03-12-2025 03:53 AM
Hello,
This is related to AP dot1x authentication using LSC. We are trying to implement Dot1x using EAPTLS on access points. In our test setup we successfully enrolled certificate on access point using Enterprise PKI server.
But when we tried to use LSC certificate for EAPTLS on access point, access point is not able to trust Radius server certificate. Radius server(ISE) is using public CA certificate and not a enterprise PKI certificate.
Upon investigating we found weird limitations implemented by Cisco.
There is no way to import and trust a CA other then the CA who signed AP LSC certificate. So in our scenario either we install same Public CA certificates on 10K accesspoints and go bankrupt or use enterprise PKI certificate on ISE which will cause issue to BYOD devices as they don't have enterprise CA in their truststore.
As far as we know validation of Radius server cert is optional in RFC and there should always be an option to disable Radius server cert validation. Most endpoints either don't validate Radius server CA or they have an option to disable. But Cisco AP does not have any command for that.
"The Authentication occurs between the AP (which is acting as the supplicant) and the RADIUS server. Both must trust each other certificate. The only way to have the AP trust the RADIUS server certificate is to have the RADIUS server use a certici ate issued by the SCEP CA which issued the AP certificate as well."
Wants suggestions and your views on this topic.
03-12-2025 03:56 PM
You are correct in saying that ISE only supports a single EAP System Certificate. That is an unfortunate product limitation especially in complex cases like yours. Others have lamented this fact too, and pointed out that Aruba Clearpass supports multiple EAP certificates.
What solutions are there? You might not like this suggestion, but for BYOD, you could rather use an MDM, or if you really want to use ISE for this, then perhaps create a standalone ISE node just for this purpose. The standalone ISE node can be your BYOD onboarding solution (where the public CA signed EAP cert is used). Of course this would add some cost for the additional ISE VM (or appliance).
Meanwhile, the other production ISE platform for your Wired/Wireless 802.1X Non-BYOD) and TACACS can use the Corporate PKI for the system certs. That should allow you then to enrol those Cisco APs using SCEP.
I don't see how these two solutions can co-exist in a single ISE deployment, unless you can disable the "trust server cert" option in client devices - which is a bad idea and defeats the purpose of setting up a secure TLS connection. If you want to close your eyes and imagine that you will never be subjected to a MITM attack, then you can try disabling this feature, and if successful, your APs will not care what ISE EAP system cert you are using. Bad idea.
03-12-2025 08:41 PM
The other solution might be to have a dual SSID BYOD solution - this means having an open SSID with a guest portal to onboard the devices. The devices then get the 802.1X profile and certs for your corporate SSID. The single SSID BYOD solution is nice, but it requires the ISE System Cert to be a public signed one.
03-13-2025 01:20 AM
Hi @Arne Bier thanks for suggestions. In my opinion disabling Server cert validation on client side in this case is not that bad in my opinion. Here goal of implementing Dot1x is to protect the network and not the endpoint itself. Have not seen any organization which is stopping their PCs to connect on home/public network. Then validating Server cert during Dot1x in corporate network does not make much sense. Most of the organizations avoid pain of enabling dot1x for Access points and Cisco also promotes profiling to do authorization of access point and other non PC clients endpoints. MAB/profiling are actually increasing risk( debatable though) instead of reducing the risk. But if we use Dot1x using cert and validate if client is having valid cert, we at least protect the network in best possible way.
03-13-2025 03:16 AM
03-14-2025 12:56 AM
Technically I agree it is better to validate Server cert. But in reality many endpoints IP phones, cameras, don't even have option to validate server side cert.
03-16-2025 02:11 PM
Yeah, that is a good point - quite annoying that the developers of such solutions don't both to be a little bit more thorough.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide