ExtremeWireless (WiNG)

  • 1.  PEAP failed SSL/TLS handshake because the client rejected the radius server certificate

    Posted 10-15-2017 12:25
    Extreme ap6532 (wing 5.8) Ge1 interface configured as dot1xsupplicant (client) for wired 802.1x authentication of AccessPoint connected to cisco 2960x switch (15.2(4)E5) configured with cisco ISE 2.3 as radiusserver. During authentication of AP a radius server message "PEAP failed SSL/TLS handshake because the client rejected the radius server certificate.

    Configured CA certificate chain (same as on radius server, as trustpoint on AP, but still problem exists.

    Somebody experience with Extreme AP Wing 5.x configured as dot1xsupplicant ?

    Please help. Thanks.



  • 2.  RE: PEAP failed SSL/TLS handshake because the client rejected the radius server certificate

    Posted 10-15-2017 12:31
    The client MUST trust the CA certificate that issued the Radius server's certificate. Make sure that it is in the client's Trusted root CA list.


  • 3.  RE: PEAP failed SSL/TLS handshake because the client rejected the radius server certificate

    Posted 10-15-2017 12:47
    Tx Andrew.

    It is the accesspoint itself being a radiusclient in our setup . We are configuring 802.1x on the wired network. Also AP's themselves need to be authenticated. Therefore we have configured AP's Ge1 interface as dot1xsupplicant (username/pass). I installed CA certificate chain on AP as trustpoint.



  • 4.  RE: PEAP failed SSL/TLS handshake because the client rejected the radius server certificate

    Posted 10-16-2017 04:56
    Can you copy the port config you have done?


  • 5.  RE: PEAP failed SSL/TLS handshake because the client rejected the radius server certificate

    Posted 10-16-2017 05:40
    Accesspoint AP6532 (AP6532 version 5.8.6.0-011R)

    profile ap6532 default-ap6532
    .....
    ....
    interface ge1
    dot1x supplicant username zebra-ap password *xyz*

    tx Timo.



  • 6.  RE: PEAP failed SSL/TLS handshake because the client rejected the radius server certificate

    Posted 10-16-2017 10:58
    Problem solved. It seemed ISE was forcing EAP/TLS where AP was expecting EAP/MD5. Therefore responding "Bad certificate (42)"

    Also in radius log found: sslv3 alert bad certificate:s3_pkt.c:1493:SSL alert number 42

    This error message tells: the server demands you authenticate with a certificate, and you did not do so.

    Changed authentication rule on ISE to allow/ask EAP/MD5, now AP configured as dot1xsupplicant authentication successfull !