtual
machine booting up. Depending on the operating system and the configuration of
the virtual machine, VirtualBox might display some warnings first. It is safe to
ignore these warnings. The virtual machine should boot from the installation
media, as shown in Figure
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page25
Figure : An Installation Program in a Running Virtual Machine
You can now perform all your normal steps for installing the operating system.
Be sure to make a note of the user name and password of the administrator user
account you create in the virtual machine, which you will need in order to log in
to the virtual machine. Do not join the virtual machine to a Windows domain (it
can be a member of a workgroup) as the domain configuration is performed later.
The virtual machine might reboot several times during the installation. When the
installation is complete, you might also want to let Windows Update to install any
updates.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page26
 Installing Active Directory and DHCP and DNS
Before proceeding to anything else , make sure that you have set up the IP address
of the Server to be Static.
Follow the steps to make IP address set to static –
Open the network and sharing center
Click on Change Adapter Settings
• Right click on the network adapter
• Select Properties
• Select Internet Protocol Version 4
• Click Properties
• Type in your Static IP address configuration
• Click OK
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page27
Figure : Static IP on Microsoft Server
1. Open the Server Manager from the task bar.
2. From the Server Manager Dashboard, select Add roles and features.
Figure : Server’s Dashboard
This will launch the Roles and Features Wizard allowing for modifications to be
performed on the Windows Server 2012 instance.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page28
Select Role-based or features-based installation from the Installation Type
screen and click Next.
3) The current server is selected by default. Click Next to proceed to the Server
Roles tab.
4) From the Server Roles page place a check mark in the check box next to
Active Directory Domain Services, DNS,and DHCP. A notice will appear
explaining additional roles services or features are also required to install
domain services, click Add Features
5) Review and select optional features to install during the AD DS installation
by placing a check in the box next to any desired features, and then click
Next.
Figure : Addition of Roles in Microsoft server
6) Review the information on the Tab and click Next.
7) On the Confirm installation selections screen, review the installation and
then click Install.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page29
Note: The installation progress will be displayed on the screen. Once
installed, the AD DS role will be displayed on the ‘Server Manager’ landing
page
Once the installation of DNS, DHCP and Active Directory roles is
complete you will get a notification in the Server Manager console to
“Promote this server to a domain controller” and to “Complete DHCP
configuration”. You can to run the “Promote this server to a domain
controller” first, click on that.
Figure : Notification after Installation
 Configure Active Directory
Once the AD DS role is installed the server will need to be configured for
your domain.
1) If you have not done so already, Open the Server Manager from the task
bar.
2) Open the Notifications Pane by selecting the Notifications icon from the
top of the Server Manager. From the notification regarding configuring AD
DS, click Promote this server to a domain controller.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page30
Figure : Configure Active Directory
3) You can change the name of your server if you want to, it can be done in
following way which is demonstrated by the above given figures –
(i) From the LOCAL SERVER display board, double click
on computer name. the following dialog box will
appear
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page31
(ii) Now click on change to rename your server
(iii) Now enter the desired name for computer and for your
workgroup.
(iv) Click OK to finish it.
(v) The changed computer name along with the workgroup
name will be seen on LOCAL SERVER display board
as shown in figure.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page32
Figure – Updated Computer name and Workgroup name.
4) From the Deployment Configuration tab select Add a new forest from the
radial options menu. Insert your root domain name into the Root domain
name field, and then click Next.
5) Select a Domain and Forest functional level, and then input a password for
the Directory Services Restore Mode (DSRM) in the provided password
fields
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page33
The DSRM password is used when booting the Domain Controller into
recovery mode.
6) Review the warning on the DNS Options tab and select Next. 7) Confirm
or enter a NetBIOS name and click Next.
8) Specify the location of the Database, Log files, and SYSVOL folders and then
click Next. (by default)
9) Review the configuration options and click Next.
10) The system checks to ensure all necessary prerequisites are installed on
the system prior to moving forward. If the system passes these checks,
proceed by clicking Install. After this the System will reboot.
Login into server again using your name and password.
 Configure DHCP server
Log into the server and open DHCP in the start menu. You will notice that it is
not configured yet
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page34
1) “Complete DHCP configuration”.
2) This provides some tasks that need to be performed to enable the DHCP
server role to work properly after role installation.
Figure : The last page of Add Role Wizard after DHCP role installation 3)
Launch the DHCP post-install wizard and complete the steps required.
4) Creation of DHCP security groups (DHCP Administrators and DHCP
Users). For these security groups to be effective, the DHCP server service
needs to be restarted. This will need to be performed separately by the
administrator.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page35
Figure : DHCP Post-Install configuration wizard – Introduction Page
5) Authorization of DHCP server in Active Directory (only in case of a
domain-joint setup). In a domain joined environment, only after the
DHCP server is authorized, it will start serving the DHCP client requests.
Authorization of DHCP server can only be performed by a domain user
that has permissions to create objects in the Net services container in
Active Directory.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page36
Figure : DHCP Post-Install configuration wizard – Authorization Page 6)
After that, enter the scope name as you desire.
7) After that, define the IP address range for your DHCP scope.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page37
Figure : IP adress range page 8)
Set Lease time.
9) Configure DHCP option.
10) After that, set Default gateway
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page38
11) Now enter Domain name and DNS server details. On the Domain
Name and DNS Servers screen, enter the IP addresses of all DNS
servers the client should use. Click Next when done
12) On the WINS Servers screen, if you have WINS servers add them
here. Click Next when done.
Most Windows environments no longer use WINS for name resolution.
Although, some legacy applications and hardware may still require it, so
check your environment before skipping this
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page39
13) On the Activate Scope page, select Yes, I want to activate this
scope now. A scope must be activated before it is allowed to assign
clients IP addresses. If you do not want to activate it at this time,
select No, I will activate this scope later. Click Next when done.
14) Click Finish.
9) 802.1X Authentication via WiFi – Active Directory +
Network Policy Server + Cisco WLAN + Group Policy
Here is how to implement 802.1X authentication in a Windows Server 2012 R2
domain environment using Protected-EAP authentication. By creating the
Network Policy server first, once we switch the authentication type from
whatever to 802.1X via RADIUS, our Network Policy Server will immediately
start processing requests and allowing machines on the domain. By configuring
the Cisco Wireless LAN Controller or Group Policy first, clients will try
connecting to a RADIUS server that doesn’t exist or present invalid credentials.
A. Active Directory
First, we need to create a security group in Active Directory to allow a list of
specific users and computers to login to the domain.
a) Create User Account in Server 2012 Domain Controller
Here I will create user account in server 2012 domain controller using AD Users
and Computers snap-in.
Step 1: Open AD Users and Computers snap-in from Server Manager.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page40
Step 2: Create an Organizational Unit
Organizational Unit or simply OU is a container object of AD domain which can
hold users, computers, and other objects. Basically, you create user accounts and
computers inside an OU. I will create an OU named Management. Right-click
domain in AD users and Computers, choose New and click Organizational Unit.
Type Management to name the OU. Check the Protect container from
accidental deletion option. This option will protect this object from accidental
deletion.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page41
Step 3: Create New User
Right-click the Management OU, click New and click User
Now type the user information. Type the first name and last name. Here user
logon name is the name that the user will use to actually log in the computer in
the network. So when user tries to log in, he will type this name on username
field. Now click Next.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page42
Now type the password. Check user must change password at next logon. The
user will be forced to change the password when user logs in. Click Next.
Review the user configuration and click Finish.
You have successfully created a user account. You can open the properties of the
user account to tweak settings.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page43
This process is useful if you have to create couple of user accounts. But imagine,
if you have to create hundreds or thousands of users. This process would be very
time-consuming. So to create many users within minutes you can use Windows
PowerShell scripts using NewADusercmdletor batch script using DsAdd
command.
In this example, we will allow any authenticated user or machine on the domain
to authenticate successfully to the RADIUS sever. In the screenshot below, we
can see I have added both Domain Users and Domain Computers to a security
group called WirelessAccess. Here is a screenshot with the above settings.
B. Network Policy Server
1. Open up Server Manager, click Add Roles, click Next on the
Before You Begin screen, check Network Policy and Access
Services and click Next, click Next on the Introduction screen,
check Network Policy Server (leave the rest unchecked) and click
Next, click Install.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page44
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page45
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page46
2. Once Network Policy Server is installed, launch the Network Policy
Server snap-in (via MMC or Administrative Tools)
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page47
3. Inside of Network Policy Server, on NPC (Local), select RADIUS
server for 802.1X
Wireless or Wired Connections from the dropdown and click
Configure 802.1X
a) On the Select 802.1X Connections Type page, select Secure
Wireless Connections, and enter My Company’s Wireless. Click Next.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page48
b) Click on the Add… button. Enter the following settings
▪ Friendly name: Cisco WLAN Controller
▪ Address: Enter your WLAN Controller’s IP address
▪ Select Generate, click the Generate button, and then copy down
the Shared Secret the wizard generated (we will use this later
to get the WLAN Controller to talk to the RADIUS server).
Click OK.
c) Click Next.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page49
c) On the Configure an Authentication Method, select Microsoft:
Protected EAP (PEAP).
Click Next.
d) Click Next on the Specify User Groups (we will come back to this)
e) Click Next on the Configure Traffic Controls page.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page50
f) Click Finish
4. Click on NPS (Local) -> Policies -> Network Policies. Right
click Secure Wireless Connections and click Properties.
