<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ok, in this case:1. You will in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711902#M55395</link>
    <description>&lt;P&gt;Ok, in this case:&lt;/P&gt;&lt;P&gt;1. You will need to configure the Windows supplicant properly before this can work. You will need to define the type of authentication and the CA certificate to be trusted. If the CA certificate is not available in the list of Certificates then you will need to import it&lt;/P&gt;&lt;P&gt;2. If you are doing PEAP then your Identity Store should be Active Directory and not Certificate Authentication Profile. The Certificate Authentication Profile is used for certificate based (EAP-TLS) authentications.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);"&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 29 May 2015 16:27:07 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2015-05-29T16:27:07Z</dc:date>
    <item>
      <title>ACS 5.5 Radius Authentication Failure with WLC 5508 and AD 2012</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711899#M55388</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need help on these errors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my setup: WLC 5508 7.6.130.0&amp;nbsp;-&amp;gt; ACS 5.5.0.46&amp;nbsp;-&amp;gt; AD 2012&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am getting (2) errors in ACS 5.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.100.16.154/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FFailure_Reason%2FAuthentication_Failure_Code_Lookup.rptdesign&amp;amp;rptFailureReason=12514+EAP-TLS+failed+SSL%2FTLS+handshake+because+of+an+unknown+CA+in+the+client+certificates+chain&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="color: rgb(255, 0, 0); font-family: sans-serif; font-size: small; line-height: normal; white-space: nowrap; margin-top: 0pt; background-color: rgb(245, 249, 253);" target="_self" title="Click for failure reason details"&gt;12514 EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://10.100.16.154/avreports/servlet/GenericRedirector?command=submit&amp;amp;__requesttype=immediate&amp;amp;invokeSubmit=true&amp;amp;__executableName=%2Fhome%2Facsadmin%2FFailure_Reason%2FAuthentication_Failure_Code_Lookup.rptdesign&amp;amp;rptFailureReason=22044+Identity+policy+result+is+configured+for+certificate+based+authentication+methods+but+received+password+based&amp;amp;__locale=en_US&amp;amp;iportalID=TKNENRBYE&amp;amp;__masterpage=false&amp;amp;__newWindow=false" style="color: rgb(255, 0, 0); font-family: sans-serif; font-size: small; line-height: normal; white-space: nowrap; margin-top: 0pt; background-color: rgb(235, 239, 243);" target="_self" title="Click for failure reason details"&gt;22044 Identity policy result is configured for certificate based authentication methods but received password based&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Already installed the CA cert and local cert&amp;nbsp;in ACS and also in&amp;nbsp;client PC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see screenshots&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711899#M55388</guid>
      <dc:creator>Bernard Lara</dc:creator>
      <dc:date>2019-03-11T05:45:31Z</dc:date>
    </item>
    <item>
      <title>Can you attach some screen</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711900#M55391</link>
      <description>&lt;P&gt;Can you attach some screen shots of the supplicant configurations? It looks like you have two issues:&lt;/P&gt;&lt;P&gt;1. Your supplicant is attempting to perform password based (most likely PEAP) based authentication while your Radius server is set to perform Certificate (EAP-TLS) based authentication&lt;/P&gt;&lt;P&gt;2. The authenticating client is not trusting the root CA that issued/signed the Radius certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 May 2015 21:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711900#M55391</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-27T21:51:36Z</dc:date>
    </item>
    <item>
      <title>Hi Neno, I have not created</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711901#M55392</link>
      <description>&lt;P&gt;Hi Neno,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have not created any wireless profile, so from Windows 7 it is&amp;nbsp;authenticating with PEAP-MSCHAPv2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2015 05:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711901#M55392</guid>
      <dc:creator>Bernard Lara</dc:creator>
      <dc:date>2015-05-28T05:58:12Z</dc:date>
    </item>
    <item>
      <title>Ok, in this case:1. You will</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711902#M55395</link>
      <description>&lt;P&gt;Ok, in this case:&lt;/P&gt;&lt;P&gt;1. You will need to configure the Windows supplicant properly before this can work. You will need to define the type of authentication and the CA certificate to be trusted. If the CA certificate is not available in the list of Certificates then you will need to import it&lt;/P&gt;&lt;P&gt;2. If you are doing PEAP then your Identity Store should be Active Directory and not Certificate Authentication Profile. The Certificate Authentication Profile is used for certificate based (EAP-TLS) authentications.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM style="font-size: 14.3999996185303px; background-color: rgb(249, 249, 249);"&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2015 16:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-5-radius-authentication-failure-with-wlc-5508-and-ad-2012/m-p/2711902#M55395</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-05-29T16:27:07Z</dc:date>
    </item>
  </channel>
</rss>

