15 CHAPTER 11 Deploying A Wireless LAN
15 CHAPTER 11 Deploying A Wireless LAN
15 CHAPTER 11 Deploying A Wireless LAN
C H A P T E R 1 1
Wireless connectivity offers users a high degree of mobility and provides another networking option when
traditional wired networks are impractical. The Microsoft® Windows® Server 2003 operating system
provides the networking services needed to deploy a secure and manageable wireless local area network
(WLAN) infrastructure within an enterprise environment. The deployment of WLANs — the primary
wireless networking support for an enterprise environment provided by Windows Server 2003 and the
Microsoft® Windows® XP operating system — is detailed in this chapter.
In This Chapter
Overview of Deploying a Wireless LAN...............................................................................................558
Adapting the Network Infrastructure for a WLAN................................................................................561
Designing a Wireless Network Access Solution....................................................................................568
Implementing a WLAN Test Environment............................................................................................585
Additional Resources.............................................................................................................................599
Related Information
For more information about the Internet Authentication Service (IAS), see
“Deploying IAS” in this book and the Networking Guide of the Microsoft® Windows®
Server 2003 Resource Kit (or see the Networking Guide on the Web at
http://www.microsoft.com/reskit).
For information about designing a certificate infrastructure, see “Designing a Public
Key Infrastructure” in Designing and Deploying Directory and Security Services of
this kit.
For more information about implementing the Active Directory® directory service,
see “Designing and Deploying Directory Services” in Designing and Deploying
Directory and Security Services.
558 Chapter 11 Deploying a Wireless LAN
Note
Though the WLAN components are included in the Microsoft® Windows®
Server 2003, Standard Edition; Windows® Server 2003, Enterprise
Edition; and Windows® Server 2003, Datacenter Edition operating
systems, there are differences in the levels of features supported and the
capabilities. For information about differences in these services among
the Windows Server 2003 operating systems, see Help and Support
Center for Windows Server 2003.
Note
For a native-mode domain, you can use universal groups and nested
global groups. For example, you might create a universal group named
WirelessUsers that contains global groups of wireless user and computer
accounts for intranet access.
Note
You can configure a computer running Windows Server 2003 or the
Microsoft® Windows® 2000 Server operating system as an Active
Directory domain controller. To configure a Windows 2000 Server–based
computer as an Active Directory domain controller for wireless access,
you must install Service Pack 3 (SP3) or later.
For information about configuring Active Directory for a WLAN, see “Implementing a WLAN Test
Environment” later in this chapter. For information about the design and deployment of Active Directory, see
“Designing and Deploying Directory Services” in Designing and Deploying Directory and Security Services.
Note
You can configure IAS in Windows Server 2003, Standard Edition, with a
maximum of 50 RADIUS clients and a maximum of 2 remote RADIUS
server groups. You can define a RADIUS client by using a fully qualified
domain name or an IP address, but you cannot define groups of RADIUS
clients by specifying an IP address range. If the fully qualified domain
name of a RADIUS client resolves to multiple IP addresses, the IAS
server uses the first IP address returned in the DNS query.
With IAS in Windows Server 2003, Enterprise Edition and Windows
Server 2003, Datacenter Edition, you can configure an unlimited number
of RADIUS clients and remote RADIUS server groups. In addition, you
can configure RADIUS clients by specifying an IP address range.
You can use a third-party CA to issue certificates for wireless access, as long as the certificates that you
install fulfill the requirements for TLS authentication.
For more information about certificate requirements, see the discussion of deploying a certificate
infrastructure in “Implementing a WLAN Test Environment” later in this chapter. For information about
designing and deploying a certificate infrastructure, see “Designing a Public Key Infrastructure” in
Designing and Deploying Directory and Security Services.
Note
Network-layer roaming is to be distinguished from general roaming,
which allows a wireless client to associate with a new AP within the
same wireless network. In network-layer roaming, the wireless client
associates with a new AP on the same subnet, within the same wireless
network.
Based on the number of IP addresses that you will add to accommodate your WLAN, decide whether or not
to add additional subnets.
Creating separate subnets for your wireless networking components offers many benefits, including:
Wired network components do not have to draw from the same pool of existing IP
addresses as your wireless clients.
IP addresses for wireless clients are easier to identify, which assists in easier
management and troubleshooting.
Separate subnets give you increased control over DHCP lease times.
You can associate each of your physical subnets (both wireless and wired) with sites
within Active Directory, which enables you to assign network access policies to the
specific subnets.
If all APs are on the same subnet, you can provide seamless network-layer roaming
for the wireless clients. Network-layer roaming allows a wireless client to associate
with a new AP within the same subnet, in the same wireless network. When crossing
subnets, applications that cannot handle a change of address, such as some e-mail
applications, might fail.
To keep track of the allocation of IP addresses, they created the IP address numbering scheme shown in
Table 11.1. The corporation adopted this numbering convention for all of their buildings that have wireless
network connectivity.
Table 11.1 Example IP Address Allocation for IP Subnet 172.16.50.0/24
IP Address Device
172.16.50.1 Router
172.16.50.2–172.16.50.10 Servers (terminal, proxy, IAS, and so forth)
172.16.50.11–172.16.50.x Wireless APs
172.16.50.x+1–172.16.50.254 Wireless clients
Under this addressing scheme, addresses were assigned in the following manner:
Within the IP subnet 172.16.50.0/24, they assigned the router connecting to the rest
of the network the first IP address of 172.16.50.1.
They assigned other devices — such as terminal servers, proxy servers, and IAS
servers — addresses from 172.16.50.2 through 172.16.50.10.
They assigned the wireless APs sequential IP addresses starting with 11. To make it
easier to keep track of the wireless APs, they assigned IP addresses that were 10
digits higher than the wireless AP number. For example, Wireless AP 1 was assigned
172.16.50.11, Wireless AP 2 was assigned 172.16.50.12, and so forth.
As is usual practice, they assigned static IP addresses to the APs and any servers on the subnet. To prevent
the DHCP server from allocating a static IP address to a wireless client, they created a DHCP scope for the
wireless subnet that did not include the assigned servers and APs (the scope range was 172.16.50.x+1
through 172.16.50.254).
They located all APs in a building on the same subnet, which allowed network-layer roaming throughout the
building. This also made IP addressing by DHCP servers more manageable. The DHCP server assigned
wireless clients dynamic IP addresses.
568 Chapter 11 Deploying a Wireless LAN
Note
Radio frequency attenuation (the reduction of signal strength), shielding,
and reflection can affect how you deploy your APs. Refer to the
manufacturer of your APs for information regarding the different
scenarios that might increase the radio frequency attenuation. Testing
software is available with most APs to check for signal strength, error
rate, and data throughput. This can be very beneficial during the
deployment of your APs.
4. Indicate any building construction materials that interfere with wireless signals.
Metal objects used in the construction of a building can affect the wireless signal. For
example, the following common objects interfere with signal propagation:
Support girders
Elevator shafts
Rebar reinforcement in concrete
Heating and air-conditioning ventilation ducts
Wire mesh that reinforces plaster or stucco in walls
Based on the total data throughput of all users, determine the number of users that you can
connect through a wireless AP. Obtain a clear picture of throughput before deploying the
network or making changes. Some wireless vendors provide an 802.11 simulation tool,
which you can use to model traffic in a network and view throughput levels under various
conditions.
Ensure redundancy, in the event that a wireless AP fails.
572 Chapter 11 Deploying a Wireless LAN
4. Update the architectural drawings to reflect the final number and placement of the
wireless APs.
574 Chapter 11 Deploying a Wireless LAN
Figure 11.4 Channel Overlap for 802.11b APs in the United States
Note
The Microsoft 802.1X Authentication Client is only available for
Windows® 98 and Windows NT® version 4.0 Workstation to customers
who have Microsoft Premier Support.