5. Click on the Conditions tab, select NAS Port Type, and click
Remove
6. Still on the Conditions tab, click Add…, select Windows Groups
and click Add…, click Add Groups…, search for
WirelessAccess and click OK. Click OK on the Windows Groups
dialog box, click Apply on the Secure Wireless Connections
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page51
Properties box. You should now have something like the image
below:
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page52
Figure : Network Policy server
7. Click on the Constraints tab.
a) Uncheck all options under Less secure authentication methods.:
b) Click Apply.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page53
C. Cisco WLAN
1. Login to your Cisco Wireless LAN Controller
2. Add a RADIUS server to your controller
a) Click on the Security tab
b) Select AAA -> Radius -> Authentication on the left side
c) Click the New… button in the top right
• Server IP Address: 192.168.10.100 (The IP address of your NPS
server we setup earlier)
• Shared Secret Format: ASCII
• Shared Secret: The long generated password you wrote down when
setting up the Network Policy Server
• Confirm Shared Secret: Same password in previous step
• Key Wrap: unchecked
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page54
• Port Number: 1812
• Server Status: Enabled
• Support for RFC 3576: Enabled
• Server Timeout: 2
• Network User: Checked
• Management: Checked
• IP Sec: Unchecked
• Here is a screenshot with the above settings
CISCO WLAN >Security> AAA>RADIUS
3. Create or modify a wireless network to use 802.1X
a) Click on the WLANs tab
b) Create a new wireless network or select an existing WLAN ID to
edit
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page55
c) On the “WLANs > Add/Edit ‘My SSID'” page, use the following
settings
d) Security tab
1. Layer 2 Tab
a) Layer 2 Security: WPA+WPA2
b) MAC Filtering: Unchecked
c) WPA+WPA2 Parameters 1. WPA Policy: Unchecked
2. WPA2 Policy: Checked
3. WPA2 Encryption: AES checked, TKIP unchecked
4. Auth Key Mgmt: 802.1X
d) Here is a screenshot of the above settings
Wlan> layer 2 policies
2. Layer 3 Tab
a) Layer 3 Security: none
Web Policy: unchecked
3. AAA Servers Tab
a) Authentication Servers: checked Enabled
b) Server 1: Select your RADIUS server from the dropdown
c) Local EAP Authentication: Unchecked
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page56
D. Group Policy
1. Go to your domain controller and open up the Group Policy
Management console.
2. Right click the Organizational Unit you want to apply to policy to
and select Create a GPO in this domain, and Link it here…
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page57
Note, the policy must be linked to the OU containing a group of machines you
want to have WiFi access to or a parent of the OU.
3. Enter in 802.1X WiFi Policy for the Name and click OK
4. Right click your new GPO and click Edit
5. Navigate to Computer Configuration->Policies->Windows
Settings->Security Settings->Wireless Network (IEEE 802.11)
Policies
6. Right click and select Create A New Wireless Network Policy for
Windows Vista and Later Releases
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page58
5. Ensure the following settings are set for your Windows Vista and
Later Releases policy
1. General Tab
a) Policy Name: My Wireless Policy for Vista and Later Clients
b) Description: Vista and later wireless network for my company.
c) Check Use Windows WLAN AutoConfigure service for clients
d) Here is a screenshot with the above settings
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page59
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page60
e) Click the Add… button and select Infrastructure
I. Connection Tab
Profile Name: My Network
1. Enter in your SSID (Wireless network name that gets broadcasted)
and click the Add… button
2. Check Connect Automatically when this network is in range
II. Security Tab
1. Authentication: WPA2-Enterprise
2. Encryption: AES
3. Select a network authentication method: Microsoft Protected EAP
(PEAP)
4. Authentication Mode: User or Computer authentication
5. Max Authentication Failures: 1
6. Check Cache user information for subsequent connections to this
network
7. Click OK
II. Network Permission Tab
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page61
a) Enter your network into Define permissions for viewing and connection
to wireless networks if it hasn’t been added already Uncheck Prevent
connections to ad-hoc networks
b) Uncheck Prevent connections to infrastructure networks
c) Check Allow user to view denied networks
d. Check Allow everyone to create all user profiles
e. Uncheck Only use Group Policy profiles for allowed networks
f. Leave all Windows 7 policy settings unchecked
g. Here is a screenshot with the above settings (to infrastructure
networks).
h. Click OK
1. Right click and select Create A New Windows XP Policy
2. Ensure the following settings are set for your Windows XP Policy
1. General Tab
a. XP Policy Name: My Wireless Policy for XP
Machines
b. Description: My wireless policy for XP machines.
c. Networks to access: Any available network (access
point preferred)
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page62
d. Check Use Windows WLAN AutoConfigure service
for clients
e. Uncheck Automatically connect to non-preferred
networks
2. Preferred Networks Tab
a. Click the Add… button and select Infrastructure
I. Network Properties Tab
1. Network name (SSID): My SSID
2. Description: My wireless network
3. Uncheck Connect even if network is not broadcasting
4. Authentication: WPA2
5. Encryption: AES
6. Check Enable Pairwise Master Key (PMK) Caching
7. Uncheck This network uses pre-authentication 8. Here is a picture
of the above settings
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page63
I. IEEE 802.1X Tab
1. EAP Type: Microsoft: Protected EAP (PEAP)
2. EAP Start Message: Transmit
3. Authentication Mode: User or Computer Authentication
4. Check Authenticate as computer when computer information is
available
5. Uncheck Authentication as guest when user or computer information
is unavailable
III. Click OK
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page64
10) INTRODUCING REDUNDANCY ON WLC’S
When an AP is fully joined to a controller, the AP learns of all the controllers
configured in that mobility group. Should the controllers that an AP is currently
registered with go down, the AP will send discoveries to any and all controllers
in the mobility group. Assuming one of the controller has the capacity to accept
the AP, the AP should join the least loaded controller it can find. If many
controllers in the mobility group, it can be difficult to determine what controller
the APs will join should their current controller fail.
If you want to have more control over how the APs move between controllers on
your network, you can configure the APs with Primary, Secondary & Tertiary
controller names. With the controller name configured on APs, the APs always
try to register the primary controller first. Should the primary controller go down,
the AP tries to register with the secondary controller. If the AP is not able to join
any of the configured controllers, it try to join any controller with Master
Controller setting configured, or if no Master Controller, then the least loaded
controller in the Mobility Group.
AP Failover priority can be used to determine who will register for a controller if
there is a contention. You can configure your wireless network so that the backup
controller recognize a join request from a higher priority AP and if necessary
disassociates a lower priority AP as a means to provide an available port for
higher fail over priority AP.
Before setting up redundancy, following are the points to remember –
• The setup provides redundancy for controllers across separate data centers
with low cost of deployment.
• These WLCs are independent of each other and do not share
configuration or IP addresses on any of their interfaces. Each WLC needs
to be managed separately, can run a different hardware and a different
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page65
software version, and can be deployed in different datacenters across the
WAN link.
• We must configure and manage both WLC separately.
• When a primary WLC resumes operation, the APs fall back from the
backup WLC to the primary WLC automatically if the AP fallback
option is enabled.
Step1: Configure both WLC’s and just make sure the hostname and IP address
used for management and the dynamic interfaces are different.
As we have configured the primary controller, we will configure the secondary
controller.
To configure the secondary controller, follow the direction as discussed in the
report earlier to configure the primary WLC.
The only difference will be the use of different IP address along with different
Hostname.
For Primary WLC, hostname- HumberController
IP add- 192.168.100.10
For Secondary WLC, hostname-HumberController2
IP add- 193.178.100.10
i Create WLAN
After configuring Secondary WLC, create a Wlan as we did in Primary
WLC.
Figure: WLAN Edit page ii Create DHCP Scope
Next we have to create a DHCP pool, in order to define the range of Ip
addresses.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page66
Figure: DHCP SCOPE
Figure: DHCP Scope > Edit
iii Enabling RADIUS SERVER
Here we will be linking the Server we created on virtual machine, the one we
linked earlier for Primary WLC.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page67
Figure: RADIUS Authentication Servers > New
Figure: Wlans > Edit > Security > AAA Servers
Step2: Go to Primary Controller GUI and navigate to Wireless > Access
Points > Global Configuration, then configure the backup controller on
the primary to point to the secondary controller.
Here is the screenshot of above mentioned step.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page68
Figure: Primary WLC >
Wireless > Access Points > Global Configuration
Step3: Configure High Availability to input Primary and Backup controller IP
Address at Wireless AP.
Go to Wireless > Access Point > All APs, select specific AP and then Click on
High Availability tab.
Enter the primary WLC, secondary WLC IP and name here. Make sure that the
WLC name we entered on the AP high availability tab is correct and is case
sensitive.
Step4: Configure Mobility Group on both Primary and Secondary Controllers.
Go to Primary WLC GUI then navigate to Controller >
MobilityManagement > Mobility Groups and then click on new, enter the
details of secondary controller.
Here is the screenshot –
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page69
Figure: Primary WLC > Controller > Mobility Groups > New
Same on secondary WLC:
Go to Secondary WLC GUI then navigate to Controller >
MobilityManagement > Mobility Groups and then click on new, enter the
details of Primary controller.
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page70
Figure: Secondary WLC > Controller > Mobility Groups > New
HOW to FIND MAC ADDRESS OF WLC –
We will be needing MAC address of respective WLC’s in order to complete the
above given configuration.
To find MAC Address of the WLC, go to CONTROLLER > Inventory.
It will provide the Mac address. Here is the screenshot –
Figure: For MAC Address , go to Controller > Inventory
Step5: Enable Secondary Unit
Well, this option should be enabled on both the WLC’s for redundancy to work.
This option can be selected under CONTROLLER >GENERAL > HA SKU
Secondary Unit.
Here is the screenshot –
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page71
Figure : Controller > General > HA SKU Secodary Unit
SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY
HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH
Page72
REFERENCES
1) http://www.cisco.com/c/en/us/td/docs/wireless/controller/80/configuration
guide/b_cg80/b_cg80_chapter_010.html
2) Project Report on Securing Wireless Network for an Enterprise By
Bhawandeep Singh & Amandeep Kaur
3) https://blogs.technet.microsoft.com/canitpro/2015/01/19/stepby-step-
creating-awork-folders-test-lab-deployment-in-windowsserver-2012-r2/
4) https://www.youtube.com/watch?v=0WyBxwJD_c0
5) http://www.cisco.com/c/en/us/support/docs/wirelessmobility/wireless-
vlan/71477ap-group-vlans-wlc.html 6)
http://www.cisco.com/c/en/us/support/docs/wireless/2500series-
wirelesscontrollers/113034-2500-deploy-guide-00.html#anc25 7)
http://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/Febru
ary2013/Cisco_SBA_ BN_WirelessLANDeploymentGuideFeb2013.pdf
8) https://mrncciew.com/2013/04/07/ap-failover/
9) https://rscciew.wordpress.com/2014/06/07/n1-high-
availabilityconfiguration-on-cisco-2504wlc/
10) http://www.cisco.com/c/en/us/td/docs/wireless/technology/hi_av
ail/N1_High_Availability_Deployment_Guide.pdf

More Related Content

What's hot

Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2Alert Logic
 
Doc 39 Technical Brief on Broadband Last Mile Connectivity for SBI Colony
Doc 39 Technical Brief on Broadband Last Mile Connectivity for SBI ColonyDoc 39 Technical Brief on Broadband Last Mile Connectivity for SBI Colony
Doc 39 Technical Brief on Broadband Last Mile Connectivity for SBI ColonyNicheken Technologies Pvt Ltd
 
Usb wifi adapter, 600 mbps dual band 802.11ac driver
Usb wifi adapter, 600 mbps dual band 802.11ac driverUsb wifi adapter, 600 mbps dual band 802.11ac driver
Usb wifi adapter, 600 mbps dual band 802.11ac driverizzall
 
Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videorobbuddingh
 

What's hot (6)

Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2Cloud Security Topics: Network Intrusion Detection for Amazon EC2
Cloud Security Topics: Network Intrusion Detection for Amazon EC2
 
Doc 39 Technical Brief on Broadband Last Mile Connectivity for SBI Colony
Doc 39 Technical Brief on Broadband Last Mile Connectivity for SBI ColonyDoc 39 Technical Brief on Broadband Last Mile Connectivity for SBI Colony
Doc 39 Technical Brief on Broadband Last Mile Connectivity for SBI Colony
 
NOTES
NOTESNOTES
NOTES
 
Usb wifi adapter, 600 mbps dual band 802.11ac driver
Usb wifi adapter, 600 mbps dual band 802.11ac driverUsb wifi adapter, 600 mbps dual band 802.11ac driver
Usb wifi adapter, 600 mbps dual band 802.11ac driver
 
Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_video
 
Designing for the all wireless office ash chowdappa-kelly griffin
Designing for the all wireless office ash chowdappa-kelly griffinDesigning for the all wireless office ash chowdappa-kelly griffin
Designing for the all wireless office ash chowdappa-kelly griffin
 

Similar to Project report on secured wireless network for an enterprise with redundancy

How to configure a cisco wireless access point (ap) from scratch
How to configure a cisco wireless access point (ap) from scratchHow to configure a cisco wireless access point (ap) from scratch
How to configure a cisco wireless access point (ap) from scratchIT Tech
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliationGurjan Oberoi
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKLAaron ND Sawmadal
 
CYB 360 Education Specialist |tutorialrank.com
CYB 360 Education Specialist |tutorialrank.comCYB 360 Education Specialist |tutorialrank.com
CYB 360 Education Specialist |tutorialrank.comladworkspaces
 
