Unsolved
This post is more than 5 years old
1 Message
0
10781
April 7th, 2016 15:00
WYSE Thin Clients + 802.1x
We are moving towards authenticated network access at the port level and will be using Microsoft's Network Policy Server (NPS) to authenticate WYSE thin clients across our enterprise. These devices are connected to Cisco 4500-series switches.
We've tested the following configuration in a $MAC.ini configuration file:
IEEE8021X=yes network=wired eap=yes eapclient=eap-peap peapmschapun=mallory peapmschappwd=hackmenow
Our switchport configuration is pretty straightforward:
interface GigabitEthernet4/36
switchport access vlan 110
switchport mode access
switchport voice vlan 105
spanning-tree portfast
authentication control-direction in
authentication event fail action authorize vlan 168
authentication event no-response action authorize vlan 168
authentication host-mode multi-domain
authentication order mab dot1x
authentication priority mab dot1x
authentication port-control auto
authentication periodic
authentication timer restart 55
authentication timer reauthenticate 2700
authentication timer inactivity 300
authentication violation replace
mab
dot1x pae authenticator
dot1x timeout quiet-period 10
dot1x timeout tx-period 5
dot1x max-req 1
end
Is anyone using NPS with a WYSE thin client? If so, do you have any tips or configuration samples?
Thanks.
CliffGoniea
1 Message
0
April 18th, 2016 12:00
User51,
I just completed getting this working in a test environment. Here are some details to the process I used.
BTW, this was using a Windows 2008 R2 domain controller, 2008 R2 Certificate Authority in Enterprise mode, 2008 R2 NPS, & Wyse ThinOS 8.
Create a template for use with your Winterms (performed once):
Make the template available for issuance (performed once):
In AD Users and Computers:
Create the certificate for the Winterm (performed for each winterm):
Copy the .pfx file along with the public certificate for your CA server to the winterm.
In AD Users and Computers:
I think that was it. On the NPS, I just created a policy that gives access to Domain Computers. I have notes on that someplace to but what I outlined above was the hard-to-find, took me three weeks to piece together parts.
Good luck!
Cliff