Windows NPS (RADIUS) with Cisco and Meraki Wireless

Поділитися
Вставка
  • Опубліковано 12 січ 2025

КОМЕНТАРІ • 20

  • @techhoarder3010
    @techhoarder3010 Рік тому +1

    Thanks for this video. I was tripped up on the Allow AAA Override checkbox. Now everything is working perfect! Thanks

  • @sheilagonzalez9662
    @sheilagonzalez9662 3 роки тому +3

    This video is amazing! I love the idea of one SSID separated by VLANs.

  • @timecatch
    @timecatch 3 місяці тому

    Dude! Thx a lot, you a my savior. Befriended cisco wlc + winserv nps with your guidance. P.S. Video need a bit explanation for CA certs and RAS IAS server templates for PEAP

  • @craigiepoo1987
    @craigiepoo1987 2 роки тому +1

    Just wanted to say thank you for this.

  • @ronreyer238
    @ronreyer238 2 роки тому +1

    Excellent demo and succinct useful information.

  • @andydavies6144
    @andydavies6144 3 роки тому +1

    Really useful video - got our config working a treat. Thanks

  • @ukoko887
    @ukoko887 5 місяців тому +1

    thanks for this amazing video. It helpful

  • @alvarogonzalez8125
    @alvarogonzalez8125 Рік тому +1

    great video, I have doubts with the controller configuration, do you have any configuration associated with vlan 70 in the controller?

    • @networklunchbox
      @networklunchbox  Рік тому +1

      Thanks , the WLC only needs to have the virtual interfaces for the vlans created, a separate DHCP and router actually provides the IPs and moves to traffic around. If you pause the video at 11:39 you can see the vlans that I created.

  • @maddie389100
    @maddie389100 Рік тому

    This is an amazing video. thank you for the detailed description. I have a question around meraki. what works best assigned static IP addresses or Dynamic?

  • @roseria9606
    @roseria9606 2 роки тому

    Awesome tutorial! Thank you very much for sharing the knowledge!
    I was wondering though if I add a new AP to the RADIUS server which already has existing APs other than MERAKI and create the policy as stated in this video as a new policy, will it affect the existing APs?
    The thing is I wanted to add an AP from a branch office to the RADIUS server and set it up so that the staff from the branch office can use the wifi with AD as sign-in credentials but I am worried that once the policy stated in this video is added, the APs here in the main office might get affected.
    All the staff here use AD to sign-in and use the wifi.

    • @networklunchbox
      @networklunchbox  2 роки тому +1

      Use the 'Client IP Address' in the NPS Policies to differentiate which APs are to 'match' which policy :)

  • @alphonsesossou4283
    @alphonsesossou4283 3 роки тому

    Thanks for this valuable tutorial. It is well explained. I think this is unique on the web. Dynamic assigned vlans with NPS is not available in youtube except this course .
    Unfortunately I can't find anywhere to enable radius server overwrite interface on unifi to test dynamic vlan assignment in unifi environment. Is there any way to do that with unifi?.

    • @networklunchbox
      @networklunchbox  3 роки тому

      I picked up an Ubiquiti AP-AC-Lite to try out - and it it small and quite good, and the RADIUS with Vlan assignment worked very well - which was unexpected :)
      In the Java Controller needed to drive the 'Lite' version:-
      Advanced Features -> RADIUS -> Enable RADIUS assigned VLAN for wireless network = set to 'on'

  • @maddie389100
    @maddie389100 Рік тому

    This is so helpful. Thank you for doing such a detailed demo on Radius. What causes the devices from authenticating?

    • @networklunchbox
      @networklunchbox  Рік тому

      the access between the WAP and your RADIUS server - check ACLS and FW rules...

  • @MultiAddy
    @MultiAddy 2 роки тому +2

    while video is good, but basically you are just using user credentials for verification, not certificate. Adding MSCHAPv2 allows you to just use user credentials. Try EAP TLS and make a video on that

    • @networklunchbox
      @networklunchbox  2 роки тому

      EAP-TLS is all Certificate based , not one of my strengths unfortunately...