Cyb 360 academic adviser ....tutorialrank.com
Cyb 360 academic adviser ....tutorialrank.comCyb 360 academic adviser ....tutorialrank.com
Cyb 360 academic adviser ....tutorialrank.comladworkspaces
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security TipsPECB
 
LD7007 Network Security.docx
LD7007 Network Security.docxLD7007 Network Security.docx
LD7007 Network Security.docxstirlingvwriters
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsAlane Moran
 
Aerohive - The Connected Experience
Aerohive - The Connected ExperienceAerohive - The Connected Experience
Aerohive - The Connected ExperienceVITO - Securitas
 
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptxA Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptxYousef Al-Mutayeb
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart DepartmentIRJET Journal
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)Bryan Moss
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
Enterprise networking course work under NCC Education
Enterprise networking course work under NCC EducationEnterprise networking course work under NCC Education
Enterprise networking course work under NCC EducationMd. Mahbub Alam
 

Similar to Project report on secured wireless network for an enterprise with redundancy (20)

How to configure a cisco wireless access point (ap) from scratch
How to configure a cisco wireless access point (ap) from scratchHow to configure a cisco wireless access point (ap) from scratch
How to configure a cisco wireless access point (ap) from scratch
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
 
Study Wireless Security Deployment - PKL
Study Wireless Security Deployment  - PKLStudy Wireless Security Deployment  - PKL
Study Wireless Security Deployment - PKL
 
Sdn primer pdf
Sdn primer pdfSdn primer pdf
Sdn primer pdf
 
CYB 360 Education Specialist |tutorialrank.com
CYB 360 Education Specialist |tutorialrank.comCYB 360 Education Specialist |tutorialrank.com
CYB 360 Education Specialist |tutorialrank.com
 
Cyb 360 academic adviser ....tutorialrank.com
Cyb 360 academic adviser ....tutorialrank.comCyb 360 academic adviser ....tutorialrank.com
Cyb 360 academic adviser ....tutorialrank.com
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
LD7007 Network Security.docx
LD7007 Network Security.docxLD7007 Network Security.docx
LD7007 Network Security.docx
 
En35793797
En35793797En35793797
En35793797
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
 
Aerohive - The Connected Experience
Aerohive - The Connected ExperienceAerohive - The Connected Experience
Aerohive - The Connected Experience
 
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptxA Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).pptx
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Zoom user manual
Zoom user manualZoom user manual
Zoom user manual
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart Department
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Cyberdyne systems (2)
Cyberdyne systems (2)Cyberdyne systems (2)
Cyberdyne systems (2)
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Enterprise networking course work under NCC Education
Enterprise networking course work under NCC EducationEnterprise networking course work under NCC Education
Enterprise networking course work under NCC Education
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Project report on secured wireless network for an enterprise with redundancy

