<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EAP-TEAP Authentication w/ 440-G2 in ExtremeControl</title>
    <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120634#M2138</link>
    <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;If you go into the AAA configuration within Control did you set the TEAP Chaining method to use MSCHAP2 or TLS?&lt;BR /&gt;&lt;BR /&gt;When you are doing your testing, are you testing with the device when there is a logged in user, or without a logged in user?&lt;BR /&gt;&lt;BR /&gt;In it's current state, TEAP authentication will never succeed if the end system is in a "Machine Auth" state. If there is no user logged in the user credentials are not presented during authentication and it will fail.&amp;nbsp; For testing, make sure a user is logged in, and make sure you have set the TEAP chaining mode correctly.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;-Ryan&lt;/P&gt;</description>
    <pubDate>Sat, 01 Nov 2025 16:27:15 GMT</pubDate>
    <dc:creator>Ryan_Yacobucci</dc:creator>
    <dc:date>2025-11-01T16:27:15Z</dc:date>
    <item>
      <title>EAP-TEAP Authentication w/ 440-G2</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120623#M2136</link>
      <description>&lt;P&gt;&lt;SPAN&gt;X440-G2-48p-10G4 Firmware:&amp;nbsp;32.7.3.15-patch1-19&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Site Engine Version:&amp;nbsp;&lt;SPAN&gt;25.08.13.02&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Control Version: 25.08.13.02&lt;/P&gt;&lt;P&gt;I have a Windows laptop configured to use EAP-TEAP authentication on wired and wireless and having problems with wired authentication.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On wired, connecting to the X440-G2 switch I am able to authenticate successfully using EAP-TLS authentication w/ both user and machine certificates.&amp;nbsp; This indicates to me that there are no certificate authentication issues.&lt;/P&gt;&lt;P&gt;Yet, when I configure the NIC to present TEAP authentication with TLS method 1 and 2 it fails.&amp;nbsp; Control logs only tell me the client didn't respond to the challenge.&lt;/P&gt;&lt;P&gt;I can confirm the TEAP authentication method on the laptop works just fine with another NAC solution I have in my lab.&lt;/P&gt;&lt;P&gt;I do not believe control to be the issue in this scenario as I am able to do TEAP authentication with an AP controlled by CloudIQ with the same laptop configured the same.&lt;/P&gt;&lt;P&gt;Anyone have any insight to this?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 15:26:15 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120623#M2136</guid>
      <dc:creator>MikeTraylor</dc:creator>
      <dc:date>2025-10-31T15:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TEAP Authentication w/ 440-G2</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120634#M2138</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;If you go into the AAA configuration within Control did you set the TEAP Chaining method to use MSCHAP2 or TLS?&lt;BR /&gt;&lt;BR /&gt;When you are doing your testing, are you testing with the device when there is a logged in user, or without a logged in user?&lt;BR /&gt;&lt;BR /&gt;In it's current state, TEAP authentication will never succeed if the end system is in a "Machine Auth" state. If there is no user logged in the user credentials are not presented during authentication and it will fail.&amp;nbsp; For testing, make sure a user is logged in, and make sure you have set the TEAP chaining mode correctly.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;-Ryan&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2025 16:27:15 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120634#M2138</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2025-11-01T16:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TEAP Authentication w/ 440-G2</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120639#M2139</link>
      <description>&lt;P&gt;Yes, TEAP is set to chain TLS and yes I am logged into the laptop when connecting.&amp;nbsp; I'm at a bit of a loss with this as it works with another NAC solution with the exact same auth settings on the NIC.&amp;nbsp; The only thing I can think of is the switch itself isn't recognizing/passing on the authentication.&amp;nbsp; If I have MAC auth enabled that's all I see.&amp;nbsp; Even with dot1x set to be first priority.&lt;/P&gt;&lt;P&gt;If I flip the laptop NIC over to TLS that works fine.&amp;nbsp; So I know it would be able to authenticate the certs.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2025 13:59:38 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120639#M2139</guid>
      <dc:creator>MikeTraylor</dc:creator>
      <dc:date>2025-11-03T13:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TEAP Authentication w/ 440-G2</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120643#M2140</link>
      <description>&lt;P&gt;We would need to do the following:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Right click the NAC that is doing the authentication --&amp;gt; WebView --&amp;gt; Diagnostics --&amp;gt; Appliance/Server Diagnostics&lt;BR /&gt;Set "Authentication Request Processing - RADIUS" to "Verbose"&lt;BR /&gt;Click OK&lt;BR /&gt;&lt;BR /&gt;Attempt to authenticate the test device.&lt;BR /&gt;Set diagnostics back to defaults&lt;BR /&gt;&lt;BR /&gt;Check the /var/log/radius/radius.log to see where in the conversation things are breaking down.&amp;nbsp;&lt;BR /&gt;You can create a ticket with GTAC to help assess the log to determine where the authentication is stopping.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;-Ryan&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 13:26:21 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120643#M2140</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2025-11-04T13:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TEAP Authentication w/ 440-G2</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120668#M2142</link>
