05-19-2011 02:35 PM - edited 03-10-2019 06:06 PM
Has anyone experienced a problem getting a Cisco WLC to work with MS NPS server? We've done it before albeit with differnt code versions.
I have a Cisco 5508 WLC running 7.0.116.0 code hosting a WLAN configured for WPA2 with 802.1x for authentication. I have two Windows NPS servers configured as the RADIUS servers for EAP-TLS authentication. Via debug info on the WLC I can see the 802.1x handshake take place with the wireless client and the WLC as well as a successful transmission of an Authentication Packet from the WLC to one of the RADIUS servers. However on the WLC I see repeated RADIUS server x.x.x.x:1812 deactivated in global list and on the NPS server I'm seeing event log errors indicating "The Network Policy Server discarded the request for a user" along with the pertinent auth request info that I would expect the NPS server to receive from the WLC.
Based on the WLC debug info I'm never actually getting to the EAP-TLS certificate authentication part. It seems the NPS servers don't like the format of the initial RADIUS authentication request coming from the WLC and so don't respond whcih in turn casues to WLC to switch to the other NPS server which produces the same issue.
Any ideas of what might be the issue or misconfiguration?
05-25-2011 11:46 PM
Jim,
I wanted to know if you can setup wireshark on both of the boxes and see if your are hitting the following bug:
It looks as if the WLC is retransmitting the client traffic from one radius session with primary over to the secondary in which the radius state attribute that was assigned from the primary server is probably hitting the secondary server. Therefore if the state attribute isnt assigned from the secondary server it will discard the packet.
May need to open a TAC case to see if this issue is on the 550x controllers also.
Thanks,
Tarik
06-01-2011 07:33 AM
I can't say for certian if we are seeing the identified bug or not but that certainly isn't the root cause as I was not able to successfully authenticate in the new environment at all. According the the bug info, subsequent auth requests after failing over between RADIUS servers should be successful.
I didn't get to the point of taking traces as we were able to resolve the problem. Our MS Windows NPS server needed to be configured to emulate a "Cisco" RADIUS server. I don't manage the NPS environment so I can't offer specific MS NPS configuration details but sufficive to say Cisco-to-MS RADIUS implementations apparently aren't as natively compatible as I'd assumed.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide