AOS & CPPM INTEGRATION 
CONFIGURATION & TESTING 
EAP TLS & EAP PEAP 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved 
by 
Abilash Soundararajan
EAP-TLS 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Certificate Requirements for EAP-TLS architecture 
(EAP tunnel termination on CPPM) 
User Certificate 
Root CA Cert 
Signing CA Cert 
Radius CA Cert 
Root CA in Trusted 
Root CA list
Certificate Requirements for EAP-TLS architecture 
(EAP tunnel termination on Controller) 
User Certificate 
Server Cert 
Trusted CA Cert 
Root CA Cert 
Signing CA Cert 
Root CA in Trusted 
Root CA list
SETTING UP EAP-TLS 
TERMINATION ON CPPM 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Steps for EAP-TLS (Termination on CPPM) 
• Creating CA & Signing CA on CPPM 
• Configuring Controller 
– SSID profile 
– Dot1x profile 
– Server & Server Group 
– AAA profile 
– VAP Profile 
–Mapping to AP-group 
• Configuring Device & Services in CPPM 
• Creating CSR, Radius cert and uploading it 
• Creating User in CPPM 
• Creating Client Certificates 
• Checking Access Tracker 
• Troubleshooting from Controller
Creating CA & Signing CA on CPPM 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating CA & Signing CA on CPPM 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking CA cert info 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configuring Controller – SSID profile 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configuring Controller – Dot1x profile 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configure server info and map to server group 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Mapping Dot1x, AAA & SSID profiles 
Mapping Do1x to AAA profile Mapping AAA & SSID to VAP Profile 
Add this VAP to the AP-group that needs this SSID. 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Add Controller to the devices in CPPM 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating an Enforcement Policy 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating Enforcement Policy Rules 
• There are different ways of doing this step. 
• In this case we are going to check, if the Certificate submitted by client for 
authentication has in its common name “Company_ABCD”, which is also in our 
list of Signing CAs. 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating Service in CPPM to cater to EAP-TLS 
requests 
Adding ESSID name to the list of conditions to be checked 
to match this Service. 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Adding necessary Authentication Methods & 
Sources necessary 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Mapping the Enforcement Profile configured 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating CSR for RADIUS server 
Note: Need to download 2 files. “CertSignRequest.csr” & “CertPrivKey.pkey” 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating Radius server cert with corresponding CA 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Uploading the Radius server cert to Server Certs 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
New Radius certificate seen in the Server Certs 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating User certificates 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking Certificates created and Exporting Client 
certificate 
Exporting Client Certificate with private key, secured with a Passphrase 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Installing the Client certificate on the end device 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating the user in the Local user database (as CN 
of the user will be checked in Local DB) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Troubleshooting Radius Service from Controller 
• Current service will not help in doing aaa test-server 
– As its only meant for EAP-TLS & EAP-PEAP 
• Below addition in services can help in doing an MSChapv2 as well 
– Disable it post testing for stricter security compliance 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs on CPPM for successful test 
authentication 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs on Controller for Successful/ failed 
test authentication 
(Master) #show log security 30 | include User,server,fail 
Aug 4 10:55:53 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 
Aug 4 10:55:53 :124019: <INFO> |authmgr| Test server response: Authentication Successful 
Aug 4 11:02:52 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM 
Aug 4 11:02:57 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1 
Aug 4 11:02:57 :124019: <INFO> |authmgr| Test server response: Authentication failed 
Aug 4 11:05:15 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM 
Aug 4 11:05:20 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1 
Aug 4 11:05:20 :124019: <INFO> |authmgr| Test server response: Authentication failed 
Aug 4 11:06:20 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM 
Aug 4 11:06:20 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found. 
Aug 4 11:06:20 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 
Aug 4 11:06:20 :124019: <INFO> |authmgr| Test server response: Authentication Successful 
Aug 4 11:07:09 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM 
Aug 4 11:07:14 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1 
Aug 4 11:07:14 :124019: <INFO> |authmgr| Test server response: Authentication failed 
Aug 4 11:14:50 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM 
Aug 4 11:14:50 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found. 