  • 1. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH PROJECT REPORT ON SECURED WIRELESS NETWORK FOR AN ENTERPRISE Wireless Project - WLS 5507 – 0NA Submitted To: Submitted By: Prof. Waleed Ejaz Harkirat Singh Dhillon Varinder Singh Tarandeep Kaur
  • 2. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page1 This Project is regarding the security of an Enterprise Network. In this project we will create a secure Wlan network using CISCO controller, light Aps and external Server. Our motive is to secure network by providing every employee of the company with his/her own username and password in order to connect to the network. To secure the network we will use WPA2 and AES encryption in our project.It is not feasible to use a single password for the whole network as it can expose the network to rogue attacks and hackers resulting in data theft or compromising the secuirty of whole company’s network.Also, we will introduce redudancy in the network in case one controller fails the other one can do the job without a hinch. The management of the whole network is centeralized i.e. the whole setup can be managed from one place. Wireless LAN controllers are responsible for systemwide WLAN functions and provide centralized management. Large number of AP’s can be managed by single controller and also easy to deploy and removal of APs. We created an external DHCP server, which provides IP addresses to the devices. We can track which devices are connected to the network on this server. Active directory is also a major part of this project in which we create user credentials for different users. It provide centralized repository for user account information, directory authentication, authorization and assignment of right and permissions. It maintains the relationship between resources and enable them to work together. A Network Policy has been created for authentication of Wi-Fi network on RADIUS authentication and authorization sever. A particular user can be de-authorized, without changing key for everyone. It has ability to direct users into particular user profiles based on RADIUS attribute. Also we can add new users and remove retired users. It is potential solution to setup a secured wireless network for an enterprise.
  • 3. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page2 Acknowledgement We are grateful to Prof Waleed Ejaz, project in charge for unflinching support, guidance and pearls of wisdom to enable me to complete this project. The way he instilled knowledge of the module was undoubtly praise worthy and valuable. We are also grateful to my Coordinator of Department Prof. Kevin Ramdass and Mehdi Akbari for the supervision and encouragement during course. We are also thankful to Humber College as a whole that is doing yeoman’s service by teaching the learner abreast with the RF technology, telecom, networking etc. knowledge that is the need of the day. We are grateful to Bhawandeep Singh and Amandeep Kaur Randhawa for providing us with their project report and work. We found it utmost useful for guidance and completion of our project. Last but not the least: We thank all classmates at Humber College for extending kind cooperation.
  • 4. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page3 INDEX Contents 1. Network topology.....................................................................................................4 2. Components Used.....................................................................................................5 2. Basic step to be followed in controller configuration..............................................6 4. Setting up Cisco Wireless Controller using Cisco WLAN Express ........................7 (Wired Method)...............................................................................................................7 5. Using the GUI to Create WLANs ..........................................................................12 6. Using the GUI to Configure DHCP Scope.............................................................15 7. Introduction to Virtual Box.......................................................................................19 8. Microsoft Server as Virtual machine ........................................................................20  Configure DHCP server............................................................................................33 9) 802.1X Authentication via WiFi – Active Directory + Network Policy Server + Cisco WLAN + Group Policy........................................................................39 10) INTRODUCING REDUNDANCY ON WLC’S...................................................64 REFERENCES..............................................................................................................72
  • 5. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page4 1. Network topology
  • 6. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page5 2. Components Used A. Wireless controller – 2x a. Hardware Specifications b. Data Ports - 4 x 1 Gigabit Ethernet Ports c. Console Port - 1 x RJ45 d. External 48V Power Supply B. Access points C. Ethernet cables D. Console cables E. Laptop additional server
  • 7. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page6 2. Basic step to be followed in controller configuration Figure 2: Controller basic setup
  • 8. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page7 4. Setting up Cisco Wireless Controller using Cisco WLAN Express (Wired Method) Step 1 Connect the laptop’s wired Ethernet port directly to the service port of WLC (port no. 1). The port LEDs blink to indicate that both the machines are properly connected NOTE: It may take several minutes for the WLC to fully power on to make the GUI available to the PC. Do not auto-configure the WLC. Figure 3: Wireless controller The LEDs on the front panel provide the system status: If the LEDs is off, it means that the WLC is not ready. If the LEDs is solid green , it means that the WLC is ready Step 2 Assign a static IP address 192.168.1.X to the laptop to access the WLC GUI Step 3 Open any one of the following supported web browsers and type http://192.168.100.10 (the ip address may get changed because the WLC’s are used in lab experiments, but you can change it to desired ip address by configuring the WLC through console cable and Putty )
  • 9. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page8 If you are unable to login into WLC , then join the console cable and open Putty software for WLC 2504 initial configuration. Putty>Serial>ok After that a command box will open and type the following commands for configuration of WLC- >Clear config Are you sure you want to clear configuration ? (y/n) Y >reset system The system has unsaved changes. Would you like to save them now ? (y/n) N Configuration not saved ! Are you sure you would like to reset the system ? (y/n) Y This will take some time as the system will be restarted
  • 10. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page9 When system will come live again, do the following configuration
  • 11. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page10 Now, the WLC has been configured it can be accessed by typing the ip address we assigned it in the configuration.
  • 12. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page11 Step 4 Login into WLC Username- admin Password- Humber1 (set in configuration) Step 5 Go to ADVANCE option which appear when you will login into WLC. After that browse the COMMAND>SET TIME This option will let you set the current time in order you were unable to configure it. It is necessary to set the time because the AP’s will not work if the time is not set to current time.
  • 13. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page12 5. Using the GUI to Create WLANs To create WLANs using the GUI, follow these steps: Step 1 Go to WLANs page. Figure- Wlan page
  • 14. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page13 This page lists all of the WLANs currently configured on the controller. For each WLAN, you can see its WLAN ID, pro le name, type, SSID, status, and security policies. The total number of WLANs appears in the upper right-hand corner of the page. If the list of WLANs spans multiple pages, you can access these pages by clicking the page number links. Step 2 Create a new WLAN by choosing Create New from the drop-down list and clicking Go. After this the following page will pop-up, add the details as you desire. Wlan> new page Step 3 From the Type drop-down list, choose WLAN to create a WLAN. Step 4 In the Profile Name text box, enter up to 32 alphanumeric characters for the profile name to be assigned to this WLAN. The profile name must be unique. Step 5 In the WLAN SSID text box, enter up to 32 alphanumeric characters for the SSID to be assigned to this WLAN. Step 6 From the WLAN ID drop-down list, choose the ID number for this WLAN. Step 7 Click Apply to commit your changes. The WLANs > Edit page appears
  • 15. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page14 Figure : WLANs > Edit Page Step 8 Use the parameters on the General, Security, QoS, and Advanced tabs to configure this WLAN. Seethe sections in the rest of this chapter for instructions on configuring specific features for WLANs. Step 9 On the General tab, select the Status check box to enable this WLAN. Be sure to leave it unselected until you have finished making configuration changes to the WLAN. Step 10 Click Apply to commit your changes. Step 11 Click Save Configuration to save your changes.
  • 16. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page15 6. Using the GUI to Configure DHCP Scope Step 1 Choose Controller > Internal DHCP Server > DHCP Scope to open the DHCP Scopes page >DHCP Scopes NOTE: If you ever want to delete an existing DHCP scope, hover your cursor over the blue drop-down arrow for that scope and choose Remove. Step 2 Click New to add a new DHCP scope. The DHCP Scope > New page appears. Step 3 In the Scope Name text box, enter a name for the new DHCP scope. Step 4 Click Apply. When the DHCP Scopes page reappears, click the name of the new scope. The DHCP Scope > Edit page appears DHCP Scope > Edit Page Step 5 In the Pool Start Address text box, enter the starting IP address in the range assigned to the clients. NOTE: This pool must be unique for each DHCP scope and must not include the static IP Step 6 In the Pool End Address text box, enter the ending IP address in the range assigned to the clients. NOTE: This pool must be unique for each DHCP scope and must not include the static IP addresses of routers or other servers. Step 7 In the Network text box, enter the network served by this DHCP scope. This IP address is used by the management interface with Netmask applied, as configured on the Interfaces page. Step 8 In the Netmask text box, enter the subnet mask assigned to all wireless clients. Step 9 In the Lease Time text box, enter the amount of time (from 0 to 65536 seconds) that an IP address is granted to a client.
