11-20-2019 05:32 AM
Greetings.
I see that Meraki MR access points now support iPSK. I also saw a configuration example posted using FreeRADIUS and Cisco ISE but I was wondering if there was anything available for configuring iPSK with Microsoft NPS posted anywhere.
Any information would be greatly appreciated.
Thanks in advance.
Joe
11-20-2019 07:48 AM
Take a look at this recent blog here:
https://www.synic.nl/2019/11/11/configuring-meraki-ipsk-with-freeradius/
The documentation Meraki provides for IPSK is at the moment a bit sparse:
https://documentation.meraki.com/MR/Access_Control/IPSK_with_RADIUS_Authentication.
They do provide some information, but it’s rather incomplete and even incorrect at places. The main caveat is that it lacks instructions for Windows NPS support, which is presumably the most used RADIUS server for Meraki 802.1X implementations. The reason for this is that Windows NPS probably lacks the RADIUS attributes or functionality to support IPSK. The instructions do mention Cisco ISE, which is a rarity in the SMB market, and FreeRADIUS, but this is more of a pointer than an instruction. Plus it forgets to mention the most awesomest feature of all: VLAN assignment!
11-20-2019 08:21 AM
Nolan -
Thank you. The customer currently does implement Microsoft NPS for Windows user/computer authentication using PEAP so I think I'll have to just try iPSK with it and see how it goes.
I believe that since Microsoft NPS integrates directly with AD I may have to generate AD user accounts that reflect the MAC address of the 'PSK-only' devices (older IoT devices) for authentication. As far as I can tell the RADIUS attributes that are needed are options in Microsoft NPS.
Cheers
Joe
11-20-2019 10:27 AM
Microsoft NPS definately can not do iPSK.
You could integrate FreeRADIUS with AD and simply replace NPS.
11-26-2019 09:25 PM
Did you have any luck with Microsoft NPS and iPSK setup?
11-27-2019 04:08 AM
Kurtis -
I haven't tried it yet. I am waiting to get a 'PSK-only' device in my hands. Hoping to give the config a shot later on this week or sometime next week. I'll gladly post if it's a success of failure.
Cheers
Joe
11-27-2019 08:10 AM
01-14-2020 04:17 AM
01-14-2020 04:53 AM
I ran into the same issue. I was using NPS on Windows 2012 R2. What version of Windows server are you using? I was thinking of trying Windows Server 2019 to see if any updates to NPS features/functions were done.
In the meantime I am waiting for approval to get an MR license or two so I can continue testing (my eval license expired). Really hoping to get this working using NPS since the majority of my customer already deploy it.
Cheers,
Joe
01-14-2020 05:37 AM
I am using Windows Server 2019 - which attributes did you use?
My clients are not accepting my attributes for the PSK.
I have created an account in Acitive Directory (for MAB) and it gets authenticated successfully. But it will not accept the Tunnel-Password as PSK - did you succced on getting the correct attribute to use?
01-14-2020 06:01 AM
I am in the same position you are but I was using Windows Server 2012 R2.
I was also able to get MAB to work but the Tunnel-Password attribute would not be accepted by the clients. I was going to try using the Cisco-specific attributes to see if any of those would work.
I was hoping that the version of Windows server I was using was the cause of the issue but if you are using Windows Server 2019 then it's not that.
Cheers,
Joe
01-14-2020 06:09 AM
@j-shearer I have also tried with the Cisco-AV-Pair attributes. It didn't work either.
Here you can see my original attributes setup - where Tunnel-Password is not acceptet.
04-08-2020 07:53 AM
04-08-2020 01:46 PM
It wont be possible to make this work with NPS.
04-09-2020 12:07 AM
Ok, seems to be like that, but why is that? What is the NPS doing different?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide