PEAP failed SSL/TLS handshake because the client rejected the radius server certificate
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎10-15-2017 12:25 PM
Extreme ap6532 (wing 5.8) Ge1 interface configured as dot1xsupplicant (client) for wired 802.1x authentication of AccessPoint connected to cisco 2960x switch (15.2(4)E5) configured with cisco ISE 2.3 as radiusserver. During authentication of AP a radius server message "PEAP failed SSL/TLS handshake because the client rejected the radius server certificate.
Configured CA certificate chain (same as on radius server, as trustpoint on AP, but still problem exists.
Somebody experience with Extreme AP Wing 5.x configured as dot1xsupplicant ?
Please help. Thanks.
Configured CA certificate chain (same as on radius server, as trustpoint on AP, but still problem exists.
Somebody experience with Extreme AP Wing 5.x configured as dot1xsupplicant ?
Please help. Thanks.
5 REPLIES 5
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎10-16-2017 10:58 AM
Problem solved. It seemed ISE was forcing EAP/TLS where AP was expecting EAP/MD5. Therefore responding "Bad certificate (42)"
Also in radius log found: sslv3 alert bad certificate:s3_pkt.c:1493:SSL alert number 42
This error message tells: the server demands you authenticate with a certificate, and you did not do so.
Changed authentication rule on ISE to allow/ask EAP/MD5, now AP configured as dot1xsupplicant authentication successfull !
Also in radius log found: sslv3 alert bad certificate:s3_pkt.c:1493:SSL alert number 42
This error message tells: the server demands you authenticate with a certificate, and you did not do so.
Changed authentication rule on ISE to allow/ask EAP/MD5, now AP configured as dot1xsupplicant authentication successfull !
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎10-16-2017 05:40 AM
Accesspoint AP6532 (AP6532 version 5.8.6.0-011R)
profile ap6532 default-ap6532
.....
....
interface ge1
dot1x supplicant username zebra-ap password *xyz*
tx Timo.
profile ap6532 default-ap6532
.....
....
interface ge1
dot1x supplicant username zebra-ap password *xyz*
tx Timo.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎10-16-2017 04:56 AM
Can you copy the port config you have done?
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎10-15-2017 12:47 PM
Tx Andrew.
It is the accesspoint itself being a radiusclient in our setup . We are configuring 802.1x on the wired network. Also AP's themselves need to be authenticated. Therefore we have configured AP's Ge1 interface as dot1xsupplicant (username/pass). I installed CA certificate chain on AP as trustpoint.
It is the accesspoint itself being a radiusclient in our setup . We are configuring 802.1x on the wired network. Also AP's themselves need to be authenticated. Therefore we have configured AP's Ge1 interface as dot1xsupplicant (username/pass). I installed CA certificate chain on AP as trustpoint.