  • 17. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page16 Step 10 In the Default Routers text box, enter the IP address of the optional router connecting the controllers. Each router must include a DHCP forwarding agent, which allows a single controller to serve the clients of multiple controllers. Step 11 In the DNS Domain Name text box, enter the optional domain name system (DNS) domain name of this DHCP scope for use with one or more DNS servers. Step 12 In the DNS Servers text box, enter the IP address of the optional DNS server. Each DNS server must be able to update a client’s DNS entry to match the IP address assigned by this DHCP scope. Step 13 In the NetBIOS Name Servers text box, enter the IP address of the optional Microsoft Network Basic Input Output System (NetBIOS) name server, such as the Internet Naming Service (WINS) server. Step 14 From the Status drop-down list, choose Enabled to enable this DHCP scope or choose Disabled to disable it. Step 15 Click Apply to commit your changes. Step 16 Click Save Configuration to save your changes. Step 17 Choose DHCP Allocated Leases to see the remaining lease time for wireless clients. The DHCP Allocated Lease page appears, showing the MAC address, IP address, and remaining lease time for the wireless clients
  • 18. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page17  Using the GUI to Configure Dynamic Interfaces to configure a primary DHCP server for a management, AP-manager, or dynamic interface that will be assigned to the WLAN. Step 1 Choose WLANs to open the WLANs page. Step 2 Click the ID number of the WLAN for which you wish to assign an interface. The WLANs > Edit NOTE: When you want to use the internal DHCP server, you must set the management interface IP address of the controller as the DHCP server IP address. Step 3 On the General tab, unselect the Status check box and click Apply to disable the WLAN. Step 4 Re-click the ID number of the WLAN. Step 5 On the General tab, choose the interface for which you configured a primary DHCP server to be used with this WLAN from the Interface drop-down list. Step 6 Choose the Advanced tab to open the WLANs > Edit (Advanced) page.
  • 19. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page18 Step 7 If you want to define a DHCP server on the WLAN that will override the DHCP server address on the interface assigned to the WLAN, select the DHCP Server Override check box and enter the IP address of the desired DHCP server in the DHCP Server IP Address text box. The default value for the check box is disabled. Note the preferred method for configuring DHCP is to use the primary DHCP address assigned to a particular interface instead of the DHCP server override. Note DHCP Server override is applicable only for the default group. Step 8 If you want to require all clients to obtain their IP addresses from a DHCP server, select the DHCP Address. Assignment required check box. When this feature is enabled, any client with a static IP address is not allowed on the network. The default value is disabled. Note DHCP Address. Assignment required is not supported for wired guest LANs. Step 9 Click Apply to commit your changes. Step 10 On the General tab, select the Status check box and click Apply to reenable the WLAN. Step 11 Click Save Configuration to save your changes. Figure : WLAN>Edit>Advanced
  • 20. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page19 7. Introduction to Virtual Box What is Virtual Box? Virtual Box is a free, open source, cross-platform application for creating, managing and running virtual machines (VMs) – computers whose hardware components are emulated by the host computer, the computer that runs the program. How do I get it? The easiest way to get the latest version of Virtual Box is to download it from the download page of the Virtual Box website – http://www.virtualbox.org There you can download the correct version for your platform, or if you’re using Linux you can click through to find a list of instructions for various Linux distributions. For each Linux distribution you’re given the option of downloading either the “i386”or “amd64” option. “i386” is the 32 bit version; “amd64” is the 64 bit version. If you’re not sure which version of the operating system you’re using you’re almost certainly using the 32 bit version and so you will want to download the “i386” version of Virtual Box. Installing Virtual Box is just like installing any other program on your platform, so you shouldn’t have any problem with the installation. If you do get stuck though, you can read the installation guide on the Virtual Box website.
  • 21. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page20 8. Microsoft Server as Virtual machine To create a new virtual machine, you need to start VirtualBox In the toolbar, click the New button. The New Virtual Machine Wizard is displayed in a new window Click the Next button to move though the various steps of the wizard. The wizard enables you to configure the basic details of the virtual machine. On the VM Name and OS Type step, enter a descriptive name for the virtual machine in the Name (Microsoft server 2012) field and select the operating system (Microsoft Windows) and version (Windows 2012 64 bit) that you are going to install from the drop-down lists, as shown in Figure 10. It is important to select the correct operating system and version as this determines the default settings for Virtual Box uses for the virtual machine. You can change the settings later after you have created the virtual machine.
  • 22. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page21 On the Memory step, you can simply accept the default. This is the amount of host memory (RAM) that Virtual Box assigns to the virtual machine when it runs. You can change the settings of the virtual machine later, when you import the template into Oracle VDI. Figure : Memory size setup On the Virtual Hard Disk step, ensure Start-up Disk is selected (see Figure) , select Create new hard disk and click Next. The Virtual Disk Creation Wizard is displayed in a new window so you can create the new virtual disk.
  • 23. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page22 Figure : Virtual Hard Disk Step On the following steps, select VDI (Virtual Box Disk Image) as the file type, dynamically allocated as the storage details, and accept the defaults for the virtual disk file location and size, and then click Create to create the virtual disk. When the virtual disk is created, the Virtual Disk Creation Wizard is closed and you are returned to the Summary step of the New Virtual Machine Wizard. Click Create to create the virtual machine. The wizard is closed and the newly-created virtual machine is listed in Oracle VM Virtual Box Manager, as shown in Figure
  • 24. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page23 Figure-: Virtual Machine Added Since you want to install an operating system in the virtual machine, you need to make sure the virtual machine can access the installation media. To do this, you edit the virtual machine settings. In Oracle VM VirtualBox Manager, select the virtual machine and then in the toolbar click the Settings button. The Settings window is displayed. In the navigation on the left, select Storage as shown in Figure. In the Storage Tree section, select Empty below the IDE Controller. The CD/DVD Drive attributes are displayed. Click the CD/DVD icon next to the
  • 25. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page24 CD/DVD Drive drop-down list and select the location of the installation media, as follows: drive to the host's physical CD/DVD drive, select Host Drive <drive-name>. To insert an ISO image in the virtual CD/DVD drive, select Choose a virtual CD/DVD disk file and browse for the ISO image. Figure : Virtual Machine Storage Settings Click OK to apply the storage settings. The Settings window is closed. If you connected the virtual machine's CD/DVD drive to the host's physical CD/DVD drive, insert the installation media in the host's CD/DVD drive now. You are now ready to start the virtual machine and install the operating system. In Oracle VM VirtualBox Manager, select the virtual machine and click the Start button in the toolbar. A new window is displayed, which shows the virtual machine booting up. Depending on the operating system and the configuration of the virtual machine, VirtualBox might display some warnings first. It is safe to ignore these warnings. The virtual machine should boot from the installation media, as shown in Figure
  • 26. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page25 Figure : An Installation Program in a Running Virtual Machine You can now perform all your normal steps for installing the operating system. Be sure to make a note of the user name and password of the administrator user account you create in the virtual machine, which you will need in order to log in to the virtual machine. Do not join the virtual machine to a Windows domain (it can be a member of a workgroup) as the domain configuration is performed later. The virtual machine might reboot several times during the installation. When the installation is complete, you might also want to let Windows Update to install any updates.
  • 27. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page26  Installing Active Directory and DHCP and DNS Before proceeding to anything else , make sure that you have set up the IP address of the Server to be Static. Follow the steps to make IP address set to static – Open the network and sharing center Click on Change Adapter Settings • Right click on the network adapter • Select Properties • Select Internet Protocol Version 4 • Click Properties • Type in your Static IP address configuration • Click OK
  • 28. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page27 Figure : Static IP on Microsoft Server 1. Open the Server Manager from the task bar. 2. From the Server Manager Dashboard, select Add roles and features. Figure : Server’s Dashboard This will launch the Roles and Features Wizard allowing for modifications to be performed on the Windows Server 2012 instance.
  • 29. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page28 Select Role-based or features-based installation from the Installation Type screen and click Next. 3) The current server is selected by default. Click Next to proceed to the Server Roles tab. 4) From the Server Roles page place a check mark in the check box next to Active Directory Domain Services, DNS,and DHCP. A notice will appear explaining additional roles services or features are also required to install domain services, click Add Features 5) Review and select optional features to install during the AD DS installation by placing a check in the box next to any desired features, and then click Next. Figure : Addition of Roles in Microsoft server 6) Review the information on the Tab and click Next. 7) On the Confirm installation selections screen, review the installation and then click Install.
  • 30. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page29 Note: The installation progress will be displayed on the screen. Once installed, the AD DS role will be displayed on the ‘Server Manager’ landing page Once the installation of DNS, DHCP and Active Directory roles is complete you will get a notification in the Server Manager console to “Promote this server to a domain controller” and to “Complete DHCP configuration”. You can to run the “Promote this server to a domain controller” first, click on that. Figure : Notification after Installation  Configure Active Directory Once the AD DS role is installed the server will need to be configured for your domain. 1) If you have not done so already, Open the Server Manager from the task bar. 2) Open the Notifications Pane by selecting the Notifications icon from the top of the Server Manager. From the notification regarding configuring AD DS, click Promote this server to a domain controller.
