Controller Based WLANs

What options needs to be verified when VIA client rejects the server certificate as fatal:bad certificate in EAP-TLS authentication

Environment- This article applies to VIA 2.x and above

Answer- When VIA client rejects the server certificate as fatal:bad certificate in EAP-TLS authentication we would need to verify the following

1:  Verify if the server certificate used is valid

2: The server certificate need to have the option  Key Encipherment or Key Agreement under the key usage

rtaImage (27).jpg

 

 

 

Version History
Revision #:
1 of 1
Last update:
‎04-06-2015 03:53 AM
Updated by:
 
Labels (2)
Contributors
Search Airheads
Showing results for 
Search instead for 
Did you mean: 
Is this a frequent problem?

Request an official Aruba knowledge base article to be written by our experts.