Home > General Administration > Other Topics > Freeradius: Configuring Windows 7 with an EAP-TLS wireless profile

Freeradius: Configuring Windows 7 with an EAP-TLS wireless profile

Table of contents
No headers
This will be using the client certificate generated in Freeradius: Generate certificates for client and server authentication step 6.

Import certificate
  1. Copy the client.p12 file located at /etc/openvpn/easy-rsa/keys/client.p12 to the client device.
  2. Open the Microsoft Management Console
  3. Add the Certificates snap-in. If setting up as user authentication select "My user account" for machine authentication select "Computer account"
  4. Select Personal > Certificates
  5. Open Action > All tasks > Import.
  6. Specify the client.p12 file location.
  7. Enter the password configured when the certificate was generated.
  8. Select "Automatically select the certificate store based on the type of certificate."

Wireless profile
  1. Create a new wireless network on the client via Network and Sharing Center > Manage wireless networks > Add
  2. Select Manually create a network profile:
    Network name: <SSID configured in Dashboard>
    Security type: WPA2-Enterprise
    Encryption type: AES
  3. After creating the profile we will need to modify settings for the SSID so select Change connection settings
  4. Select the Security tab
  5. Change the authentication method to Microsoft: Smart Card or other certificate
  6. Select Advanced settings
  7. Specify authentication method and based on where the certificate was placed select the proper user or computer authentication
  8. Click OK to save the Advanced settings
  9. Select Settings
  10. In the Trusted Root Certification Authorities find and check the certificate generated. The name of this is the same as the KEY_ORG in the vars file when the certificate was generated (Freeradius: Generate certificates for client and server authentication step 5)
  11. Click OK to save changes to Settings and again to save the changes to the wireless profile
The certificate is now installed on the client and the wireless profile configured to use the certificate.


You must to post a comment.
Last modified

Tags

Classifications

This page has no classifications.

Explore the Product

Click to Learn More

Article ID

ID: 1785

Explore Meraki

You can find out more about Cisco Meraki on our main site, including information on products, contacting sales and finding a vendor.

Explore Meraki

Contact Support

Most questions can be answered by reviewing our documentation, but if you need more help, Cisco Meraki Support is ready to work with you.

Open a Case

Ask the Community

In the Meraki Community, you can keep track of the latest announcements, find answers provided by fellow Meraki users and ask questions of your own.

Visit the Community