  • 31. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page30 Figure : Configure Active Directory 3) You can change the name of your server if you want to, it can be done in following way which is demonstrated by the above given figures – (i) From the LOCAL SERVER display board, double click on computer name. the following dialog box will appear
  • 32. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page31 (ii) Now click on change to rename your server (iii) Now enter the desired name for computer and for your workgroup. (iv) Click OK to finish it. (v) The changed computer name along with the workgroup name will be seen on LOCAL SERVER display board as shown in figure.
  • 33. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page32 Figure – Updated Computer name and Workgroup name. 4) From the Deployment Configuration tab select Add a new forest from the radial options menu. Insert your root domain name into the Root domain name field, and then click Next. 5) Select a Domain and Forest functional level, and then input a password for the Directory Services Restore Mode (DSRM) in the provided password fields
  • 34. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page33 The DSRM password is used when booting the Domain Controller into recovery mode. 6) Review the warning on the DNS Options tab and select Next. 7) Confirm or enter a NetBIOS name and click Next. 8) Specify the location of the Database, Log files, and SYSVOL folders and then click Next. (by default) 9) Review the configuration options and click Next. 10) The system checks to ensure all necessary prerequisites are installed on the system prior to moving forward. If the system passes these checks, proceed by clicking Install. After this the System will reboot. Login into server again using your name and password.  Configure DHCP server Log into the server and open DHCP in the start menu. You will notice that it is not configured yet
  • 35. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page34 1) “Complete DHCP configuration”. 2) This provides some tasks that need to be performed to enable the DHCP server role to work properly after role installation. Figure : The last page of Add Role Wizard after DHCP role installation 3) Launch the DHCP post-install wizard and complete the steps required. 4) Creation of DHCP security groups (DHCP Administrators and DHCP Users). For these security groups to be effective, the DHCP server service needs to be restarted. This will need to be performed separately by the administrator.
  • 36. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page35 Figure : DHCP Post-Install configuration wizard – Introduction Page 5) Authorization of DHCP server in Active Directory (only in case of a domain-joint setup). In a domain joined environment, only after the DHCP server is authorized, it will start serving the DHCP client requests. Authorization of DHCP server can only be performed by a domain user that has permissions to create objects in the Net services container in Active Directory.
  • 37. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page36 Figure : DHCP Post-Install configuration wizard – Authorization Page 6) After that, enter the scope name as you desire. 7) After that, define the IP address range for your DHCP scope.
  • 38. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page37 Figure : IP adress range page 8) Set Lease time. 9) Configure DHCP option. 10) After that, set Default gateway
  • 39. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page38 11) Now enter Domain name and DNS server details. On the Domain Name and DNS Servers screen, enter the IP addresses of all DNS servers the client should use. Click Next when done 12) On the WINS Servers screen, if you have WINS servers add them here. Click Next when done. Most Windows environments no longer use WINS for name resolution. Although, some legacy applications and hardware may still require it, so check your environment before skipping this
  • 40. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page39 13) On the Activate Scope page, select Yes, I want to activate this scope now. A scope must be activated before it is allowed to assign clients IP addresses. If you do not want to activate it at this time, select No, I will activate this scope later. Click Next when done. 14) Click Finish. 9) 802.1X Authentication via WiFi – Active Directory + Network Policy Server + Cisco WLAN + Group Policy Here is how to implement 802.1X authentication in a Windows Server 2012 R2 domain environment using Protected-EAP authentication. By creating the Network Policy server first, once we switch the authentication type from whatever to 802.1X via RADIUS, our Network Policy Server will immediately start processing requests and allowing machines on the domain. By configuring the Cisco Wireless LAN Controller or Group Policy first, clients will try connecting to a RADIUS server that doesn’t exist or present invalid credentials. A. Active Directory First, we need to create a security group in Active Directory to allow a list of specific users and computers to login to the domain. a) Create User Account in Server 2012 Domain Controller Here I will create user account in server 2012 domain controller using AD Users and Computers snap-in. Step 1: Open AD Users and Computers snap-in from Server Manager.
  • 41. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page40 Step 2: Create an Organizational Unit Organizational Unit or simply OU is a container object of AD domain which can hold users, computers, and other objects. Basically, you create user accounts and computers inside an OU. I will create an OU named Management. Right-click domain in AD users and Computers, choose New and click Organizational Unit. Type Management to name the OU. Check the Protect container from accidental deletion option. This option will protect this object from accidental deletion.
  • 42. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page41 Step 3: Create New User Right-click the Management OU, click New and click User Now type the user information. Type the first name and last name. Here user logon name is the name that the user will use to actually log in the computer in the network. So when user tries to log in, he will type this name on username field. Now click Next.
  • 43. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page42 Now type the password. Check user must change password at next logon. The user will be forced to change the password when user logs in. Click Next. Review the user configuration and click Finish. You have successfully created a user account. You can open the properties of the user account to tweak settings.
  • 44. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page43 This process is useful if you have to create couple of user accounts. But imagine, if you have to create hundreds or thousands of users. This process would be very time-consuming. So to create many users within minutes you can use Windows PowerShell scripts using NewADusercmdletor batch script using DsAdd command. In this example, we will allow any authenticated user or machine on the domain to authenticate successfully to the RADIUS sever. In the screenshot below, we can see I have added both Domain Users and Domain Computers to a security group called WirelessAccess. Here is a screenshot with the above settings. B. Network Policy Server 1. Open up Server Manager, click Add Roles, click Next on the Before You Begin screen, check Network Policy and Access Services and click Next, click Next on the Introduction screen, check Network Policy Server (leave the rest unchecked) and click Next, click Install.
  • 45. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page44
  • 46. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page45
  • 47. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page46 2. Once Network Policy Server is installed, launch the Network Policy Server snap-in (via MMC or Administrative Tools)
  • 48. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page47 3. Inside of Network Policy Server, on NPC (Local), select RADIUS server for 802.1X Wireless or Wired Connections from the dropdown and click Configure 802.1X a) On the Select 802.1X Connections Type page, select Secure Wireless Connections, and enter My Company’s Wireless. Click Next.
  • 49. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page48 b) Click on the Add… button. Enter the following settings ▪ Friendly name: Cisco WLAN Controller ▪ Address: Enter your WLAN Controller’s IP address ▪ Select Generate, click the Generate button, and then copy down the Shared Secret the wizard generated (we will use this later to get the WLAN Controller to talk to the RADIUS server). Click OK. c) Click Next.
  • 50. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page49 c) On the Configure an Authentication Method, select Microsoft: Protected EAP (PEAP). Click Next. d) Click Next on the Specify User Groups (we will come back to this) e) Click Next on the Configure Traffic Controls page.
  • 51. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page50 f) Click Finish 4. Click on NPS (Local) -> Policies -> Network Policies. Right click Secure Wireless Connections and click Properties. 5. Click on the Conditions tab, select NAS Port Type, and click Remove 6. Still on the Conditions tab, click Add…, select Windows Groups and click Add…, click Add Groups…, search for WirelessAccess and click OK. Click OK on the Windows Groups dialog box, click Apply on the Secure Wireless Connections
  • 52. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page51 Properties box. You should now have something like the image below:
  • 53. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page52 Figure : Network Policy server 7. Click on the Constraints tab. a) Uncheck all options under Less secure authentication methods.: b) Click Apply.
  • 54. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page53 C. Cisco WLAN 1. Login to your Cisco Wireless LAN Controller 2. Add a RADIUS server to your controller a) Click on the Security tab b) Select AAA -> Radius -> Authentication on the left side c) Click the New… button in the top right • Server IP Address: 192.168.10.100 (The IP address of your NPS server we setup earlier) • Shared Secret Format: ASCII • Shared Secret: The long generated password you wrote down when setting up the Network Policy Server • Confirm Shared Secret: Same password in previous step • Key Wrap: unchecked
  • 55. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page54 • Port Number: 1812 • Server Status: Enabled • Support for RFC 3576: Enabled • Server Timeout: 2 • Network User: Checked • Management: Checked • IP Sec: Unchecked • Here is a screenshot with the above settings CISCO WLAN >Security> AAA>RADIUS 3. Create or modify a wireless network to use 802.1X a) Click on the WLANs tab b) Create a new wireless network or select an existing WLAN ID to edit
