Wireless Access

 View Only
last person joined: 15 hours ago 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

Which cert does a Wifi client check when trying to join an SSID though Clearpass?

This thread has been viewed 17 times
  • 1.  Which cert does a Wifi client check when trying to join an SSID though Clearpass?

    Posted 2 days ago

    I inherited a wireless network which uses PEAP for authentication and Clearpass for the authentication.  We have all of the clients that we can set to 'do not check' for the server certificate but some androids will not allow this.  What is it checking and what do I need for this to work?

    Is it the Radius/EAP, the HTTPS ECC, or the HTTPS RSA or none of the above?  The radius cert is signed by my own CA and I've tried using the root cert from that CA on the client but it will still not join.  My HTTPS RSA cert is signed by a public CA.  Am I missing intermediate certs in the chain or what actually happens?

    Any help is greatly appreciated!

    Mcfly



  • 2.  RE: Which cert does a Wifi client check when trying to join an SSID though Clearpass?

    Posted yesterday

    The client will check the RADIUS EAP server certificate installed on ClearPass, for 802.1X PEAP authentication (as well for TEAP, EAP-TLS btw).

    A private Root CA for your EAP server certificate is recommended in most cases, and intermediates are sent by ClearPass so just installing the private root should be ok. Make sure that you have an actual private CA, using a self-signed EAP certificate will result in problems, as well a wildcard certificate for EAP (wildcards are fine/great for HTTPS).

    On Android, there is also a 'domain' field in the configuration, that is where you would put the name (CN/SAN-dns) of your EAP server certificate in. It may help to configure another device first, like a Windows client, make it work and from a working situation find a way to make the other devices working. Please verify that there is no more MD5/SHA-1 in your private CA or EAP server certificate as that is deprecated and some clients may refuse to connect with such weak crypto.

    The Access Tracker may provide some additional information in Access Tracker, like 'client: untrusted ca' if the client doesn't trust the CA; but some clients fail silent unfortunately.

    Please be aware of the risks running PEAP with 'do not check' on the server certificate; so I would plan to move to TEAP/EAP-TLS or at least enforce the server certificate checking without end-users be able to override an untrusted certificate.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your Aruba partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact Aruba TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or Aruba Networks.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 3.  RE: Which cert does a Wifi client check when trying to join an SSID though Clearpass?

    Posted yesterday

    Thank you for such a detailed response!  We certainly know the risks and don't want to use PEAP without checking for the cert.  That's just some of the testing that I have done to try and get this working. 

    We also are definitely using a privately signed cert.  The root and intermediate cert are signing the Clearpass EAP cert with SHA256RSA.  I just tried with an iPhone by adding my root ca certificate and trying to join.  Of course it does not ask for settings like 'domain' (or anything for that matter).  When I try to join I still get the 'Not Trusted' pop up where it asks to verify my intermediate CA that signed the Clearpass cert:

    Message when trying to connect with iPhone

    I would not expect this since I have my root cert installed on the iPhone.

    Thoughts?

    Thanks,

    Mcfly 




  • 4.  RE: Which cert does a Wifi client check when trying to join an SSID though Clearpass?

    EMPLOYEE
    Posted yesterday

    If the certificate isn't installed correctly on ClearPass, you'll end up with this result.  Make sure that the certificate has the intermediate and root as part of the chain when installing.  ClearPass 6.12 will enforce this requirement.



    ------------------------------
    Carson Hulcher, ACEX#110
    ------------------------------



  • 5.  RE: Which cert does a Wifi client check when trying to join an SSID though Clearpass?

    Posted 6 hours ago

    I have this in place now.  I'm on version 6.10.8 but the chain looks like this for the EAP cert:

    <My Root>

    ---<My Sub>

    ------<CP EAP>

    Anything else you can think of?

    Thanks,

    McFly




  • 6.  RE: Which cert does a Wifi client check when trying to join an SSID though Clearpass?

    EMPLOYEE
    Posted 5 hours ago

    Guessing here:

    • Validity period of the RADIUS certificate is longer than typically allowed these days.
    • Haven't looked at IOS recently, but Android will not like a private certificate unless the network has been provisioned through management; trying to add an 802.1X network through the OS interface will always throw an alert on the RADIUS certificate when using a private PKI.


    ------------------------------
    Carson Hulcher, ACEX#110
    ------------------------------