      <description>&lt;P&gt;Thanks for that!&amp;nbsp; What I am seeing is that the TEAP authentication is getting hung up on the Machine certificate portion and never progressing to user cert auth.&amp;nbsp; It only presents the anonymous user which is the default with TEAP.&lt;/P&gt;&lt;P&gt;I ran a wired and wireless auth and captured the logs for comparison.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Here is the config in the switch (Switch is managed by Site Engine)&lt;/P&gt;&lt;P&gt;# Module netLogin configuration.&lt;BR /&gt;#&lt;BR /&gt;enable netlogin dot1x mac&lt;BR /&gt;configure netlogin authentication protocol-order dot1x mac web-based cep&lt;BR /&gt;enable netlogin ports 1-4 dot1x&lt;BR /&gt;enable netlogin ports 1-4 mac&lt;BR /&gt;configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 18:29:22 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120668#M2142</guid>
      <dc:creator>MikeTraylor</dc:creator>
      <dc:date>2025-11-04T18:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TEAP Authentication w/ 440-G2</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120692#M2143</link>
      <description>&lt;P&gt;This morning I converted a 5520 over to switch engine and got it connected up to control.&amp;nbsp; Plugged my laptop into a port with the same config and encountering the same issue.&amp;nbsp; So that rules out it being just a 440-G2 issue.&amp;nbsp; Has to be something with my switch config at this point but I'm not sure where to look.&amp;nbsp; I'm new to Control (not 802.1x) so I definitely could be missing something.&lt;/P&gt;&lt;P&gt;My challenge here is why does TLS auth work but not EAP-TEAP on wired.&amp;nbsp; EAP-TEAP does work on wireless.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 18:42:46 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120692#M2143</guid>
      <dc:creator>MikeTraylor</dc:creator>
      <dc:date>2025-11-05T18:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TEAP Authentication w/ 440-G2</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120717#M2144</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Looking at the debug log the wired authentication is going stale what looks like after the initial certificate exchange between RADIUS server and client.&lt;BR /&gt;&lt;BR /&gt;Successfully negotiation for EAP-TEAP occurs, and when the RADIUS server sends it's certificate the end system does not reply.&lt;BR /&gt;&lt;BR /&gt;This is usually a case of certificate validation issues on the supplicant itself.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Can you compare the supplicant configuration between the wireless and the wired NIC? Are there any differences in certificate trust configurations?&lt;BR /&gt;&lt;BR /&gt;If you cannot find a difference we can take the next step:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;What does the EAP traffic look like on the client side? Do we see a difference in behavior with the wired EAP traffic versus the wireless EAP traffic?&lt;BR /&gt;&lt;BR /&gt;What do the CAPI2 logs show? If there is a certificate validation issues the Microsoft CAPI2 logs should show a problem.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.thebestcsharpprogrammerintheworld.com/2013/09/09/enable-capi2-event-logging-to-troubleshoot-pki-and-ssl-certificate-issues/" target="_blank"&gt;https://www.thebestcsharpprogrammerintheworld.com/2013/09/09/enable-capi2-event-logging-to-troubleshoot-pki-and-ssl-certificate-issues/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This looks like a generic certificate validation problem on the client side.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;-Ryan&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2025 18:11:19 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120717#M2144</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2025-11-09T18:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TEAP Authentication w/ 440-G2</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120754#M2148</link>
      <description>&lt;P&gt;Ryan,&lt;/P&gt;&lt;P&gt;I think this just comes down to the fact that TEAP machine authentication is currently not implemented or is just broken at this time.&amp;nbsp; I don't understand why wireless is able to move past the machine certificate failure where wired isn't but I guess that's besides the point.&lt;/P&gt;&lt;P&gt;I am able to fully authenticate both my user and machine certificates on the wired connection when set to TLS rather than TEAP.&amp;nbsp; So to me that fully rules out any certificate validation issues.&lt;/P&gt;&lt;P&gt;I guess it's probably fair to just chalk this up to needing to wait for full TEAP support w/ NAC.&amp;nbsp; If you could push the lack of that support up the chain that would be great.&amp;nbsp; There are other posts about that as well.&lt;/P&gt;&lt;P&gt;One thing I will say about this is that TEAP is going to be the best auth method going further as it fixes all the problems w/ wireless 802.1x authentication where clients do not present their machine cert when a user logs in like we have in TLS only authentication.&lt;BR /&gt;&lt;BR /&gt;When windows fully deprecates PEAP/MSCHAPv2, certificate auth will become our ONLY option.&amp;nbsp; So Extreme really needs to get on the ball with this.&amp;nbsp; Windows NPS has zero support for TEAP so we won't be able to fall back on that either.&lt;/P&gt;&lt;P&gt;Thank you for your time looking into this with me though!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 16:19:07 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/eap-teap-authentication-w-440-g2/m-p/120754#M2148</guid>
      <dc:creator>MikeTraylor</dc:creator>
      <dc:date>2025-11-13T16:19:07Z</dc:date>
    </item>
  </channel>
</rss>