  • 56. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page55 c) On the “WLANs > Add/Edit ‘My SSID'” page, use the following settings d) Security tab 1. Layer 2 Tab a) Layer 2 Security: WPA+WPA2 b) MAC Filtering: Unchecked c) WPA+WPA2 Parameters 1. WPA Policy: Unchecked 2. WPA2 Policy: Checked 3. WPA2 Encryption: AES checked, TKIP unchecked 4. Auth Key Mgmt: 802.1X d) Here is a screenshot of the above settings Wlan> layer 2 policies 2. Layer 3 Tab a) Layer 3 Security: none Web Policy: unchecked 3. AAA Servers Tab a) Authentication Servers: checked Enabled b) Server 1: Select your RADIUS server from the dropdown c) Local EAP Authentication: Unchecked
  • 57. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page56 D. Group Policy 1. Go to your domain controller and open up the Group Policy Management console. 2. Right click the Organizational Unit you want to apply to policy to and select Create a GPO in this domain, and Link it here…
  • 58. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page57 Note, the policy must be linked to the OU containing a group of machines you want to have WiFi access to or a parent of the OU. 3. Enter in 802.1X WiFi Policy for the Name and click OK 4. Right click your new GPO and click Edit 5. Navigate to Computer Configuration->Policies->Windows Settings->Security Settings->Wireless Network (IEEE 802.11) Policies 6. Right click and select Create A New Wireless Network Policy for Windows Vista and Later Releases
  • 59. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page58 5. Ensure the following settings are set for your Windows Vista and Later Releases policy 1. General Tab a) Policy Name: My Wireless Policy for Vista and Later Clients b) Description: Vista and later wireless network for my company. c) Check Use Windows WLAN AutoConfigure service for clients d) Here is a screenshot with the above settings
  • 60. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page59
  • 61. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page60 e) Click the Add… button and select Infrastructure I. Connection Tab Profile Name: My Network 1. Enter in your SSID (Wireless network name that gets broadcasted) and click the Add… button 2. Check Connect Automatically when this network is in range II. Security Tab 1. Authentication: WPA2-Enterprise 2. Encryption: AES 3. Select a network authentication method: Microsoft Protected EAP (PEAP) 4. Authentication Mode: User or Computer authentication 5. Max Authentication Failures: 1 6. Check Cache user information for subsequent connections to this network 7. Click OK II. Network Permission Tab
  • 62. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page61 a) Enter your network into Define permissions for viewing and connection to wireless networks if it hasn’t been added already Uncheck Prevent connections to ad-hoc networks b) Uncheck Prevent connections to infrastructure networks c) Check Allow user to view denied networks d. Check Allow everyone to create all user profiles e. Uncheck Only use Group Policy profiles for allowed networks f. Leave all Windows 7 policy settings unchecked g. Here is a screenshot with the above settings (to infrastructure networks). h. Click OK 1. Right click and select Create A New Windows XP Policy 2. Ensure the following settings are set for your Windows XP Policy 1. General Tab a. XP Policy Name: My Wireless Policy for XP Machines b. Description: My wireless policy for XP machines. c. Networks to access: Any available network (access point preferred)
  • 63. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page62 d. Check Use Windows WLAN AutoConfigure service for clients e. Uncheck Automatically connect to non-preferred networks 2. Preferred Networks Tab a. Click the Add… button and select Infrastructure I. Network Properties Tab 1. Network name (SSID): My SSID 2. Description: My wireless network 3. Uncheck Connect even if network is not broadcasting 4. Authentication: WPA2 5. Encryption: AES 6. Check Enable Pairwise Master Key (PMK) Caching 7. Uncheck This network uses pre-authentication 8. Here is a picture of the above settings
  • 64. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page63 I. IEEE 802.1X Tab 1. EAP Type: Microsoft: Protected EAP (PEAP) 2. EAP Start Message: Transmit 3. Authentication Mode: User or Computer Authentication 4. Check Authenticate as computer when computer information is available 5. Uncheck Authentication as guest when user or computer information is unavailable III. Click OK
  • 65. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page64 10) INTRODUCING REDUNDANCY ON WLC’S When an AP is fully joined to a controller, the AP learns of all the controllers configured in that mobility group. Should the controllers that an AP is currently registered with go down, the AP will send discoveries to any and all controllers in the mobility group. Assuming one of the controller has the capacity to accept the AP, the AP should join the least loaded controller it can find. If many controllers in the mobility group, it can be difficult to determine what controller the APs will join should their current controller fail. If you want to have more control over how the APs move between controllers on your network, you can configure the APs with Primary, Secondary & Tertiary controller names. With the controller name configured on APs, the APs always try to register the primary controller first. Should the primary controller go down, the AP tries to register with the secondary controller. If the AP is not able to join any of the configured controllers, it try to join any controller with Master Controller setting configured, or if no Master Controller, then the least loaded controller in the Mobility Group. AP Failover priority can be used to determine who will register for a controller if there is a contention. You can configure your wireless network so that the backup controller recognize a join request from a higher priority AP and if necessary disassociates a lower priority AP as a means to provide an available port for higher fail over priority AP. Before setting up redundancy, following are the points to remember – • The setup provides redundancy for controllers across separate data centers with low cost of deployment. • These WLCs are independent of each other and do not share configuration or IP addresses on any of their interfaces. Each WLC needs to be managed separately, can run a different hardware and a different
  • 66. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page65 software version, and can be deployed in different datacenters across the WAN link. • We must configure and manage both WLC separately. • When a primary WLC resumes operation, the APs fall back from the backup WLC to the primary WLC automatically if the AP fallback option is enabled. Step1: Configure both WLC’s and just make sure the hostname and IP address used for management and the dynamic interfaces are different. As we have configured the primary controller, we will configure the secondary controller. To configure the secondary controller, follow the direction as discussed in the report earlier to configure the primary WLC. The only difference will be the use of different IP address along with different Hostname. For Primary WLC, hostname- HumberController IP add- 192.168.100.10 For Secondary WLC, hostname-HumberController2 IP add- 193.178.100.10 i Create WLAN After configuring Secondary WLC, create a Wlan as we did in Primary WLC. Figure: WLAN Edit page ii Create DHCP Scope Next we have to create a DHCP pool, in order to define the range of Ip addresses.
  • 67. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page66 Figure: DHCP SCOPE Figure: DHCP Scope > Edit iii Enabling RADIUS SERVER Here we will be linking the Server we created on virtual machine, the one we linked earlier for Primary WLC.
  • 68. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page67 Figure: RADIUS Authentication Servers > New Figure: Wlans > Edit > Security > AAA Servers Step2: Go to Primary Controller GUI and navigate to Wireless > Access Points > Global Configuration, then configure the backup controller on the primary to point to the secondary controller. Here is the screenshot of above mentioned step.
  • 69. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page68 Figure: Primary WLC > Wireless > Access Points > Global Configuration Step3: Configure High Availability to input Primary and Backup controller IP Address at Wireless AP. Go to Wireless > Access Point > All APs, select specific AP and then Click on High Availability tab. Enter the primary WLC, secondary WLC IP and name here. Make sure that the WLC name we entered on the AP high availability tab is correct and is case sensitive. Step4: Configure Mobility Group on both Primary and Secondary Controllers. Go to Primary WLC GUI then navigate to Controller > MobilityManagement > Mobility Groups and then click on new, enter the details of secondary controller. Here is the screenshot –
  • 70. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page69 Figure: Primary WLC > Controller > Mobility Groups > New Same on secondary WLC: Go to Secondary WLC GUI then navigate to Controller > MobilityManagement > Mobility Groups and then click on new, enter the details of Primary controller.
  • 71. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page70 Figure: Secondary WLC > Controller > Mobility Groups > New HOW to FIND MAC ADDRESS OF WLC – We will be needing MAC address of respective WLC’s in order to complete the above given configuration. To find MAC Address of the WLC, go to CONTROLLER > Inventory. It will provide the Mac address. Here is the screenshot – Figure: For MAC Address , go to Controller > Inventory Step5: Enable Secondary Unit Well, this option should be enabled on both the WLC’s for redundancy to work. This option can be selected under CONTROLLER >GENERAL > HA SKU Secondary Unit. Here is the screenshot –
  • 72. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page71 Figure : Controller > General > HA SKU Secodary Unit
  • 73. SECURED WIRELESS NETWORK FOR AN ENTERPRISE WITH REDUNDANCY HARKIRAT SINGH DHILLON TARANDEEP KAUR VARINDER SINGH Page72 REFERENCES 1) http://www.cisco.com/c/en/us/td/docs/wireless/controller/80/configuration guide/b_cg80/b_cg80_chapter_010.html 2) Project Report on Securing Wireless Network for an Enterprise By Bhawandeep Singh & Amandeep Kaur 3) https://blogs.technet.microsoft.com/canitpro/2015/01/19/stepby-step- creating-awork-folders-test-lab-deployment-in-windowsserver-2012-r2/ 4) https://www.youtube.com/watch?v=0WyBxwJD_c0 5) http://www.cisco.com/c/en/us/support/docs/wirelessmobility/wireless- vlan/71477ap-group-vlans-wlc.html 6) http://www.cisco.com/c/en/us/support/docs/wireless/2500series- wirelesscontrollers/113034-2500-deploy-guide-00.html#anc25 7) http://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/Febru ary2013/Cisco_SBA_ BN_WirelessLANDeploymentGuideFeb2013.pdf 8) https://mrncciew.com/2013/04/07/ap-failover/ 9) https://rscciew.wordpress.com/2014/06/07/n1-high- availabilityconfiguration-on-cisco-2504wlc/ 10) http://www.cisco.com/c/en/us/td/docs/wireless/technology/hi_av ail/N1_High_Availability_Deployment_Guide.pdf