cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1835
Views
0
Helpful
1
Replies

ISE rejects .1X authentication for Cisco IP 6921

ivan.kuzenkov
Level 1
Level 1

Dear community,

 

Has anyone faced the issue with 802.1X auth for cisco IP phone 6921? I ran into this problem a few weeks ago, already 3 devices of this model stopped authentication via NAC, and I can't find the reason behind this issue. I know that 6921 is an old device but, we're having quite a few in our environment.

 

CUCM v. 12.5

ISE v. 3.0

 

Here are the steps from ISE:

Steps

 11001Received RADIUS Access-Request
 11017RADIUS created a new session
 15049Evaluating Policy Group
 15008Evaluating Service Selection Policy
 15048Queried PIP - Network Access.Device IP Address
 15048Queried PIP - DEVICE.Device Type
 11507Extracted EAP-Response/Identity
 12500Prepared EAP-Request proposing EAP-TLS with challenge
 12625Valid EAP-Key-Name attribute received
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12502Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated
 12800Extracted first TLS record; TLS handshake started
 12545Client requested EAP-TLS session ticket
 12542The EAP-TLS session ticket received from supplicant while the stateless session resume is disabled. Performing full authentication
 12805Extracted TLS ClientHello message
 12806Prepared TLS ServerHello message
 12807Prepared TLS Certificate message
 12809Prepared TLS CertificateRequest message
 12505Prepared EAP-Request with another EAP-TLS challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12504Extracted EAP-Response containing EAP-TLS challenge-response
 12505Prepared EAP-Request with another EAP-TLS challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12504Extracted EAP-Response containing EAP-TLS challenge-response
 12505Prepared EAP-Request with another EAP-TLS challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12504Extracted EAP-Response containing EAP-TLS challenge-response
 12505Prepared EAP-Request with another EAP-TLS challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request (
 

 

 Step latency=1533 ms)
 11018RADIUS is re-using an existing session
 12504Extracted EAP-Response containing EAP-TLS challenge-response
 12505Prepared EAP-Request with another EAP-TLS challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12504Extracted EAP-Response containing EAP-TLS challenge-response
 12571ISE will continue to CRL verification if it is configured for specific CA - certificate for CP-6921-SEP2c542d6ac3f2
 12571ISE will continue to CRL verification if it is configured for specific CA - certificate for Cisco Manufacturing CA
 12814Prepared TLS Alert message
 12817TLS handshake failed
 12516EAP-TLS failed SSL/TLS handshake because of an expired certificate in the client certificates chain
 12507EAP-TLS authentication failed
 12505Prepared EAP-Request with another EAP-TLS challenge
 11006Returned RADIUS Access-Challenge
 11001Received RADIUS Access-Request
 11018RADIUS is re-using an existing session
 12504Extracted EAP-Response containing EAP-TLS challenge-response
 61025Open secure connection with TLS peer
 11504Prepared EAP-Failure
 11003Returned RADIUS Access-Reject

 

 

OpenSSLErrorMessageSSL alert: code=0x22D=557 ; source=local ; type=fatal ; message="X509 certificate expired.s3_srvr.c:3594 error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed [error=336105606 lib=20 func=137 reason=134]"
OpenSSLErrorStack19963:error:14089086:SSL routines:ssl3_get_client_certificate:certificate verify failed:s3_srvr.c:3594:

Authentication Details

Source Timestamp2022-05-25 12:45:18.867
Received Timestamp2022-05-25 12:45:18.867
Policy ServerServer name
Event5400 Authentication failed
Failure Reason12516 EAP-TLS failed SSL/TLS handshake because of an expired certificate in the client certificates chain
ResolutionCheck whether the client used an expired certificate. Check whether the one of the trust certificates in the client trust chain has expired. Check the OpenSSLErrorMessage and OpenSSLErrorStack for more information.
Root causeEAP-TLS failed SSL/TLS handshake because of an expired certificate in the client certificates chain
UsernameUSERNAME
Endpoint Id2C:54:2D:6A:C3:F2
Calling Station Id2C-54-2D-6A-C3-F2
Audit Session Id0A23FCA9000000170A0D4A66
Authentication Methoddot1x
Authentication ProtocolEAP-TLS
Service TypeFramed
Network DeviceSwitch name
Device TypeAll Device Types#Switches
Location 
NAS IPv4 AddressSwitch IP
NAS Port IdFastEthernet0/7
NAS Port TypeEthernet
Response Time2 milliseconds
1 Accepted Solution

Accepted Solutions

I think this should give you your answer: 

 

EAP-TLS failed SSL/TLS handshake because of an expired certificate in the client certificates chain"

 

Check the trusted CAs in the phone configuration and ensure the one used to validate the ISE Certificate is not expired.  Are you attempting to use EAP-TLS with these phones?  What is your desired EAP method?

View solution in original post

1 Reply 1

I think this should give you your answer: 

 

EAP-TLS failed SSL/TLS handshake because of an expired certificate in the client certificates chain"

 

Check the trusted CAs in the phone configuration and ensure the one used to validate the ISE Certificate is not expired.  Are you attempting to use EAP-TLS with these phones?  What is your desired EAP method?