In an earlier article, I covered Remote Authentication Dial-In User Service (RADIUS) servers: why we should have them, and the various options that we have to set one up, for both Windows infrastructure and Linux. With a centralized identity management in place (Active Directory), let’s take a look at how to implement wired authentication using […]
In an earlier article, I covered Remote Authentication Dial-In User Service (RADIUS) servers: why we should have them, and the various options that we have to set one up, for both Windows infrastructure and Linux.
With a centralized identity management in place
(Active Directory), let’s take a look at how to implement wired authentication using IEEE 802.1X.
Your company wants to ensure that only managed devices can connect to its physical network:
In the above scenario, we will need to setup a RADIUS service. Instead of adding wireless access points as RADIUS clients, we are going to add IEEE 802.1X switches as RADIUS clients.
Here are the high-level steps for this scenario:
Please refer to my earlier article on how a RADIUS server works, which provides an outline and diagram of how elements in a RADIUS infrastructure communicate with one another using Microsoft’s technologies.
If you want to take advantage of the benefits of having a wired RADIUS authentication, but you have nowhere to go, you’re in the right place. Let me guide you on how to set up a RADIUS authentication. We’ll start by assuming you already have Active Directory configured.
Deploy public-key infrastructure (PKI)
First, install an Enterprise Root Certificate Authority (CA) as part of Active Domain Certificate Services (Windows Server 2008 R2) or Certificate Authority (Windows Server 2003 and below).
Next, you will need to push the Trusted Root Certificate to Windows clients. To do this, you will need to export the Trusted Root Certificate from the certificate authority and import it into the Trusted Root Certification Authorities in group policy. Read up more about this from Microsoft Technet.
Acquire and deploy IEEE 802.1X managed switches
To do RADIUS authentication, we have to use managed switches. Managed switches allow us to configure the switch as a RADIUS client, and to enable IEEE 802.1X authentication. If not configured, managed switches will act like any other switch, where the connected LAN ports auto-negotiate the speed and connectivity.
Configure Network Policy Server (Windows Server 2008 and above)
For our RADIUS server to recognize each individual managed switch, these switches must be configured as RADIUS clients on the server side (network policy server or NPS) and client side (managed switches Web configuration).
On the server side, here are the steps:
First, in NPS, create a RADIUS client.
Next, go to the NPS (Local) node, and click on Configure 802.1X. The beauty of NPS is that everything is wizard-driven. Once we complete the wizard, 802.1X is configured with a new network policy and the appropriate Ethernet port and settings.
Configure Active Directory Group Policy and managed switches
The next step is to create a group policy object with the wired policy to be downloaded by the clients. For this to work, the client needs to be running Windows XP SP3, Windows Vista or Windows 7.
To configure group policy for wired authentication, here are the steps:
What’s Next?
With IEEE 802.1X authentication enabled for wired (Ethernet) connections, users will not be able to log on to the corporate network from any non-domain-joined computers. If securing the physical network is what you are looking for, you definitely want to deploy 802.1X authentication for wired connections.
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.