How to configure a Radius Server Polices in NPS Windows 2008 R2
i hopping this enough location question nps related....
i person working in college , environment
· a windows server 2008 r2 machine running ad ds (active directory domain services)
· a windows server 2008 r2 machine running nps (network protection services) , ad cs (active directory certificate services)
· configure nps server subordinate ca instead of root ca (as used ca in our dc main root certificate ) , radius certificate root certificate under ca)
· access point hp msm422 works radius client (test environment) use controller msm765 set radius profile
now in nps policies, have 1 policy domain user , computer machine, working fine, students , staff can login wireless using ad account (laptop , pc, macbook , ipad)
but want add more polices in nps server as shown below:
· 1-1st policy name: trusted user , machine
· 2nd policy name: trusted user(student or staff ) without trusted machine ever
· 3rd policy name: trusted user (student or staff) without trusted machine specific period (2 days example) have guest came days , need internet access
any appreciated
hi,
posting here.
yes, new requirements listed done adding multi policies , defining conditions meet needs (domain users or computers).
and according how nps processes multi policies described in article below, should set restricted polices higher others :
network policies
http://technet.microsoft.com/en-us/library/cc754107(ws.10).aspx
and guest users , we’d suggest quarantine individual vlan setting 802.1x authentication , dynamic vlan redirection , should have compatible devices first:
vlan attributes used in network policy
http://technet.microsoft.com/en-us/library/cc754422(ws.10).aspx
regards,
tiger li
technet subscriber support in forum
if have feedback on our support, please contact tnmff@microsoft.com.
please remember click “mark answer” on post helps you, , click “unmark answer” if marked post not answer question. can beneficial other community members reading thread.
Windows Server > Network Access Protection
Comments
Post a Comment