Chicken and Egg, which came first (well it was figured out something that wasn't quite a chicken laid the egg that became a chicken, but you get what I mean)
Basically, you want your clients to authenticate with m0n0wall Captive Portal before they get the WPA2 key? That would be as simple as using the URL redirect after authentication to send them to a page with the key on it, then setting up a virtual SSID with the WPA2 encryption enabled (probably would have to be a different SSID though)
Thanks, but I think you lost me just a little bit...
Premise is correct, just not sure what you mean by virtual SSID. (Wouldn't I need an AP that has that capability?)
However, in determining exactly what is mandated by my chain of command, I think I may have made this a little more complicated than needed.
Using Active Directory Group Policy and WPA-Enterprise, I believe it can take care of the authentication piece.
They still would like to use captive portal to force users to accept the UAP.
Would m0n0wall still be my best option or should I look elsewhere?
Also, trying to set this up on our test network I seem to be having a little trouble figuring out the setup and layout of the network.
Here is what I am looking at:
Internal LAN (w/RADIUS) <--> m0n0wall <--> AP <--> Wireless Clients
I am trying to set it up so the WAN side of the m0n0wall is our Internal LAN. When I do that I can not access the m0n0wall's web interface using the 'WAN' side.
Is that how m0n0wall is inherently designed or am I just missing a setting.
Thanks again for all of your help,
Major