The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This documents describes how to set up a Wireless Local Area Network (WLAN) with 802.1x security in a Mobility Express Controller. This document also explains the use of Extensible Authentication Protocol (EAP) -Transport Layer Security (TLS) specifically.
Cisco recommends that you have knowledge of these topics:
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
TLS server_hello handshake message certificate server_key_exchange certificate request server_hello_done.
Certificate ¬ Server can validate to verify that it is trusted. client_key_exchange certificate_verify ¬ Verifies the server is trusted change_cipher_spec TLS finished
Step 1. The first step is to create a WLAN on Mobility Express. In order to create a WLAN, navigate to WLAN > Add new WLAN as shown in the image.
Step 2. A new popup window will appear once you click Add new WLAN. In order to create a Profile name, navigate to Add new WLAN > General as shown in the image.
Step 3. Configure the authentication type as WPA Enterprise for 802.1x and configure RADIUS Server under Add new WLAN > WLAN Security as shown in the image.
Step 4. Click Add RADIUS Authentication Server and provide the IP address of the RADIUS server and Shared Secret which must match exactly what has been configured on ISE and then click Apply as shown in the image.
In order to build the policy, you need to create the allowed protocol list to use in your policy. Since a dot1x policy is written, specify the allowed EAP type based on how the policy is configured.
If you use the default, you allow most EAP types for authentication which might not be preferred if you need to lock down access to a specific EAP type.
Step 1. Navigate to Policy > Policy Elements > Results > Authentication > Allowed Protocols and click Add as shown in the image.
Step 2. On this Allowed Protocol list, you can enter the name for the list. In this case, Allow EAP-TLS box is checked and other boxes are unchecked as shown in the image.
Step 1. Open ISE console and navigate to Administration > Network Resources > Network Devices > Add as shown in the image.
Step 2. Enter the information as shown in the image.
Step 1. Navigate to Administration > System > Certificates > Certificate Management > Trusted certificates.
Click Import in order to import a certificate to ISE. Once you add a WLC and create a user on ISE, you need to do the most important part of EAP-TLS that is to trust the certificate on ISE. For that, you need to generate CSR.
Step 2. Navigate to Administrauon > Certificates > Certificate Signing Requests > Generate Certificate Signing Requests (CSR) as shown in the image.
Step 3. In order to generate CSR, navigate to Usage and from the Certificate(s) will be used for drop down options select EAP Authentication as shown in the image.
Step 4. The CSR generated on ISE can be viewed. Click View as shown in the image.
Step 5. Once CSR is generated, browse for CA server and click Request a certificate as shown in the image:
Step 6. Once you request a certificate, you get options for User Certificate and advanced certificate request, click advanced certificate request as shown in the image.
Step 7. Paste the CSR generated in Base-64 encoded certificate request. From the Certificate Template: drop down option, choose Web Server and click Submit as shown in the image.
Step 8. Once you click Submit, you get the option to select the type of certificate, select Base-64 encoded and click Download certificate chain as shown in the image.
Step 9. The certificate download is completed for the ISE server. You can extract the certificate, the certificate will contain two certificates, one root certificate and other intermediate. The root certificate can be imported under Administration > Certifictes > Trusted certificates > Import as shown in the images.
Step 10. Once you click Submit, the certificate is added to the trusted certificate list. Also, the intermediate certificate is needed in order to bind with CSR as shown in the image.
Step 11. Once you click on Bind certificate, there is an option to choose the certificate file saved in your desktop. Browse to the intermediate certificate and click Submit as shown in the image.
Step 12. In order to view the certificate, navigate to Administration > Certificates > System Certificates as shown in the image.
Step 1. In order to authenticate a wireless user through EAP-TLS, you have to generate a client certificate. Connect your Windows computer to the network so that you can access the server. Open a web browser and enter this address: https://sever ip addr/certsrv---
Step 2. Note that the CA must be the same with which the certificate was downloaded for ISE.
For this, you need to browse for the same CA server that you used to download the certificate for server. On the same CA, click Request a certificate as previously done, however this time you need to select User as the Certificate Template as shown in the image.
Step 3. Then, click download certificate chain as was done previously for server.
Once you get the certificates, follow these steps in order to import the certificate on windows laptop.
Step 4. In order to import the certificate, you need to access it from the Microsoft Management Console (MMC).
Once import of certificate is done, you need to configure your wireless client (windows desktop in this example) for EAP-TLS.
Step 1. Change the wireless profile that was created earlier for Protected Extensible Authentication Protocol (PEAP) in order to use EAP-TLS instead. Click EAP Wireless Profile.
Step 2. Select Microsoft: Smart Card or other certificate and click OK as shown in the image.
Step 3. Click Settings and select the root certificate issued from CA server as shown in the image.
Step 4. Click Advanced Settings and select User or computer authentication from the 802.1x settings tab as shown in the image.
Step 5. Now, try to connect again to the wireless network, select the correct profile (EAP in this example) and Connect. You are connected to the wireless network as shown in the image.
Use this section in order to confirm that your configuration works properly.
Step 1. The client EAP-Type must be EAP-TLS. This means that the client has completed authentication, with the use of EAP-TLS, obtained IP address and is ready to pass the traffic as shown in the images.
Step 2. Here are the client detail from CLI of the controller (output clipped):
(Cisco Controller) >show client detail 34:02:86:96:2f:b7 Client MAC Address............................... 34:02:86:96:2f:b7 Client Username ................................. Administrator AP MAC Address................................... c8:f9:f9:83:47:b0 AP Name.......................................... AP442b.03a9.7f72 AP radio slot Id................................. 1 Client State..................................... Associated Client User Group................................ Administrator Client NAC OOB State............................. Access Wireless LAN Id.................................. 6 Wireless LAN Network Name (SSID)................. ME_EAP Wireless LAN Profile Name........................ ME_EAP Hotspot (802.11u)................................ Not Supported BSSID............................................ c8:f9:f9:83:47:ba Connected For ................................... 18 secs Channel.......................................... 56 IP Address....................................... 10.127.209.55 Gateway Address.................................. 10.127.209.49 Netmask.......................................... 255.255.255.240 IPv6 Address..................................... fe80::2818:15a4:65f9:842 --More-- or (q)uit Security Policy Completed........................ Yes Policy Manager State............................. RUN Policy Type...................................... WPA2 Authentication Key Management.................... 802.1x Encryption Cipher................................ CCMP-128 (AES) Protected Management Frame ...................... No Management Frame Protection...................... No EAP Type......................................... EAP-TLS
Step 3. On ISE, navigate to Context Visbility > End Points > Attributes as shown in the images.
There is currently no specific troubleshooting information available for this configuration.