HP Procurve WiFi VLAN configuration using Microsoft IAS HP Procurve WiFi VLAN configuration using Microsoft IAS Index Preface ..................................................................................................................................................... 2 Configuring the Access Point ................................................................................................................... 4 Configuring the switch ............................................................................................................................ 7 Configuring Microsoft IAS and some AD groups ................................................................................... 10 Quick look at the DHCP setup ............................................................................................................... 17 The wireless client ................................................................................................................................. 18 Some Windows XP security and registry hacks ..................................................................................... 21 Conclusion ............................................................................................................................................. 21 Johan Engdahl 2007 page 1 HP Procurve WiFi VLAN configuration using Microsoft IAS Preface Since this guide does not cover Windows 2003 server nor Radius installation, this document assumes that you have knowledge in the following areas of expertice: • • • Networking security and planning Radius setup and configuration VLAN techniques and .1q knowledge This is what we´ll be using in this guide: • • • • • • • HP Procurve 530 ww VLAN aware Access Point HP Procurve 2510-24 switch Radius server Active Directory server DHCP server Laptop with WiFi capabilities Units to act as resources The purpose of this setup is to tighten and strengthen former wireless network zones and to deliver the opportunity for our customers to have employees, as well as visitors, on a mobile basis and still be able to control what resources each user is entitled to use. Johan Engdahl 2007 page 2 HP Procurve WiFi VLAN configuration using Microsoft IAS The different steps taking place in the above structure when a mobile unit is requesting access to the corporate resources is shown below in a very basic manner. Johan Engdahl 2007 page 3 HP Procurve WiFi VLAN configuration using Microsoft IAS Configuring the Access Point The Access Point of choice here is HP Procurve 530 ww. It´s easy to configure and it´s VLAN aware, as well as capable of QoS among other things. VLAN support is always enabled on the access point and cannot be disabled. Traffic passed to the wired network is tagged with the appropriate VLAN ID, either an assigned client VLAN ID or the default VLAN ID. By default the 530 ww is always VLAN aware and supporting .1q tagging directly out of the box. The AP is configured to belong to VLAN 1 (Default VLAN) to be able to talk to the Radius server (mentioned further down). As you can see there´s an entry for Untagged VLAN set to number 2. This is entry is not needed and can be set to any number except one of your VLANs, since our setup only work with .1q tagged VLANs for security reasons. Johan Engdahl 2007 page 4 HP Procurve WiFi VLAN configuration using Microsoft IAS Above screenshot shows the SSID which is shown to the mobile units and this is also where they connect before they are redirected to the correct VLAN depending on their permissions. It´s worth mentioning that the mobile clients cannot reach any resources on VLAN 1 unless they are entitled to by their permissions. Johan Engdahl 2007 page 5 HP Procurve WiFi VLAN configuration using Microsoft IAS The above screenshot simply shows the configuration towards the radius server. Using standard preferences this is no rocket science, just a matter of entering the same pre-shared key on both sides. Johan Engdahl 2007 page 6 HP Procurve WiFi VLAN configuration using Microsoft IAS Configuring the switch The switch of choice here is HP Procurve 2510-24. It´s nice, affordable with a reasonable pricetag. The switch must of course be configured to match the VLANs of the rest of the network infrastructure supporting the business-critical resources. In this guide we will work mainly with four VLANs (the screenshots may show additional VLANs, but the procedure is the same regardless of the amount of VLANs you decide to configure): • • • • VLAN 1 (Default VLAN) VLAN 1000 VLAN 1001 VLAN 1002 Here you can see the three newly created VLANs, 1000 through 1002. By the way, the menu in HP Procurve is very sweet to work with. Johan Engdahl 2007 page 7 HP Procurve WiFi VLAN configuration using Microsoft IAS Setting the IP addresses for each VLAN. Not necessary, but I choose to do so to easy up any troubleshooting if needed. You should have an IP address on VLAN 1 though unless you configure your switches through console cable only. Johan Engdahl 2007 page 8 HP Procurve WiFi VLAN configuration using Microsoft IAS Now it´s time to configure the switch ports. Depending on your network infrastructure this might look different from my setup. As you can see from the above screenshot I use port 1 as the uplink towards the AP, .1q tagging all the VLANs, including the default VLAN (this is why I didn´t care about the untagged setting in the AP configuration earlier on) In my lab environment I choose to grab the untagged VLANs from this switch on ports 2 = VLAN 1000, 4 = VLAN 1001 and finally 6 = VLAN 1002 to be delivered further in to the network infrastructure. Also, my Radius server, the Microsoft IAS, resides on the untagged VLAN 1 grabbed from port 24 on the switch together my Active Directory server. The DHCP server resides on the .1q tagged, VLANs 1000 through 1002, port 23 since my DHCP server assigns IP addresses according to which NIC the request came from. Johan Engdahl 2007 page 9 HP Procurve WiFi VLAN configuration using Microsoft IAS Configuring Microsoft IAS and some AD groups First we need to create one Security Group for each VLAN we tend to have different permissions for. Easily enough I call them vlan_access_1 & vlan_access_2 as shown below. User johan belongs to vlan_access_1 and the user administrator belongs to vlan_access_2 Now it´s time to configure Microsoft IAS, our Radius