In addition, the IT staff found that by mounting APs in the plenum area, they could install APs in doorways
and halls, avoiding users’ offices. Though the initial installation cost was higher, they believe the placement
will pay off in the long term in decreased user interference during working hours.
The enterprise corporation worked closely with the manufacturer of the APs to ensure that all procedures
were followed and that the wireless APs were fire-rated for plenum placement.
Note
PEAP with MS-CHAP v2 is provided with Windows XP Service Pack 1
(SP1) and later, Windows Server 2003, and Microsoft 802.1X
Authentication Client.
Make sure that the APs support VLANs, the capability for beaconing multiple
Service Set Identifiers (SSIDs, also known as network names), and the capability for
binding each SSID to a separate VLAN.
Enhanced APs are necessary in a public space WLAN deployment. VLAN support enables
the AP to route the wireless client to the correct network path. The capability for beaconing
multiple SSIDs enables multiple service providers to share the same wireless network
infrastructure. After the wireless client associates with the correct SSID, the AP must bind
that SSID to the correct VLAN in order to route the network traffic to the correct destination.
The AP maintains a table that maps each SSID to its respective VLAN number. The public
space WLAN also must allow non-802.1X wireless clients access. To support this, you must
assign a VLAN number for all non-802.1X wireless clients. The VLAN number routes the
non-802.1X clients to a VLAN that is configured to provide non-802.1X clients with 802.1X
credentials.
To provide security, you need an IEEE 802.1X and RADIUS-capable wireless AP,
and an EAP-capable RADIUS server such as Windows Server 2003 IAS.
You might need to provide billing and accounting for services provided to customers
connecting through the public space WLAN.
A public space WLAN must provide a means for charging for services provided, typically by
an ISP, to customers connecting through the public space WLAN. An ISP can charge the
customer for this service in several ways. It can bill for the total time connected, the quantity
of data transferred, or a combination of the two methods.
You can configure the same IAS server that is used for the authorization of wireless users to
capture this connection data and save it to an accounting log file. The log file contains the
connection time, the amount of data transferred during a session, and other data that can be
used to produce billing records for ISP customers. Database exporting can convert the log
files into a format that can be read and interpreted to provide the billing records. IAS for
Windows Server 2003 can also be configured to send accounting information to a SQL
server database.
In addition, third-party software is available to create billing solutions.
Provide sufficient bandwidth to support the volume of users likely to use a public
space WLAN.
In designing a public space WLAN, consider how many users need to connect
simultaneously through each AP. For example, if you design for an average bandwidth of
56 kilobits per second (Kbps), approximating a 56K modem, more users will be able to
associate with the network than if you design the average bandwidth to be more than
56 Kbps.
582 Chapter 11 Deploying a Wireless LAN
Figure 11.6 shows the infrastructure for a public space WLAN with 802.1X designed for an airport. This
public space WLAN enables ISPs to provide Internet access for general and corporate users with wireless
devices that are 802.11b-capable.
Figure 11.6 Example of a Public Space WLAN Infrastructure in an Airport
Note
As an alternative to a VLAN, a public space wireless network can
support IP filtering. This requires the use of APs that are capable of IP
filtering and can be configured to restrict access to only the IP addresses
for the ISP’s certificate, DHCP, and Web servers. These servers provide
the minimum connectivity and services that are required in order to
obtain authenticated access.
If an AP is associated with repeatedly when you use IP filtering for
authentication, the AP can consume the allotted quantity of IP addresses
that the DHCP server has set aside, preventing additional wireless
clients from obtaining an IP address. Although the infrastructure for IP
filtering is less costly, because IP filtering saves a switch and a server, IP
filtering is less secure. For these reasons, it is better to use a VLAN than
IP filtering for a public space wireless network.
If the user decides to access his own corporate network across the Internet, a virtual private network (VPN)
connection can be created from the wireless client to a VPN server in the perimeter network.
For a large wireless deployment to be practical, it must be easy to manage. The combination of Windows XP
and Windows Server 2003 allows for efficient management of your wireless network.
For optimal manageability of your wireless network, ensure that your wireless clients use Windows XP,
which provides support for automatic switching between APs during roaming and support for zero
configuration through the WZC. Although you can use other Windows operating systems with Microsoft
802.1X Authentication Client, they do not support zero configuration.
by detecting a move to a new AP and then forcing re-authentication and DHCP renewal to ensure appropriate
network access during roaming. Windows XP in addition supports autodetection of a wireless network, and
automatic wireless configuration with the Wireless Zero Configuration (WZC) service.
Additional Resources 585
For more information about the design and deployment of IAS, see “Deploying IAS” in this book.
Taking Advantage of Autoconfiguration
The addition of the Wireless Zero Configuration (WZC) service in Windows XP improves the manageability
of your wireless network. The WZC service dynamically selects the wireless network to which to attempt
connection based either on your preferences or on default settings. When a more preferred wireless network
becomes available, the WZC service automatically selects and connects to that network. If none of the
preferred wireless networks is found nearby, the WZC service configures the wireless adapter so that there is
no accidental connection until the wireless client roams within the range of a preferred network.
586 Chapter 11 Deploying a Wireless LAN
To improve the roaming experience by automating the process of configuring the network adapter to
associate with an available network, Microsoft partnered with 802.11 wireless adapter vendors. The wireless
network adapter scans for available networks and passes them to Windows XP, which then configures the
wireless network adapter with an available network. If you are not using a WZC-capable network adapter,
you must configure the network adapter manually by using the configuration software that the manufacturer
provides.
For improved manageability of your wireless network, ensure that your wireless clients are using
Windows XP so the WZC service is available. Windows Server 2003 also provides this service, which is
known in Windows Server 2003 as the Wireless Configuration service. The Microsoft 802.1X Authentication
Client does not provide WZC and roaming support.
The Wireless Network (IEEE 802.1) Policies settings are only supported by wireless clients running
Windows XP (SP1 and later) and Windows Server 2003.
For information about:
Opening the Group Policy Object Editor, see “Ways to open the Group Policy Object
Editor” in Help and Support Center for Windows Server 2003. (Click the Index
button, and in the keyword box type Group Policy Object Editor; then select
opening.)
Adding and defining wireless network policies, see “Define Active Directory-based
wireless network policies” in Help and Support Center for Windows Server 2003.
Designing wireless network policies, see “Deploying Security Policy” in Designing a
Managed Environment.
Tip
If you are unable to add computer objects when adding members to a
group, use the Object Types button in the Select Users, Contacts,
Computers, or Groups dialog box to add computers to the types of
objects that you can add to a group.
Note
This procedure registers the IAS server only in its member domain,
which is all that you need for your test deployment. For your production
deployment, you will need to register the IAS server in its member
domain, trusted domains, and so on. For information, see “Enable the
IAS server to read user accounts in Active Directory” in Help and Support
Center for Windows Server 2003.
Installing a Single-Tier CA
To keep your initial test deployment simple, install a single-tier CA.
To install a single-tier CA in your test environment
Install the enterprise root CA either on the domain controller or on a separate member
server in your test environment.
You must be logged on as a member of both the Enterprise Admins group and the Domain
Admins group for the root domain.
Additional Resources 593
For installation instructions, see “Install an enterprise root certification authority” in Help
and Support Center for Windows Server 2003. For your test lab deployment, you do not
need to add certificate templates to the CA or configure the CA to allow subjects to request a
certificate based on a template.
To verify that the computer certificate for the IAS server meets all requirements
1. From the Certificates console, double-click the certificate to open it.
2. On the General tab, confirm that You have a private key that corresponds to this
certificate appears.
3. On the Details tab, under Field, click Enhanced Key Usage, and then confirm that
there is an object identifier for Server Authentication (1.3.6.1.5.5.7.3.1).
4. On the Details tab, under Field, click Subject Alternative Name, and then confirm
that the fully qualified domain name (FQDN) of the computer account for the IAS
server (for example, DNS Name=IASServerName.TestDomainName.com) appears.
5. On the Certification Path tab, confirm that a valid certification path appears and that
the statement This certificate is OK appears.
Verifying the root CA certificate
The root CA certificate of the CA that will issue the wireless client computer and user certificates must be
installed in the Trusted Root Certification Authorities certificate store. The following procedure tells how to
verify this.
To verify that the root CA is in the Trusted Root Certification Authorities store
1. From the Certificates console, expand Certificates - Local Computer, expand
Trusted Root Certification Authorities, and then click Certificates.
2. In the Details pane, confirm that the name of your test lab enterprise root CA appears
in the Issued To list.
If the root CA is not in the list, you might need to refresh the display. To do this, click
Action, and then click Refresh.
Note
CAPICOM is a COM client, supporting Automation, that performs
cryptographic functions (the CryptoAPI) using Microsoft® ActiveX®
controls and COM objects. For information about CAPICOM, see the
CAPICOM link on the Web Resources page at
http://www.microsoft.com/windows/reskits/webresources.
For information about how to install a snap-in for managing user certificates, see
“Manage certificates for your user account” in Help and Support Center for Windows
Server 2003.
To install both snap-ins, log on under a user account with administrative credentials for the
local computer. (You can install the user certificates snap-in but not the computer certificates
snap-in if you log on under a user account in the test domain.)
Additional Resources 597
Note
For the initial test deployment, to receive computer and user certificates,
the wireless client must be connected directly to the wired network that
has the CA infrastructure.
2. Use the Certificates - Local Computer snap-in to request a computer certificate for
the wireless client.
For instructions telling how to use the Certificates console to request a computer certificate,
see “Request a certificate” in Help and Support Center for Windows Server 2003.
The Help topic provides instructions for requesting a user certificate. To request a computer
certificate, instead of clicking Certificates - Current User in the console tree, click
Certificates - Local Computer. Then, when prompted for a certificate type, select
Computer.
3. Use the Certificates - Current User snap-in to request a user certificate.
For instructions telling how to use the Certificates console to request a user certificate, see
“Request a certificate” in Help and Support Center for Windows Server 2003. When
prompted for a certificate type, select User.
Verifying that the certificates meet all requirements
After installing the computer and user certificates, perform the following procedures to verify that the
certificates meet all requirements for the client to perform properly over a wireless connection.
To verify that the computer certificate for the wireless client meets
requirements
1. Verify that the computer certificate is installed in the Local Computer certificate store
(required for EAP-TLS authentication).
After verifying the correct certificate store, verify the certificate configuration.
2. From the Certificates console, double-click the certificate to open it.
3. On the General tab, confirm that the statement You have a private key that
corresponds to this certificate appears.
4. On the Details tab, under Field :
a. Click Enhanced Key Usage, and confirm that the object identifier for Client
Authentication is 1.3.6.1.5.5.7.3.2.
b. Click Subject Alternative Name, and confirm that the FQDN of the wireless
computer account (for example, DNS
Name=LaptopName.TestDomainName.com) appears.
5. On the Certification Path tab:
a. Confirm that a valid certification path appears.
b. Confirm that the statement This certificate is OK appears.
598 Chapter 11 Deploying a Wireless LAN
To verify that the user certificate for the wireless client meets requirements
1. Verify that the user certificate is installed in the Current User certificate store
(required for EAP-TLS authentication).
2. From the Certificates console, double-click the certificate to open it
3. On the General tab, confirm that You have a private key that corresponds to this
certificate appears.
4. On the Details tab, under Field, confirm the following items:
a. Click Enhanced Key Usage, and confirm that the object identifier for Client
Authentication is 1.3.6.1.5.5.7.3.2.
b. Click Subject Alternative Name, and confirm that the universal principal name (UPN)
of the user account ([email protected], for
example) appears.
