<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RADIUS Authentication with WPA2-Enterprise in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4553502#M238498</link>
    <description>&lt;P&gt;This guide should still be valid, even with NPS 2019:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://networklessons.com/wireless/peap-and-eap-tls-on-server-2008-and-cisco-wlc/" target="_blank"&gt;https://networklessons.com/wireless/peap-and-eap-tls-on-server-2008-and-cisco-wlc/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It's for a WLC and not Meraki setup, but the important part here is the NPS and not the WLC.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Feb 2022 12:37:56 GMT</pubDate>
    <dc:creator>patoberli</dc:creator>
    <dc:date>2022-02-16T12:37:56Z</dc:date>
    <item>
      <title>RADIUS Authentication with WPA2-Enterprise</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4551891#M238402</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I ve setup the Nps and meraki configuration settings in order to use the authentication method using the steps in the above url.&lt;/P&gt;&lt;P&gt;Everything seems ok and the AP's are contacting with the radius server,.I want to test the scenario of a device(windows/android) that has not the Self signed certificate installed so it cannot access the wifi and the scenario where the device has the certificate and have access to the wifi.Is it something else i have to do except from the configuration that is explained below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise" target="_blank" rel="noopener"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 13:48:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4551891#M238402</guid>
      <dc:creator>thanos.theod</dc:creator>
      <dc:date>2022-02-14T13:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication with WPA2-Enterprise</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4551941#M238405</link>
      <description>&lt;P&gt;You need to look at EAP-TLS not EAP-PEAP.&amp;nbsp; EAP-TLS requires a certificate on the device and radius server and for both devices to trust the server.&amp;nbsp; EAP-PEAP uses a username/password auth that only requires a radius certificate in which the device has to accept or trust.&amp;nbsp; In your post, you need to implement EAP-TLS and that would be rules specified on the radius server.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 15:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4551941#M238405</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2022-02-14T15:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication with WPA2-Enterprise</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4553291#M238480</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thank you for your answer.Can i ask you if there is a configuration sheet that describes all this process(how to configure nps and devices).&lt;BR /&gt;Also i would like to ask you if i should try the connection in non domain or domain windows devices and if i can try it in android devices too.Is there an example of doing this test to the devices and how to make changes for the certificate?&lt;/P&gt;&lt;P&gt;I have found the above configuration about it.Is that correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.dar-fi.com/configure-eap-tls-using-ise-and-meraki-ap/" target="_blank"&gt;https://www.dar-fi.com/configure-eap-tls-using-ise-and-meraki-ap/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 06:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4553291#M238480</guid>
      <dc:creator>thanos.theod</dc:creator>
      <dc:date>2022-02-16T06:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication with WPA2-Enterprise</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4553502#M238498</link>
      <description>&lt;P&gt;This guide should still be valid, even with NPS 2019:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://networklessons.com/wireless/peap-and-eap-tls-on-server-2008-and-cisco-wlc/" target="_blank"&gt;https://networklessons.com/wireless/peap-and-eap-tls-on-server-2008-and-cisco-wlc/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It's for a WLC and not Meraki setup, but the important part here is the NPS and not the WLC.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 12:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4553502#M238498</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2022-02-16T12:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication with WPA2-Enterprise</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4553597#M238510</link>
      <description>&lt;P&gt;Search the internet for the following: "cisco wlc and NPS radius", "cisco wlc and NPS PEAP", "cisco wlc and NPS EAP"&lt;/P&gt;
&lt;P&gt;This will provide you with guides, blogs and videos that will help you out.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 14:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4553597#M238510</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2022-02-16T14:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication with WPA2-Enterprise</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4556932#M238745</link>
      <description>&lt;P&gt;Thanks for your support!&lt;BR /&gt;I have just configured in Radius the above (see above attached images)for the eap-tls following the instractions of the guides.&lt;BR /&gt;I test the connection to the Radius from Meraki dashboard and i still get error in testing.&lt;BR /&gt;In event Viewer on Radius i get "The client could not be authenticated because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server." Error code 22.In android device i use the configuration for tls&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you help me if you have issued something like this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;A href="https://networklessons.com/uncategorized/eap-tls-certificates-for-wireless-on-android" target="_blank" rel="noopener"&gt;https://networklessons.com/uncategorized/eap-tls-certificates-for-wireless-on-android&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Feb 2022 08:40:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4556932#M238745</guid>
      <dc:creator>thanos.theod</dc:creator>
      <dc:date>2022-02-22T08:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication with WPA2-Enterprise</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4557392#M238782</link>
      <description>&lt;P&gt;I don't have NPS in my lab.&amp;nbsp; What I can say is that when you use EAP-TLS, the device has to have the radius root CA installed in the trusted certificate store.&amp;nbsp; The device would also need to have a valid user/device certificate installed properly.&amp;nbsp; Have you reached out to Meraki support or the Meraki forum?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Feb 2022 15:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4557392#M238782</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2022-02-22T15:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication with WPA2-Enterprise</title>
      <link>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4587842#M240534</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Is there any documentation of using a 3rd party certificate in&amp;nbsp;&lt;SPAN&gt;EAP-TLS&lt;/SPAN&gt; both in server ad clients(android,windows) according to the description of meraki's configuration sheet?&lt;/P&gt;&lt;P&gt;Is the proceedure the same as discribed above"&lt;SPAN&gt;&amp;nbsp;device has to have the radius root CA installed in the trusted certificate store.&amp;nbsp; The device would also need to have a valid user/device certificate installed properly."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise" target="_blank" rel="noopener"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Acquire a certificate from a trusted Certificate Authority&lt;/STRONG&gt;&lt;BR /&gt;As long as the CA used is trusted by clients on the network, a certificate can be purchased and uploaded into NPS to accomplish and server identity verification (required by clients). Common examples of trusted CAs include GoDaddy and VeriSign.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 07 Apr 2022 06:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-authentication-with-wpa2-enterprise/m-p/4587842#M240534</guid>
      <dc:creator>thanos.theod</dc:creator>
      <dc:date>2022-04-07T06:47:56Z</dc:date>
    </item>
  </channel>
</rss>