server according to these steps: 1. Define the AP and use the same pre-shared key as the other side 2. Define Access Policies 3. Configure logging and auditing if applicable to your organization Johan Engdahl 2007 page 10 HP Procurve WiFi VLAN configuration using Microsoft IAS Johan Engdahl 2007 page 11 HP Procurve WiFi VLAN configuration using Microsoft IAS Create a policy as usual, but be aware of the little details mentioned herein. Be sure to ONLY let Wireless – IEEE 802.11 be the port type and not in conjunction with Wireless – OTHER This has not affect on the function, but is merely seen as a security measure to remove everything not wanted or not used. Also add the policy to be met: Windows-Groups matches “SERVER\Security_Group” This in order to be able to filter which users should be directed to which VLANs. Johan Engdahl 2007 page 12 HP Procurve WiFi VLAN configuration using Microsoft IAS Set IP assignment according to your environment. You might use DHCP från a .1q tagged server, different IP pools or simply static IPs. I leave this completely in your hands to decide and manage. Johan Engdahl 2007 page 13 HP Procurve WiFi VLAN configuration using Microsoft IAS Continue with the EAP configuration. In this guide I choose to work with PEAP, but you can use smartcards or whatever is your choice. Johan Engdahl 2007 page 14 HP Procurve WiFi VLAN configuration using Microsoft IAS Johan Engdahl 2007 page 15 HP Procurve WiFi VLAN configuration using Microsoft IAS Don´t forget the server certificate or this whole idea will fail. In my case this is a 7 day certificate issued by SelfSSL found in the IIS 6 Resource Kit. Very nice to use inhouse or in lab environments. The server certificate is used by the server initially to identify itself upon contact with the mobile units before the rest of the authentication process is taking place. This is really the key part making all this work. Reverse injection to the AP containing VLAN information based on the credentials given at logon and the matching Security Group in Active Directory containing our users. For VLAN assignment, the following tunnel attributes are used: • • • Tunnel-Type=VLAN (13) Tunnel-Medium-Type=802 Tunnel-Private-Group-ID=VLANID This will result in that the AP vill pass the mobile unit session on to the VLAN provided by the information from the Radius server. Johan Engdahl 2007 page 16 HP Procurve WiFi VLAN configuration using Microsoft IAS Quick look at the DHCP setup In my case the DHCP server is connected to the network infrastructure by .1q tagged switch port 23 allowing VLANs 1000 through 1002 to request IP information. For this purpose there are multiple DHCP scoops defined on the server and by default the DHCP server responds (ack) through the same NIC the request came from. In my scenario where I use tagged VLANs, every single VLAN has it´s own unique IP in the switch configuration. In addition to this I also use IP Helper-Address to point out my DHCP server from each VLAN. Layer3 switches can handle routing to some extent, but if you lack that option you´ll simply have to provide suitable routing one way or another. Johan Engdahl 2007 page 17 HP Procurve WiFi VLAN configuration using Microsoft IAS The wireless client Now you have to excuse me for using screenshots from a swedish Windows XP client, but that was the only one I could get my hands on. I´ll translate for you and besides, the dialogue windows are all the same anyway. Yet again I want to state that the information below is completely depending on which kind of authentication method you choose, Smartcards, Certificates or PEAP. The information below reflects my environment for which this infrastructure was created. This is the SSID we want to establish a session with in order to reach our resources on the corporate network. This screenshot shows the status Connected for the time being, but should of course be in Connect to state. Johan Engdahl 2007 page 18 HP Procurve WiFi VLAN configuration using Microsoft IAS Click Properties just beneath the window showing the SSID. Johan Engdahl 2007 page 19 HP Procurve WiFi VLAN configuration using Microsoft IAS Have a look at the Authentication tab of that properties window. Choose EAP-type: Secure EAP (PEAP). Be sure to deselect the boxes below. Click Properties just below the EAP-type box. Be sure to deselect Confirm servercertificate since this is our own homebrewed certificate. Make sure the authentication method is Secure password (EAP-MSCHAP v2) Click Configure to the right of the authentication method box. Deselect the checkbox Use the same username, password and Windows domain text. Johan Engdahl 2007 page 20 HP Procurve WiFi VLAN configuration using Microsoft IAS Some Windows XP security and registry hacks Now we are set up for connection and it should work flawlessly. However there are one troublesome issue with Windows XP, namely that the operating system saves the PEAP credentials making the unit reconnect to the wireless network next time without asking for the credentials. In my opinion this is a major security issue and must be resolved. Luckily we can solve this issue rather smooth by removing the registry key containing our credentials. One idea might be doing this by a GPO after successful login, another idea is to have a script locally on the unit to trigger when the session is terminated. Or you can simply have the user remove the key by themselves. Open Regedit and remove this key: HKEY_CURRENT_USER\Software\Microsoft\Eapol\UserEapInfo To delete a registry key with a .reg file, put a hyphen (-) in front of the RegistryPath in the .reg file. For example, to remove our registry key make a .reg file containing: [-HKEY_CURRENT_USER\Software\Microsoft\Eapol\UserEapInfo] This will have immediate impact and won´t require a system reboot. Conclusion This solution is one of many on the market, but I was given the assignment to come up with a solution, for nomad users, only with HP equipment with moderate pricetags and Active Directory. This solution is absolutely adequate for both smaller companys as well as larger enterprises, but bear in mind that the equipment must be capable of handling the amount of traffic it´s supposed to handle, meaning that don´t always let your wallet speak. To summarize and wrap up. This works nicely and with a tight security as well. Johan Engdahl 2007 page 21