Aug 4 11:14:50 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 
Aug 4 11:14:50 :124019: <INFO> |authmgr| Test server response: Authentication Successful 
Aug 4 11:15:56 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM 
Aug 4 11:15:56 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found. 
Aug 4 11:15:56 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 
Aug 4 11:15:56 :124019: <INFO> |authmgr| Test server response: Authentication Successful 
Aug 4 11:16:36 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM 
Aug 4 11:16:36 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found. 
Aug 4 11:16:36 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 
Aug 4 11:16:36 :124019: <INFO> |authmgr| Test server response: Authentication Successful 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Download & Install Root CA Certificate to the list of 
Trusted CAs in the EAP-TLS client 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Server Validation settings in Client 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Choosing Client cert for authenticating while 
connecting & Successful Authentication 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking Security logs for the EAP-TLS event 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs in Access Tracker (CPPM) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Client Attributes sent and Authentication Sources 
used 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
EAP-TLS WITH TERMINATION 
ON CONTROLLER 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Create Server certificate for Controller – Generate 
CSR for controller
Generate certificate for WLAN controller using CSR 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Upload the certificate to the controller as Server 
certificate and also the CA certs 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Map the certificates to Dot1x profile and enable 
Termination 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configuring CPPM Service 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configuring Authentication Method for Service 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Enforcement policy for Service 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Ensure that you have User in the DB with the same 
Name as CN in the User cert 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Controller Side verification – auth-tracebuf 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Controller side log verification – Security logs 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs in the Access Tracker (CPPM) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs in the Access Tracker (CPPM) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
EAP-PEAP 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Certificate Requirements for EAP-PEAP architecture 
(EAP tunnel termination on CPPM) 
Root CA Cert 
Username: Employee1 
Password:xxxxxx 
Root CA in Trusted Signing CA Cert 
Radius CA Cert 
Root CA list
Certificate Requirements for EAP-PEAP architecture 
(EAP tunnel termination on Controller) 
Server Cert 
Trusted CA Cert 
Root CA Cert 
Username: Employee1 
Password:xxxxxx 
Root CA in Trusted Signing CA Cert 
Root CA list
EAP-PEAP WITH 
TERMINATION ON CPPM 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
No change in controller config when compared to 
EAP-TLS setup (Termination on CPPM) 
Option disabled as termination is disabled
Only change in CPPM Service config when compared 
to EAP-TLS (Termination on CPPM) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Client config for EAP-PEAP (Auth Method, Server 
Certificate & Trusted Root CA) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking the steps of EAP-PEAP with termination 
on CPPM 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking controller logs for EAP-PEAP 
authentication 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking authentication logs at Access Tracker 
(CPPM) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Access Tracker showing Outer and Inner EAP 
tunnel methods 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
EAP-PEAP WITH TERMINATION ON 
CONTROLLER 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Only change from EAP-TLS (with termination on 
controller) in config for EAP-PEAP
Change in CPPM Service config (compared to EAP-TLS 
with termination on controller) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Auth-tracebuf from controller showing steps in EAP-PEAP 
authentication 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking security logs in controller for the 
authentication 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Logs at Access Tracker (CPPM) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Logs at Access Tracker (CPPM) 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
MISCELLANEOUS 
TROUBLESHOOTING TIPS 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Check the service that is being used in case failed 
authentication 
In the below output for some reason its hitting wrong Service “test123”, while 
name of our service is “Company_ABCD-EAP-PEAP”
Check if right Authentication methods are configured 
In the below output only “Mschap” was configured as the Authentication method, 
while actually “EAP-PEAP” was required. 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Ensure right certificates are used at CPPM, 
Controller & Client 
Always ensure 
• The certificate path is correct and 
right certificates are positioned in 
right devices. 
• The root CA is trusted in the client 
device 
• Validate the server certificate in client 
for mutual authentication & mention 
the exact CN of the Authentication 
server. 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
THANK YOU!!! 
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved

Aos & cppm integration & testing document for eap tls & eap peap

  • 1.
    AOS & CPPMINTEGRATION CONFIGURATION & TESTING EAP TLS & EAP PEAP CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved by Abilash Soundararajan
  • 2.
    EAP-TLS CONFIDENTIAL ©Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 3.
    Certificate Requirements forEAP-TLS architecture (EAP tunnel termination on CPPM) User Certificate Root CA Cert Signing CA Cert Radius CA Cert Root CA in Trusted Root CA list
  • 4.
    Certificate Requirements forEAP-TLS architecture (EAP tunnel termination on Controller) User Certificate Server Cert Trusted CA Cert Root CA Cert Signing CA Cert Root CA in Trusted Root CA list
  • 5.
    SETTING UP EAP-TLS TERMINATION ON CPPM CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 6.
    Steps for EAP-TLS(Termination on CPPM) • Creating CA & Signing CA on CPPM • Configuring Controller – SSID profile – Dot1x profile – Server & Server Group – AAA profile – VAP Profile –Mapping to AP-group • Configuring Device & Services in CPPM • Creating CSR, Radius cert and uploading it • Creating User in CPPM • Creating Client Certificates • Checking Access Tracker • Troubleshooting from Controller
  • 7.
    Creating CA &Signing CA on CPPM CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 8.
    Creating CA &Signing CA on CPPM CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 9.
    Checking CA certinfo CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 10.
    Configuring Controller –SSID profile CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 11.
    Configuring Controller –Dot1x profile CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 12.
    Configure server infoand map to server group CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 13.
    Mapping Dot1x, AAA& SSID profiles Mapping Do1x to AAA profile Mapping AAA & SSID to VAP Profile Add this VAP to the AP-group that needs this SSID. CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 14.
    Add Controller tothe devices in CPPM CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 15.
    Creating an EnforcementPolicy CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 16.
    Creating Enforcement PolicyRules • There are different ways of doing this step. • In this case we are going to check, if the Certificate submitted by client for authentication has in its common name “Company_ABCD”, which is also in our list of Signing CAs. CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 17.
    Creating Service inCPPM to cater to EAP-TLS requests Adding ESSID name to the list of conditions to be checked to match this Service. CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 18.
    Adding necessary AuthenticationMethods & Sources necessary CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 19.
    Mapping the EnforcementProfile configured CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 20.
    Creating CSR forRADIUS server Note: Need to download 2 files. “CertSignRequest.csr” & “CertPrivKey.pkey” CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 21.
    Creating Radius servercert with corresponding CA CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 22.
    Uploading the Radiusserver cert to Server Certs CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 23.
    New Radius certificateseen in the Server Certs CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 24.
    Creating User certificates CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 25.
    Checking Certificates createdand Exporting Client certificate Exporting Client Certificate with private key, secured with a Passphrase CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 26.
    Installing the Clientcertificate on the end device CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 27.
    Creating the userin the Local user database (as CN of the user will be checked in Local DB) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 28.
    Troubleshooting Radius Servicefrom Controller • Current service will not help in doing aaa test-server – As its only meant for EAP-TLS & EAP-PEAP • Below addition in services can help in doing an MSChapv2 as well – Disable it post testing for stricter security compliance CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 29.
    Checking logs onCPPM for successful test authentication CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 30.
    Checking logs onController for Successful/ failed test authentication (Master) #show log security 30 | include User,server,fail Aug 4 10:55:53 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 Aug 4 10:55:53 :124019: <INFO> |authmgr| Test server response: Authentication Successful Aug 4 11:02:52 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM Aug 4 11:02:57 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1 Aug 4 11:02:57 :124019: <INFO> |authmgr| Test server response: Authentication failed Aug 4 11:05:15 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM Aug 4 11:05:20 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1 Aug 4 11:05:20 :124019: <INFO> |authmgr| Test server response: Authentication failed Aug 4 11:06:20 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM Aug 4 11:06:20 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found. Aug 4 11:06:20 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 Aug 4 11:06:20 :124019: <INFO> |authmgr| Test server response: Authentication Successful Aug 4 11:07:09 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM Aug 4 11:07:14 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1 Aug 4 11:07:14 :124019: <INFO> |authmgr| Test server response: Authentication failed Aug 4 11:14:50 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM Aug 4 11:14:50 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found. Aug 4 11:14:50 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 Aug 4 11:14:50 :124019: <INFO> |authmgr| Test server response: Authentication Successful Aug 4 11:15:56 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM Aug 4 11:15:56 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found. Aug 4 11:15:56 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 Aug 4 11:15:56 :124019: <INFO> |authmgr| Test server response: Authentication Successful Aug 4 11:16:36 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPM Aug 4 11:16:36 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found. Aug 4 11:16:36 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0 Aug 4 11:16:36 :124019: <INFO> |authmgr| Test server response: Authentication Successful CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 31.
    Download & InstallRoot CA Certificate to the list of Trusted CAs in the EAP-TLS client CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 32.
    Server Validation settingsin Client CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 33.
    Choosing Client certfor authenticating while connecting & Successful Authentication CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 34.
    Checking Security logsfor the EAP-TLS event CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 35.
    Checking logs inAccess Tracker (CPPM) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 36.
    Client Attributes sentand Authentication Sources used CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 37.
    EAP-TLS WITH TERMINATION ON CONTROLLER CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 38.
    Create Server certificatefor Controller – Generate CSR for controller
  • 39.
    Generate certificate forWLAN controller using CSR CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 40.
    Upload the certificateto the controller as Server certificate and also the CA certs CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 41.
    Map the certificatesto Dot1x profile and enable Termination CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 42.
    Configuring CPPM Service CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 43.
    Configuring Authentication Methodfor Service CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 44.
    Enforcement policy forService CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 45.
    Ensure that youhave User in the DB with the same Name as CN in the User cert CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 46.
    Controller Side verification– auth-tracebuf CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 47.
    Controller side logverification – Security logs CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 48.
    Checking logs inthe Access Tracker (CPPM) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 49.
    Checking logs inthe Access Tracker (CPPM) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 50.
    EAP-PEAP CONFIDENTIAL ©Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 51.
    Certificate Requirements forEAP-PEAP architecture (EAP tunnel termination on CPPM) Root CA Cert Username: Employee1 Password:xxxxxx Root CA in Trusted Signing CA Cert Radius CA Cert Root CA list
  • 52.
    Certificate Requirements forEAP-PEAP architecture (EAP tunnel termination on Controller) Server Cert Trusted CA Cert Root CA Cert Username: Employee1 Password:xxxxxx Root CA in Trusted Signing CA Cert Root CA list
  • 53.
    EAP-PEAP WITH TERMINATIONON CPPM CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 54.
    No change incontroller config when compared to EAP-TLS setup (Termination on CPPM) Option disabled as termination is disabled
  • 55.
    Only change inCPPM Service config when compared to EAP-TLS (Termination on CPPM) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 56.
    Client config forEAP-PEAP (Auth Method, Server Certificate & Trusted Root CA) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 57.
    Checking the stepsof EAP-PEAP with termination on CPPM CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 58.
    Checking controller logsfor EAP-PEAP authentication CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 59.
    Checking authentication logsat Access Tracker (CPPM) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 60.
    Access Tracker showingOuter and Inner EAP tunnel methods CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 61.
    EAP-PEAP WITH TERMINATIONON CONTROLLER CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 62.
    Only change fromEAP-TLS (with termination on controller) in config for EAP-PEAP
  • 63.
    Change in CPPMService config (compared to EAP-TLS with termination on controller) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 64.
    Auth-tracebuf from controllershowing steps in EAP-PEAP authentication CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 65.
    Checking security logsin controller for the authentication CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 66.
    Logs at AccessTracker (CPPM) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 67.
    Logs at AccessTracker (CPPM) CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 68.
    MISCELLANEOUS TROUBLESHOOTING TIPS CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 69.
    Check the servicethat is being used in case failed authentication In the below output for some reason its hitting wrong Service “test123”, while name of our service is “Company_ABCD-EAP-PEAP”
  • 70.
    Check if rightAuthentication methods are configured In the below output only “Mschap” was configured as the Authentication method, while actually “EAP-PEAP” was required. CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 71.
    Ensure right certificatesare used at CPPM, Controller & Client Always ensure • The certificate path is correct and right certificates are positioned in right devices. • The root CA is trusted in the client device • Validate the server certificate in client for mutual authentication & mention the exact CN of the Authentication server. CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
  • 72.
    THANK YOU!!! CONFIDENTIAL© Copyright 2014. Aruba Networks, Inc. All rights reserved