Controller Based WLANs

What options needs to be verified when VIA client rejects the server certificate as fatal:bad certificate in EAP-TLS authentication

by on ‎04-06-2015 03:53 AM

Environment- This article applies to VIA 2.x and above

Answer- When VIA client rejects the server certificate as fatal:bad certificate in EAP-TLS authentication we would need to verify the following

1:  Verify if the server certificate used is valid

2: The server certificate need to have the option  Key Encipherment or Key Agreement under the key usage

rtaImage (27).jpg

 

 

 

Search Airheads
Showing results for 
Search instead for 
Did you mean: 
Is this a frequent problem?

Request an official Aruba knowledge base article to be written by our experts.