Comprehensive and Detailed Explanation From Exact Extract of HPE Aruba Networking Switching:
When configuring an 802.1X supplicant in Microsoft Windows for EAP-PEAP (Protected EAP) using EAP-MSCHAPv2, both user and machine credentials can be used for authentication. The network administrator has already enabled user and machine authentication under Additional Settings, but to meet the stated requirements (AES encryption and server certificate validation), two critical steps remain:
Enable server certificate validationThis ensures the client validates the identity of the RADIUS server (such as Aruba ClearPass or another authentication server) to prevent man-in-the-middle attacks. It satisfies the requirement for “validation of server certificate in Windows 10”.
Exact Extract:
“For EAP-PEAP with EAP-MSCHAPv2, select ‘Validate server certificate’ to ensure the client trusts the authentication server’s identity. The server certificate must be signed by a CA trusted by the client.”
Enable user authenticationWhile both user and machine authentication are possible, user authentication must be explicitly enabled so that credentials (domain or local user) are sent after machine authentication completes. This enables the full EAP-MSCHAPv2-based user and machine authentication process.
Exact Extract:
“In EAP-PEAP properties, ensure ‘Enable user authentication’ is selected to authenticate both the workstation and logged-on user credentials when using EAP-MSCHAPv2.”
Additionally, Windows 10 uses AES encryption automatically when WPA2/WPA3-Enterprise is configured, fulfilling requirement (1). RC4 encryption is not applicable because AES is the default cipher for WPA2 Enterprise networks.
Why the Other Options Are Incorrect:
C. EAP-TLS-based user and machine authentication:The question specifies EAP-MSCHAPv2, not EAP-TLS. EAP-TLS uses digital certificates for mutual authentication, while PEAP with EAP-MSCHAPv2 uses username and password-based credentials.
“EAP-TLS is certificate-based; PEAP-MSCHAPv2 uses password-based authentication.”
D. Change default RC4 encryption for AES:RC4 is used in older WPA or TKIP security types. When using WPA2-Enterprise, AES is automatically selected and cannot be manually overridden.
“WPA2-Enterprise (802.1X) uses AES-CCMP encryption; RC4/TKIP is not applicable to modern configurations.”
References of HPE Aruba Networking Switching Documents or Study Guide:
Aruba Secure Connectivity and Authentication Guide (AOS-10) – “Configuring Windows 802.1X Supplicant for PEAP-MSCHAPv2.”
Microsoft Windows 10 Enterprise Network Configuration Guide – “PEAP with EAP-MSCHAPv2 Setup and Server Certificate Validation.”
Aruba ClearPass Deployment Guide – “Certificate Validation and EAP Methods Overview.”
Aruba WLAN Security and AAA Configuration Guide – “EAP Frameworks and Supported Encryption Methods.”