Security

last person joined: 9 hours ago 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

ClearPass - Windows Security Alert

This thread has been viewed 0 times
  • 1.  ClearPass - Windows Security Alert

    MVP
    Posted Nov 26, 2013 01:34 PM
      |   view attached

    Hi all,

     

    I am working with a client who is implementing ClearPass Policy Manager for their 802.1x wireless network. The service and all it's components are configured and everything is working, however after typing in their username/password on the machine (win7 laptop), they were not getting connected. I looked in Access Tracker and the alert stated "unknown ca". I enabled the cert in the trusted certificate list on ClearPass, which allowed them to connect to the network, but they were then prompted with a Windows Security Alert message (please see attached). The cert is already trusted on the machine, is there any other way to have it not prompt the users with this error? If they click connect it works, but the plan is to make the cut over seemless.

     

    Thanks for the help!



  • 2.  RE: ClearPass - Windows Security Alert

    EMPLOYEE
    Posted Nov 26, 2013 01:38 PM
    The cert has to be trusted in the profile on the client in order to not get
    that box.


  • 3.  RE: ClearPass - Windows Security Alert

    EMPLOYEE
    Posted Nov 26, 2013 03:32 PM

    So pretty much this dialogue is asking you if you are OK with sending your credentials to this authentication server. You will always get this the first time you connect to an 802.1X network (wired or wireless) unless the client is preconfigured with something like ClearPass QuickConnect or via group policy for AD-joined devices.

     

    In Windows 8, they made the text of the box a little more clear for the end user (less like an error):

     

    cappyroam-cert-win8.png

     

     

    The idea is that once the user trusts the specific cert chain and server name, they will be prompted with the same dialog again if they connect to a network with the same name, but different AAA infrastructure on the back end. Someone can easily stand up a network with the same SSID and capture the users credentials in the EAP transaction. That is why its so critical to ALWAYS check the server certificate and server name. Only turn it off on the client for troubleshooting.