10-02-2023 06:47 AM
We have recently setup 802.1x auth and are using EAP-TTLS auth method. We seem to have it working with our Windows 10 clients at this stage of testing, but I keep getting this popup window titled Ethernet Authentication "Can't verify the server's identity".
I think there is a step we missed when setting up our certificate infrastructure. Do we need to register a certificate for each of our ExtremeControl RADIUS servers (we have 15 total) with our certificate authority (internal active directory domain controller). I know just enough about certificates to be dangerous, but I "think" the client get this message because the server is not "registered" with our CA and therefore the client can't verify the RADIUS servers identity. Just need some guidance on why this is happening and what would stop it. Also, if someone has setup their windows environment to use 802.1x with ExtremeControl servers and EAL-TTLS, please let me know if there is some step-by-step guide out there to follow. Thank you.
Solved! Go to Solution.
10-03-2023 08:47 AM
Hello,
There are are a few considerations that you may be running into. As Robert indicated above you're using a certificate that cannot be validated and should be replaced with a more appropriate certificate.
One consideration that you may be running into is that the client supplicant needs to be configured with server identity parameters in addition to certificate validation.
Even if you have a commercially signed certificate installed in the RADIUS server, if an end system does not have supplicant configurations for server identity it will prompt a "Trust Anchor" or similar server identity message.
Example seen for wireless:
https://extreme-networks.my.site.com/ExtrArticleDetail?an=000100189
Notifications before connecting | Specifies whether the user is notified if the server name or root certificate is not specified, or whether the server’s identity cannot be verified. By default, the following options are provided:
Note In this option, if the root certificate is not present on the computer, the user is not notified and the connection attempts fails.
|
To get rid of this message you'll need:
Thanks
-Ryan
10-04-2023 06:53 AM
Thank you for the replies. I will work with my team to get these RADIUS servers setup with our internal CA in our windows domain. I do have multiple RADIUS servers (one at each of 12 sites and 2 at the Data Centers for backups). I will get all of them added to our CA since it will depend on which switch and location the user will use for RADIUS. This is just for wired so far, I still have wireless 802.1x to setup and test.
Also, when it comes to the settings for our client supplicant setup, here is what I have been using.
How does this look? It seems to work fine and our 802.1x rules are working so far.
10-07-2023 04:01 PM
I would need to test it in the lab to be 100% but, I'm assuming that if that profile is manually created on the client you'll be OK. The problem with certificate validation/server identity trust is typically seen when Windows tries to setup the wireless profile on initial connection.
10-03-2023 08:47 AM
Hello,
There are are a few considerations that you may be running into. As Robert indicated above you're using a certificate that cannot be validated and should be replaced with a more appropriate certificate.
One consideration that you may be running into is that the client supplicant needs to be configured with server identity parameters in addition to certificate validation.
Even if you have a commercially signed certificate installed in the RADIUS server, if an end system does not have supplicant configurations for server identity it will prompt a "Trust Anchor" or similar server identity message.
Example seen for wireless:
https://extreme-networks.my.site.com/ExtrArticleDetail?an=000100189
Notifications before connecting | Specifies whether the user is notified if the server name or root certificate is not specified, or whether the server’s identity cannot be verified. By default, the following options are provided:
Note In this option, if the root certificate is not present on the computer, the user is not notified and the connection attempts fails.
|
To get rid of this message you'll need:
Thanks
-Ryan
10-03-2023 05:22 AM
You appear to be using the default self-signed untrusted certificate that ships with Extreme Control. This certificate is not trusted by any device so the warning presented to clients to 'verify' if they wish to Connect or Disconnect is valid.
You need to replace the certificate with a trusted certificate chain signed by a trusted certificate authority or private CA if these devices are GPO/managed.
This link will walk you through the certificate CSR and signing process @ https://extreme-networks.my.site.com/ExtrArticleDetail?an=000078322.