02-14-2020 06:10 AM
Hello all ,
We have changed the EAP certificate with a wildcard .
Since then from windows supplicant we are getting the below error :
"EAP Root cause String: The authentication failed because the certificate on the server
computer does not have a server name specified"
The EAP certificate on CN has the follow value :
CN=*.companyname.com
and on SAN has the below value
DNS Name=*.companyname.gr
On ISE when a client tries to connect we get the follow log :
Event | 5400 Authentication failed |
Failure Reason | 12511 Unexpectedly received TLS alert message; treating as a rejection by the client |
Resolution | Ensure that the ISE server certificate is trusted by the client, by configuring the supplicant with the CA certificate that signed the ISE server certificate. It is strongly recommended to not disable the server certificate validation on the client! |
Root cause | While trying to negotiate a TLS handshake with the client, ISE received an unexpected TLS alert message. This might be due to the supplicant not trusting the ISE server certificate for some reason. ISE treated the unexpected message as a sign that the client rejected the tunnel establishment. |
Is anyone know if it is possible to bypass this error and manage to connect to network ?
Thank You ,
Palaiologos
Solved! Go to Solution.
02-16-2020 04:44 PM
It's a well documented fact that wildcard in a Subject Common Name will break EAP authentication with Windows supplicants.
The preferred method is to use a Subject Common Name that does not contain a wildcard. The SAN should contain the list of FQDNs of all the EAP servers.
I believe there is one way to circumvent this Windows limitation: Wildcard in Subject CN if and only if, the SAN contains the FQDN of the affected ISE nodes (and no wildcards in the SAN).
The notes above pertain only to EAP. For web portal and Admin there are issues with wildcards in the Subject CN. Although wildcard in Subject CN is a deprecated thing. Modern browsers will look in the SAN if one is present and ignore what's in the Subject CN
02-14-2020 06:17 AM
When you do wildcard certificates, the Subject/CN should be one of the ISE node's FQDN. Then you put the wildcard within a SAN field. That is what you will need to do to resolve this issue. If you try to bypass the error and connect anyway, then you are reducing the level of security and opening your clients up to potential man-in-the-middle attacks.
02-16-2020 04:44 PM
It's a well documented fact that wildcard in a Subject Common Name will break EAP authentication with Windows supplicants.
The preferred method is to use a Subject Common Name that does not contain a wildcard. The SAN should contain the list of FQDNs of all the EAP servers.
I believe there is one way to circumvent this Windows limitation: Wildcard in Subject CN if and only if, the SAN contains the FQDN of the affected ISE nodes (and no wildcards in the SAN).
The notes above pertain only to EAP. For web portal and Admin there are issues with wildcards in the Subject CN. Although wildcard in Subject CN is a deprecated thing. Modern browsers will look in the SAN if one is present and ignore what's in the Subject CN
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide