08-31-2021 07:50 AM
Hi all
I've configured the ISE to do EAP-PEAP with EAP-MSCHAPv2 as an inner method. The certificate I've copied over from my old Windows NPS servers. It's a correctly externally signed one and the Apple devices work fine when the Radius on the WLC is set to the NPS.
Once I switch it to the ISE (3.0 patch 3), the Apple devices fail to authenticate. I can enter the username + password, but never get offered to accept the certificate, as I would otherwise (it's a BYOD scenario). I ignored the profile and tried to reconnect, without success. I've tested several Apple devices, all the same issue.
Android devices and Windows can connect absolutely fine though to the SSID.
The ISE shows:
12322 PEAP failed SSL/TLS handshake after a client alert
One thing that doesn't match is the hostname of the new ISE servers and the ones inside the certificate, but I'm not sure if Apple somehow validates this (I don't think it even can, as it hasn't an IP connection at that point). I did install the full chain as trusted certificates into the ISE and set this new certificate as the one for EAP Authentication.
Any ideas on how to troubleshoot this?
09-01-2021 08:21 AM
It probably is the CN not matching, but the only way to validate would be to generate a self signed and apply it, then see if it starts to prompt.
09-20-2021 06:43 AM
09-21-2021 09:08 PM
Try this guide from Cisco Meraki -- Advanced RADIUS and WPA2 Debugging using macOS
Recently I used a EAP server certificate from a different domain than that of my ISE server and it worked fine for me.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide