
We have an internal CA that handles all the certificates. You can make a specific group if you want to tie down who can use the wireless.ġ3) Under “Constraints” tab -> Follow the screen shot below. Select “OK” twice to exit policy (rest default).ġ0) Next right-click “Network Policies” and “new” under “Policies”.Ĭ) Access Permission: “Grant Access” and tick “Ignore user account dial-in properties”ĭ) Network Connection Method: “Unspecified”ġ2) Next select “Conditions” tab -> “add” and make sure you have:Ī) NAS Port Type: Wireless – IEEE 802.11 or Wireless – Other (same as before)ī) I have specified a “Windows Group” – domain users. Also tick “Wireless – Other” under “Others”. Then tick “Wireless – IEEE 8.02.11 under “Common 802.1X connection tunnel types”. Make sure policy is “enabled” and type of network access server is set to “Unspecified”ĩ) Select the “Conditions” tab and select “add”. Give it a “friendly name”, “static IP” of the AP and then “shared secret” from the template created earlier.ħ) Next right-click “Connection Request Policies” and select “new” under “Policies”Ĩ) Give it a policy name. Select “OK”ĥ) Next select “RADIUS Clients” and “new” under “RADIUS Clients and Servers”Ħ) Add each Meraki AP you will enable WPA2-Enterprise. Select “Templates Management” and right-click “Shared Secret”ģ) Right click and select “New Radius Shared Secret Template”Ĥ) Give the template a name and select “manual” and a “shared secret”.
#Meraki wifi mapper download install
This will allow your Windows authenticated users seamlessly to connect onto a SSID you present without them having to enter any key etc… It will negotiate trust based on certificate and AD credentials cached onto the machine transparently.ġ) Setup a Windows 2008R2 server and install the NPS (Network Policy Server) role on the server.Ģ) Open NPS on the server.
#Meraki wifi mapper download how to
Below is a quick guide on how to setup WPA2-Enterprise with Meraki Wireless Cloud based Solution using Microsoft Windows 2008R2 server.