5. On the Certification Path tab:
a. Confirm that a valid certification path appears.
b. Confirm that the statement This certificate is OK appears.
As you roam through coverage areas, perform the following tests to ensure that your wireless network will
provide strong, uninterrupted coverage for wireless clients:
Use the client software that the adapter manufacturer provided for the wireless device
to determine that the wireless client associates with the nearest AP.
If the wireless client does not readily associate with the closest AP when you move from one
AP’s coverage area to the next, turn the network adapter’s radio off and back on using
software provided by the adapter manufacturer. This forces the wireless adapter to find the
strongest signal, which usually is the closest AP.
The wireless client’s ability to associate with an AP is determined by the error rate of the
data packets and the signal strength. If the coverage from the first AP is still strong, the
wireless transceiver receives few bad packets and maintains its association. If the closest AP
is failing to associate with the wireless client, restarting the radio of the wireless network
adapter forces the wireless adapter to find the strongest signal, which usually is the
closest AP.
Check the statistics for error rates and signal strength to be sure that they are within
limits. Check the AP for throughput to determine whether the data transfer rate is
adequate.
The following troubleshooting tools also can be useful when testing and deploying your WLAN:
Use the Wireless Monitor MMC snap-in, included with Windows Server 2003, to
gather and view statistical and configuration information for wireless APs and the
Windows Server 2003 wireless client.
Use a spectrum analyzer to determine the location and strength of interfering signals
as you move from one signal area to another. A spectrum analyzer measures radio
frequency radiation from low to high frequencies across a frequency spectrum. These
signals are plotted on a graph that shows their strength and frequency. If necessary,
you can shield or move any devices that are causing interference.
Use a protocol analyzer to document usage intervals and traffic load. You can use
Network Monitor or third-party tools to capture 802.11 packets sent between a
wireless client and a wireless AP. With a protocol analyzer, you can capture 802.11
packets, but cannot view the contents of the encrypted payloads.
Note
If you
To support
need automatic
to force a Group
computer
Policy
certificate
updateallocation,
on the wireless
the issuing
client CA
during
must
be antesting,
your enterpise
youCA canserver
use Gpupdate
running either
command-line
Windows tool.
2000Foror Windows
Gpupdate
Server 2003.see
parameters, To support
“Gpupdate:
automatic
Command-line
user andreference”
computer certificate
in Help and
allocation,
Support Center
the issuing
for Windows
CA mustServer
be an2003.
enterpise CA server running either
Windows Server 2003, Enterprise Edition or Windows Server 2003, Data
Center Edition.
Installing a Three-Tier CA
When you deploy your enterprise WLAN, it is recommended that you provide the extra security of a three-
tier certificate infrastructure in which the root CA is offline. Therefore, after you finish deploying and testing
your WLAN test environment with a single-tier CA, and then introducing Group Policies and retesting, it is a
good practice to install a test version of the CA infrastructure that you plan to implement in your enterprise
environment in your lab before doing so in your production environment.
For information about designing and deploying a certificate infrastructure, see “Designing a Public Key
Infrastructure” in Designing and Deploying Directory and Security Services.
Additional Resources
Related Information
“Deploying DHCP” in this book for more information about deploying a DHCP
solution on your network.
“Deploying DNS” in this book for more information about deploying DNS within
your client/server infrastructure.
“Deploying ISA Server” in this book for more information about perimeter networks.
“Deploying IAS” in this book and the Networking Guide of the Windows Server 2003
Resource Kit (or see the Networking Guide on the Web at
http://www.microsoft.com/reskit) for more information about deploying an IAS
infrastructure in your network.
The Wi-Fi (IEEE 802.11b) link on the Web Resources page at
http://www.microsoft.com/windows/reskits/webresources for more information about
Microsoft support for IEEE 802.11b.
604 Chapter 11 Deploying a Wireless LAN