<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PEAP authentication failed during SSL handshake in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276854#M18864</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It was happend to me this problem too. It Happens when i erase a certificate (in the client) that i was previously request (with no problems), and when i request again, and try to reuathentificate, the problem appears...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution : I don't know, I tried to erase de SSL Cache in the client, but seems this is no the &lt;/P&gt;&lt;P&gt;problem...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SOLUTION that works to me is to restart AP (power off power on)... I restart de ACS just in case... and then, the error not appear any more...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good look&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enrique Lopez&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:elopez@magenta.cl"&gt;elopez@magenta.cl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ingeniero de Proyectos Magenta S.A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Feb 2004 18:00:20 GMT</pubDate>
    <dc:creator>elopez</dc:creator>
    <dc:date>2004-02-09T18:00:20Z</dc:date>
    <item>
      <title>PEAP authentication failed during SSL handshake</title>
      <link>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276849#M18859</link>
      <description>&lt;P&gt;I'm getting the error message "EAP-TLS or PEAP authentication failed during SSL handshake" whille trying to authenticate using PEAP with Win2k &amp;amp; ACS 3.2.1.  I am sure it's a certificate issue.  if anybody out there could clue me in on how they got their certificate installed I'd appreciate it... I've tried a couple different instructions on Cisco's site (and others) and have had no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 16:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276849#M18859</guid>
      <dc:creator>nagle</dc:creator>
      <dc:date>2021-07-04T16:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP authentication failed during SSL handshake</title>
      <link>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276850#M18860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the debug from the AP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_send_response_to_client: Forwarding server message to client&lt;/P&gt;&lt;P&gt;0007.eb31.4db5&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_parse_client_pak: Received EAPOL packet from 0007.eb31.4db5,&lt;/P&gt;&lt;P&gt;type 0&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 0007&lt;/P&gt;&lt;P&gt;.eb31.4db5&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_send_response_to_server: Sending client 0007.eb31.4db5 data t&lt;/P&gt;&lt;P&gt;o server&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  AAA Unsupported     [136] 3&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   33                                               [3]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS(00000245): Using existing nas_port 329&lt;/P&gt;&lt;P&gt;1d05h: RADIUS/ENCODE(00000245): dropping service type, "radius-server attribute&lt;/P&gt;&lt;P&gt;6 on-for-login-auth" is off&lt;/P&gt;&lt;P&gt;1d05h: RADIUS/ENCODE(00000245): acct_session_id: 581&lt;/P&gt;&lt;P&gt;1d05h: RADIUS(00000245): sending&lt;/P&gt;&lt;P&gt;1d05h: RADIUS: Send to unknown id 70 207.175.36.30:1645, Access-Request, len 361&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  authenticator 7F D9 46 F1 BF 8F 16 1F - 84 46 76 7C C1 2F 4D A4&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  User-Name           [1]   26  "APPLY.ORG\USER001"&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  Framed-MTU          [12]  6   1400&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  Called-Station-Id   [30]  16  "0002.8a78.b393"&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  Calling-Station-Id  [31]  16  "0007.eb31.4db5"&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  Message-Authenticato[80]  18  *&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  EAP-Message         [79]  194&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   02 06 00 C0 19 80 00 00 00 B6 16 03 01 00 86 10  [?????????????&lt;/P&gt;&lt;P&gt;???]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   00 00 82 00 80 07 F9 07 D3 0A 4B DB 83 B1 CC C1  [??????????K??&lt;/P&gt;&lt;P&gt;???]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   EB 3A 2A 98 1E EB 85 B2 4F B6 51 EF F7 83 82 BE  [?:*?????O?Q??&lt;/P&gt;&lt;P&gt;???]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   D2 BE D3 22 71 82 A8 5C F0 17 3C C6 9B 22 9C 45  [???"q??\??&lt;/P&gt;&lt;P&gt;"?E]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   6F 38 A3 10 B8 73 EC 9C 7E 48 CD 0B AC 63 97 B1  [o8???s??~H???&lt;/P&gt;&lt;P&gt;c??]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   03 A8 A7 93 FB 88 90 01 70 5A 44 93 8D AD E1 1D  [????????pZD??&lt;/P&gt;&lt;P&gt;???]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   73 DF DA 86 31 1D 54 9A CB C1 E8 CF 72 8E A2 98  [s???1?T?????r&lt;/P&gt;&lt;P&gt;???]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   FC 3A 18 AE 1D E9 BB 02 37 03 B8 7F DB B2 41 68  [?:??????7????&lt;/P&gt;&lt;P&gt;?Ah]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   E3 B3 7C FD 8E 9E 0F 13 44 05 D6 3B 9D AA 66 25  [??|?????D??;?&lt;/P&gt;&lt;P&gt;?f?]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   8C CA 58 02 D8 14 03 01 00 01 01 16 03 01 00 20  [??X??????????&lt;/P&gt;&lt;P&gt;?? ]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   BA FE 3E 54 12 93 13 D7 1A FC 40 A5 A2 F4 52 73  [??&amp;gt;T??????@??&lt;/P&gt;&lt;P&gt;?Rs]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   C9 CE CF F5 AC 6F 1C 35 E1 51 59 D2 F5 93 5B A3  [?????o?5?QY??&lt;/P&gt;&lt;P&gt;?[?]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  NAS-Port-Type       [61]  6   Virtual                   [5]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  NAS-Port            [5]   6   329&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  State               [24]  36&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   43 49 53 43 4F 2D 45 41 50 2D 43 48 41 4C 4C 45  [CISCO-EAP-CHA&lt;/P&gt;&lt;P&gt;LLE]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   4E 47 45 3D 30 2E 66 66 66 66 66 66 66 66 2E 32  [NGE=0.fffffff&lt;/P&gt;&lt;P&gt;f.2]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   2E 34                                            [.4]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  NAS-IP-Address      [4]   6   172.16.200.39&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  Nas-Identifier      [32]  11  "AP-TEST"&lt;/P&gt;&lt;P&gt;1d05h: RADIUS: Received from id 70 207.175.36.30:1645, Access-Reject, len 56&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  authenticator 43 9C 4A B1 B5 C5 DA 3A - 89 58 02 8B B8 3D 78 F8&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  EAP-Message         [79]  6&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   04 06 00 04                                      [????]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  Reply-Message       [18]  12&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:   52 65 6A 65 63 74 65 64 0A 0D                    [Rejected??]&lt;/P&gt;&lt;P&gt;1d05h: RADIUS:  Message-Authenticato[80]  18  *&lt;/P&gt;&lt;P&gt;1d05h: RADIUS: Received from id 245&lt;/P&gt;&lt;P&gt;1d05h: RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes&lt;/P&gt;&lt;P&gt;1d05h: RADIUS/DECODE: Reply-Message fragments, 10, total 10 bytes&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_parse_aaa_resp: Received server response: FAIL&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_parse_aaa_resp: found eap pak in server response&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 0007.&lt;/P&gt;&lt;P&gt;eb31.4db5&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_send_response_to_client: Forwarding server message to client&lt;/P&gt;&lt;P&gt;0007.eb31.4db5&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_send_client_fail: Authentication failed for 0007.eb31.4db5&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_update_holdlist_client: Client holdlist attempts = 3&lt;/P&gt;&lt;P&gt;1d05h: dot11_dot1x_update_holdlist_client: Restarting holdoff timer...600 (secs)&lt;/P&gt;&lt;P&gt;1d05h: %DOT11-7-AUTH_FAILED: Station 0007.eb31.4db5 Authentication failed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2003 19:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276850#M18860</guid>
      <dc:creator>nagle</dc:creator>
      <dc:date>2003-10-30T19:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP authentication failed during SSL handshake</title>
      <link>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276851#M18861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;bump&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Oct 2003 13:08:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276851#M18861</guid>
      <dc:creator>nagle</dc:creator>
      <dc:date>2003-10-31T13:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP authentication failed during SSL handshake</title>
      <link>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276852#M18862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also had this error. It was because the client tried to check the server's certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I unchecked on the client the option "Validate server certificate".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe you have the same problem. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2003 14:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276852#M18862</guid>
      <dc:creator>c.fritz</dc:creator>
      <dc:date>2003-11-03T14:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP authentication failed during SSL handshake</title>
      <link>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276853#M18863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I tried that, but I'll give it another go and see what happens.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2003 14:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276853#M18863</guid>
      <dc:creator>nagle</dc:creator>
      <dc:date>2003-11-03T14:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP authentication failed during SSL handshake</title>
      <link>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276854#M18864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It was happend to me this problem too. It Happens when i erase a certificate (in the client) that i was previously request (with no problems), and when i request again, and try to reuathentificate, the problem appears...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution : I don't know, I tried to erase de SSL Cache in the client, but seems this is no the &lt;/P&gt;&lt;P&gt;problem...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SOLUTION that works to me is to restart AP (power off power on)... I restart de ACS just in case... and then, the error not appear any more...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good look&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enrique Lopez&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:elopez@magenta.cl"&gt;elopez@magenta.cl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ingeniero de Proyectos Magenta S.A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Feb 2004 18:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276854#M18864</guid>
      <dc:creator>elopez</dc:creator>
      <dc:date>2004-02-09T18:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP authentication failed during SSL handshake</title>
      <link>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276855#M18865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ben!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I`ve had the same problem until i did the following (starting from the begining):&lt;/P&gt;&lt;P&gt;1. Installed w2k (Standalone server) with SP4 (ONLY, no other patches).&lt;/P&gt;&lt;P&gt;2. Install CS v.3.2&lt;/P&gt;&lt;P&gt;3. Install the MS CA server (sharing a folder, CAConfig)&lt;/P&gt;&lt;P&gt;4. Install the initial (CA) certificate on the ACS (NOT in the "CA Authority...", only "Install a certificate").&lt;/P&gt;&lt;P&gt;5. Restart - after restart "Edit certificate... - mark your MS CA server.&lt;/P&gt;&lt;P&gt;6. Mark EAP-TLS and EAP-GTC - restart&lt;/P&gt;&lt;P&gt;7. From the client PC - go the webpage of your CA server - choose "Request.., then Advanced Request - in the name field WRITE the User (logon name) name of the user requesting the certificate, choose "Client Authentication", mark "Keys as Exportible", mark "Use local Machine Store" - click submit&lt;/P&gt;&lt;P&gt;8. Issue the client certificate from the CA server.&lt;/P&gt;&lt;P&gt;9. Go to the CA webpage (from the client PC), and install the certificate.&lt;/P&gt;&lt;P&gt;10. From the client PC, choose "Run" write "mmc /c.&lt;/P&gt;&lt;P&gt;11. Choose "Action", and the "Install Snap-in" - choose "Client certificate" - check to se if everything is correct.&lt;/P&gt;&lt;P&gt;12. Configure the 802.1X settings - choose PEAP, and "Keys are provided.." click next (or advanced, don`t remember. I`m not in my office when I`m writing this), from the pulldown list, choose your CA.&lt;/P&gt;&lt;P&gt;13. On that page choose your "Windows login.." password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By doing like this, i made work...but i prefer LEAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2004 08:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/peap-authentication-failed-during-ssl-handshake/m-p/276855#M18865</guid>
      <dc:creator>m-avramidis</dc:creator>
      <dc:date>2004-02-12T08:37:58Z</dc:date>
    </item>
  </channel>
</rss>

