03-16-2011 02:04 PM - edited 07-03-2021 07:57 PM
Good day!
I tried to set up the EAP-TLS according to
- http://cciew.wordpress.com/2010/06/10/eap-tls-on-the-wlc/
- http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a0080a77592.shtml
- Jeremy video about EAP-TLS
The main question is about certificates.
Tell me if I am wrong - There are two types of certificates that we need to upload to the WLC:
1) Device certificate - this is quite clear, OpenSSL, Certificate Request and e.t.c.
2) CA Root certificate - if there is only one CA Root than clear, but if we have the following chain
Root CA -> Intermediate CA -> WLC
a) Do we need to upload the whole chain "Root CA -> Intermediate CA" to the WLC ?
b) If yes, what format is it going to be? maybe smth like this
------BEGIN CERTIFICATE------
*Intermediate CA cert *
------END CERTIFICATE--------
------BEGIN CERTIFICATE------
*Root CA cert *
------END CERTIFICATE------
Solved! Go to Solution.
03-17-2011 06:11 AM
My poitn of view is that there is no credentials for EAP-TLS.
The verification of EAP-TLS is just making sure that the client is presenting a trusted certificate. And trusted means that the WLC can verify its CA.
So we don't care about credentials verification since there isn't any, right ?
03-17-2011 12:28 AM
http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a0080a77592.shtml
In your example you don't need to provide the Root CA certificate because we suppose that the client already knows and trust this root CA. so you only need to bundle the intermediate CA with the WLC certificate.
03-17-2011 01:22 AM
Nicolas, thank you for your reply!
1)
I've already seen the article, but now notice some interesting fact:
"Note: Chained certificates are supported for web authentication only; they are not supported for the management certificate."
Regarding this note, do we need to bundle any certificates for EAP-TLS scheme?
2)
On the WLC we have an opportunity to download two types of Certificates:
- Vendor Device Certificate - it is made of CSR request and then uploaded to the WLC in .pem format
- Vendor CA Certificate - this is more interesting:
Yesterday I bundled Root and Intermediate CA Certificates in one .pem file, then uploaded it to the WLC as "Vendor CA Certificate" - the result was suсcessful! During the EAP-TLS auth process SSL Handshake completed sucessfully and I connected to my EAP WLAN!
In the controller Client Properties I saw the
Everything seems to be ok, strange...
May be, the chain of Root and Intermediate CA Certificates is the redundant information, but the scheme seems to be working!
03-17-2011 05:03 AM
One strange thing about the EAP-TLS process
In why scheme Local EAP uses LDAP server for its backend database
(EAP WLAN uses 802.1x as its Layer 2 Security)
During the EAP-TLS connection process in the WLC debug, I can see the following:
So we can see, that even if the LDAP check is NOT successfull the whole EAP-TLS auth is OK - it is very strange and not very secure!
Is that right?
03-17-2011 06:11 AM
My poitn of view is that there is no credentials for EAP-TLS.
The verification of EAP-TLS is just making sure that the client is presenting a trusted certificate. And trusted means that the WLC can verify its CA.
So we don't care about credentials verification since there isn't any, right ?
03-17-2011 06:41 AM
Yes, it makes sence
But what about the feature "Local EAP using LDAP server as its backend database"?
in what situation do we need this?
03-28-2011 04:03 AM
Nicolas, good day!
I'd like to return to the ldap - EAP-TLS question
In Cisco doc http://www.cisco.com/en/US/docs/wireless/controller/4.1/configuration/guide/c41sol.html#wp1172157
we can see the following:
The LDAP backend database supports only these local EAP methods: EAP-TLS ...
so, I guess, this feature allows the WLC to get user credentials from certificate and send them to LDAP server for user validity
Besides, in WLS logs I can see that process
My question is, why does the EAP-TLS allow access to users that are not stored in AD?
03-28-2011 04:12 AM
The password equivalent is presenting a trusted cert but also the username is verified, because maybe you only want a subset of people to get access on the WLC. So that's why you do local eap+ eaptls.
What do you mean that users not on AD get access ?
03-29-2011 03:10 AM
What do you mean that users not on AD get access ?
For what purpose do we need user verification if it doesn't influence the final result?
04-13-2011 04:46 AM
Dear Nicolas, I suggest you to go on the conversation!
Let's examine the situation:
According to the situation, there are two main questions:
04-13-2011 07:55 AM
the WLC is not a complete radius server. Local eap feature is supposed to be used as a backup so it does not support revocation list. So yes the situation you describe would be a problem.
It's like using the WLC for DHCP and complaining it cannot do lots of stuff that DHCP servers do. That's true, but it's not supposed to be a full DHCP/RADIUS etc ...
04-14-2011 04:19 AM
Dear Nicolas,
The thing is not about the WLC cannot be the complete radius or DHCP server
Local eap feature is supposed to be used as a backup so it does not support revocation list.
I agree with you, there is no need to the WLC to know something about revocation list.
But what prevents WLC from taking the user credentials from certificate and check this credentials in AD? (!)
Besides, from wlc debug we can see that local eap can send user credentials to LDAP server, but has no influence on the whole EAP-TLS auth process
04-14-2011 10:02 AM
"taking the user credentials from certificate"
There is no password on a certificaite ... only a "CN" that can (or not) be equal to a username.
What the LDAP query does is to fetch the additional attributes of that user because this is not happening with the certificate validation.
04-14-2011 11:07 PM
"taking the user credentials from certificate"
My fault, I meant just username without the password
Let's return to the certificate validity.
We cannot check it straightly with the revocation list, because it is not supported - that's clear
You've wrote:
The password equivalent is presenting a trusted cert but also the username is verified, because maybe you only want a subset of people to get access on the WLC.
step be step:
The general question is, why WLC cannot just retrieve the CN/username from cert and ask the LDAP server, whether this user exists in LDAP database or not?
And If there is no user in LDAP database, the whole auth process must be unsuccessful!
Dear, Nicolas, this question is really very important for our organisation
I just try to make sure that there is/no solution for the problem
04-14-2011 11:10 PM
You are right, I misphrased in previous posts.
The LDAP query is only for attribute retrieval, my bad.
It would be a feasible enhancement request to check the username existence, indeed.
Nicolas
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide