07-10-2018 01:49 PM - edited 07-05-2021 08:50 AM
Hello all,
I'm trying to resolve an issue with WIFI network that was handed over to me for one client. The problem is that users are not able to join corporate WIFI which should be using WPA2-Enterprise so users should be authenticated towards NPS Radius and AD - looks like there is something wrong with authentication. I dont have much experience with WIFI and Security and Servers, so I need some help what to check. Was doing some troublehsooting but didin't help. Not sure if I'm looking at the correct part of the network that could be wrong (Certificate, WPA2 configuration, NPS, etc)
Network devices:
-standalone AP (Cisco 3621)
-2x switch (Cisco Catalyst 2960-S)
-virtualized Windows Server 2016 with NPS for RADIUS
-2x Sohpos FW
Network info:
-VLAN 107 is configured as NATIVE for trunk between AP and SW1
-VLAN 1 is configured as NATIVE from SW1 all the way to the Win server TPLVH02 where NPS is running
-AP BVI IP is 10.0.7.22 - RADIUS server IP is 10.0.7.6
- AP has 2 SSID configured and bradcasted:
-AP has 3 VLANs configured:
-FWs have interface created for each VLAN. However, I believe that communication between AP and NPS should not go through FW as they should communicate via NATIVE VLAN
-certificate is already created
What I've checked:
-I can ping RADIUS from AP and vice versa
-I dont see anything strange in EVENT VIEWER on Windows server (file attached)
-with debugging on AP, I can see for one user "authentication error" while for another one I saw "dot11_mgmt: vlan differ and parameters are different".
-I tried to change NPS/Radius/Client configuration according the info I've found on Internet, but still nto working
Attached are all info I collected for tshooting (switch configs, AP debug, Server set up, etc...)
Woudl appretiate any help I can get from you.... what to check.. what to correct... I've already spent weeks on this with no success....
Thanks in advance
07-10-2018 03:33 PM
Hi
If AP and Radius are in different vlan and you can ping each other this means that some layer 3 device is routing between vlan. According to your scenario description, I believe the firewall is doing that.
Make sure the firewall is permitting the traffic. Try to enable some tcpdump or similar on this firewall and check that.
-If I helped you somehow, please, rate it as useful.-
07-11-2018 12:13 AM
Please correct me if I'm wrong:
- if user is in VLAN 106, and 107 is used as NATIVE (BVI is part of 107), I epxect this 107 is used for communication with RADIUS? That means, untagged traffic should go to RADIUS and back for authentication. Once user is authenticated, he will receive an IP from VLAN 106? Am I right?
PS: will not be able to run tcpdump for next few days. But will try it, thanks. I just want to collect as much info about what to check/try before my next visit of the site.
07-11-2018 08:47 AM
07-11-2018 01:06 PM - edited 07-11-2018 03:12 PM
thank you for reply.... Will check the security logs....
I did run Wireshark on Radius server, and I could see packets going there and back
Access-request (1) -AP to RADIUS
Access-challenge (11) -RADIUS to AP
Access-Accept (2) -RADIUS to AP
...can see multiple REQUEST/CHALLENGE and after them ACCEPT.... these are repeating. However, dont see any other types of packet. (FYI, I had a filter set to show only RADIUS packets), so AP and RADIUS seems to be communicating between each other. FW has permited "any to any" temporarily when I'm doing testing.
PS: I've also noticed that RADIUS was responding to AP with ports 1645/1646 (which I dont have configured on AP), so I've deleted them from RADIUS and left only 1812/1813
PS:2 The strange thing that I noticed is that NATIVE VLAN 107 on AP doesnt have any input packets (when I'm checking show vlans)
07-11-2018 11:55 PM
07-13-2018 04:29 AM
Hi...
Jul 13 10:10:53.051 CET: dot11_mgr_disp_client_send_eapol: sending eapol to client 3ca9.f430.f1b4 on BSSID ccd5.3988.7190
Jul 13 10:10:53.051 CET: dot11_mgr_sm_send_wpav2_ptk_msg3: [3] Sent PTK msg 3 to 3ca9.f430.f1b4, no timer set
Jul 13 10:10:53.051 CET: dot11_mgr_sm_hs_callback: [3] Handshake msg to 3ca9.f430.f1b4, timer set: timeout 100 ms
Jul 13 10:10:53.151 CET: dot11_mgr_sm_run_machine: Executing Action(WPAV2_PTK_MSG4_WAIT,TIMEOUT) for 3ca9.f430.f1b4
Jul 13 10:10:53.151 CET: dot11_mgr_sm_handshake_pass: Handshake pass for 3ca9.f430.f1b4
Jul 13 10:10:53.151 CET: dot11_mgmt: recv AAA Auth resp for 3ca9.f430.f1b4, vlan name 107, id 107 and wnid 0
Jul 13 10:10:53.151 CET: dot11_mgmt: vlan differ and parameters are different
Jul 13 10:10:53.151 CET: dot11_mgmt: de-auth msg sent with reason = 24
Jul 13 10:10:53.151 CET: dot11_mgr_disp_auth_abort: Sending abort request for client 3ca9.f430.f1b4 to local Authenticator
The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID
PS: The full outputs are attached
07-13-2018 04:33 AM
07-13-2018 06:05 AM
I've attached the full AP configuration and also screenshots of the NPS setup in my very first post. If you are looking for some other information, could you be more specific where to find them please? Im not really sure whether you are asking for the info which are already there or some additional info I need to check.
btw,,, thanks for helping out...
07-13-2018 06:08 AM
07-17-2018 12:54 AM
07-17-2018 02:49 AM
Indeed empty. Do you also have policies under Network Policies?
Just asking because this part of the debug confuses me a little:
Jul 10 15:32:14.039 CET: RADIUS: AAA Unsupported Attr: ssid [346] 3 67891736
Jul 10 15:32:14.039 CET: RADIUS: AAA Unsupported Attr: service-type [344] 4 1
Jul 10 15:32:14.039 CET: RADIUS: AAA Unsupported Attr: interface [221] 4 67897228
In any case, your Radius says it's failed:
Jul 10 15:32:15.375 CET: dot11_auth_dot1x_parse_aaa_resp: Received server response: FAIL
Jul 10 15:32:15.375 CET: dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response
Jul 10 15:32:15.375 CET: Client 3ca9.f430.f1b4 failed: by EAP authentication server
Jul 10 15:32:15.375 CET: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 3ca9.f430.f1b4
07-17-2018 03:02 AM
thre is a Network Policy created as well. See the DOC file - page 3 (2nd and 3rd picture) and page 4 (1st picture)
07-17-2018 03:47 AM
07-17-2018 06:38 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide