07-18-2019 01:45 PM
ISE 2.4
WLC 5508 running 8.5 software
iPhone
I followed the instructions for setting up eap-tls here (ISE and my phone have proper certs and trust mutual ca):
Yet when I try connecting to my eap-tls ssid, ISE tells me Failure Reason 15024 PAP is not allowed. I've checked my auth policy in conjunction with what's in the link and they match. I even used an all new auth policy that allows everything just to check and I still get this error. What else can I look at?
Solved! Go to Solution.
07-18-2019 04:49 PM
If ISE is telling you that your RADIUS authentication is using PAP, then it means that the WLC is not configured correctly. If an SSID is correctly configured for any EAP method, then the RADIUS authentication request to ISE will never use PAP.
Have another look at your WLC config.
As for ISE, check that your Allowed Protocols in the Policy Set contains EAP-TLS as an allowed protocol.
Send screenshots here if you are still stuck
07-18-2019 09:07 PM - edited 07-18-2019 09:10 PM
Your Layer 2 Security is wrong.
You are doing MAC Authentication which is exactly what ISE is also reporting. It takes the MAC address from the client packet and turns it into a PAP authentication towards the RADIUS server. This is the mode you might see with iPSK or Centralised Guest Auth.
For EAP-TLS/EAP-PEAP you need Layer 2 authentication as shown below.
802.1X will eventually encrypt the data using WPA2 - this is called WPA2-Enterprise mode
Have a look below - this is the typical WPA2 Enterprise config.
07-18-2019 04:49 PM
If ISE is telling you that your RADIUS authentication is using PAP, then it means that the WLC is not configured correctly. If an SSID is correctly configured for any EAP method, then the RADIUS authentication request to ISE will never use PAP.
Have another look at your WLC config.
As for ISE, check that your Allowed Protocols in the Policy Set contains EAP-TLS as an allowed protocol.
Send screenshots here if you are still stuck
07-18-2019 06:06 PM
PAP is allowed in my ISE authorization protocols tied to the policy in question. Even using the default that already allows pap doesn't work.
07-18-2019 09:07 PM - edited 07-18-2019 09:10 PM
Your Layer 2 Security is wrong.
You are doing MAC Authentication which is exactly what ISE is also reporting. It takes the MAC address from the client packet and turns it into a PAP authentication towards the RADIUS server. This is the mode you might see with iPSK or Centralised Guest Auth.
For EAP-TLS/EAP-PEAP you need Layer 2 authentication as shown below.
802.1X will eventually encrypt the data using WPA2 - this is called WPA2-Enterprise mode
Have a look below - this is the typical WPA2 Enterprise config.
07-19-2019 06:39 AM
Thank you for that. Now my authentication fails for 5400 - 12514 EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain. So this means I'll have to work with my team on getting the proper client cert to appear. I already have it installed but it doesn't show up as a selectable option on iPhone.
07-19-2019 04:02 PM
Good stuff. The TLS error you described sounds like ISE doesn’t have the CA cert chain installed in the Trusted Certificates. That you can import easily. Just make sure it’s the Root CA and all other intermediate certs that we’re involved in creating those EAP-TLS client certs.
On most clients you can disable the server cert check. It’s not at all advisable but ok for testing purposes. In prod make sure server cert check is enabled. And that means your clients need the CA cert chain that was used to sign the ISE EAP cert.
07-19-2019 09:55 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide