Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Similar documents
Configure MAC authentication SSID on Cisco Catalyst 9800 Wireless Controllers

Configuring Client Profiling

LAB: Configuring LEAP. Learning Objectives

Identity Services Engine Guest Portal Local Web Authentication Configuration Example

Configure 802.1x - PEAP with FreeRadius and WLC 8.3

Verify Radius Server Connectivity with Test AAA Radius Command

Configure to Secure a Flexconnect AP Switchport with Dot1x

Configuring FlexConnect Groups

ISE Version 1.3 Hotspot Configuration Example

What Is Wireless Setup

Configure Flexconnect ACL's on WLC

Configure Easy Wireless Setup ISE 2.2

Securing Wireless LAN Controllers (WLCs)

Cisco Exam Questions & Answers

Firepower extensible Operating System (FXOS) 2.2: Chassis Authentication and Authorization for remote management with ACS using RADIUS

Configuring Local EAP

Securing Cisco Wireless Enterprise Networks ( )

Configuring WLAN Security

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Configuring FlexConnect Groups

Universal Wireless Controller Configuration for Cisco Identity Services Engine. Secure Access How-To Guide Series

CCIE Wireless v3.1 Workbook Volume 1

ISE with Static Redirect for Isolated Guest Networks Configuration Example

Web Authentication Proxy Configuration Example

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

Configure Maximum Concurrent User Sessions on ISE 2.2

ISE Version 1.3 Self Registered Guest Portal Configuration Example

RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example

Central Web Authentication on the WLC and ISE Configuration Example

P ART 3. Configuring the Infrastructure

Cisco Exam Questions & Answers

CCIE Wireless v3 Workbook Volume 1

Configure WLC with LDAP Authentication for 802.1x and Web-Auth WLANs

ISE Express Installation Guide. Secure Access How -To Guides Series

Cisco S802dot1X - Introduction to 802.1X(R) Operations for Cisco Security Professionals.

Editing WLAN SSID or Profile Name for WLANs (CLI), page 6

Configure Guest Flow with ISE 2.0 and Aruba WLC

IEEE 802.1X Open Authentication

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions

Readme for ios 7 WebAuth on Cisco Wireless LAN Controller, Release 7.4 MR 2

Configuring an FQDN ACL

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Configuring OfficeExtend Access Points

Converged Access Wireless Controller (5760/3850/3650) BYOD client Onboarding with FQDN ACLs

Understanding Admin Access and RBAC Policies on ISE

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Wireless LAN Controller Web Authentication Configuration Example

CCIE Wireless v3 Lab Video Series 1 Table of Contents

CMX Connected Experiences- Social, SMS and Custom Portal Registration Configuration Example

DumpsFree. DumpsFree provide high-quality Dumps VCE & dumps demo free download

CounterACT 802.1X Plugin

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Using Cisco Workgroup Bridges

Configuring a Basic Wireless LAN Connection

8.5 Identity PSK Feature Deployment Guide

Cisco 4400 Series Wireless LAN Controllers PEAP Under Unified Wireless Networks with Microsoft Internet Authentication Service (IAS)

Zebra Setup Utility, Zebra Mobile Printer, Microsoft NPS, Cisco Controller, PEAP and WPA-PEAP

Cisco Deploying Basic Wireless LANs

Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5

Configuring Layer2 Security

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo

Configure RADIUS DTLS on Identity Services Engine

ISE Primer.

Configure Per-User Dynamic Access Control Lists in ISE

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9

IEEE 802.1X with ACL Assignments

ARUBA INSTANT DOT1X TROUBLESHOOTING

Configuring Local Policies

Per-User ACL Support for 802.1X/MAB/Webauth Users

Configuring r BSS Fast Transition

Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP

Troubleshooting Web Authentication on a Wireless LAN Controller (WLC)

Web Authentication Using LDAP on Wireless LAN Controllers (WLCs) Configuration Example

Configure Site Network Settings

Securing a Wireless LAN

ForeScout CounterACT. Configuration Guide. Version 4.3

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product.

Configuring NAC Out-of-Band Integration

Wireless BYOD with Identity Services Engine

FortiNAC. Aerohive Wireless Access Point Integration. Version 8.x 8/28/2018. Rev: E

AAA Administration. Setting up RADIUS. Information About RADIUS

Dynamic VLAN Assignment with WLCs based on ACS to Active Directory Group Mapping Configuration Example

Understand and Troubleshoot Central Web- Authentication (CWA) in Guest Anchor Set- Up

ISR Wireless Configuration Example

Configuring AP Groups

WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide

Cisco Exam Troubleshooting Cisco Wireless Enterprise Networks Version: 7.0 [ Total Questions: 60 ]

Configuring AP Groups

Cisco Systems, Inc. Aironet Access Point

RADIUS for Multiple UDP Ports

Service Discovery Gateway Deployment Guide, Cisco IOS-XE Release 3.3

AAA Dead-Server Detection

FortiNAC Motorola Wireless Controllers Integration

Working DERIVATION ROLE for DOMAIN and PERSONAL workstation without CPPM Jan14-Tutorial

Configuring Aggressive Load Balancing

Debugging on Cisco Wireless Controllers

Transcription:

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configuration Declare RADIUS Server on WLC Create SSID Declare WLC on ISE Create New User on ISE Create Authentication Rule Create Authorization Profile Create Authorization Rule Configuration of End Device End Device Configuration - Install ISE Self-Signed Certificate End Device Configuration - Create the WLAN Profile Verify Authentication Process on WLC Authentication Process on ISE Troubleshoot Introduction This documents describes how to set up a Wireless Local Area Network (WLAN) with 802.1x security and Virtual Local Area Network (VLAN) override with Protected Extensible Authentication Protocol (PEAP) as Extensible Authentication Protocol (EAP). Prerequisites Requirements Cisco recommends that you have knowledge of these topics: 802.1x PEAP Certification Authority (CA) Certificates

Components Used The information in this document is based on these software and hardware versions: WLC v8.3.102.0 Identity Service Engine (ISE) v2.1 Windows 10 Laptop The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Configure Network Diagram Configuration The general steps are: 1. Declare RADIUS Server on WLC and vice versa to allow communication with each other. 2. Create the Service Set Identifier (SSID) in the WLC. 3. Create the authentication rule on ISE. 4. Create the authorization profile on ISE.

5. Create the authorization rule on ISE. 6. Configure the endpoint. Declare RADIUS Server on WLC In order to allow communication between RADIUS server and WLC, it is needed to register RADIUS server on WLC and vice versa. GUI: Step 1. Open the GUI of the WLC and navigate to SECURITY > RADIUS > Authentication > New as shown in the image. Step 2. Enter the RADIUS server information as shown in the image. CLI: > config radius auth add <index> <a.b.c.d> 1812 ascii <shared-key> > config radius auth disable <index> > config radius auth retransmit-timeout <index> <timeout-seconds> > config radius auth enable <index> <a.b.c.d> corresponds to the RADIUS server.

Create SSID GUI: Step 1. Open the GUI of the WLC and navigate to WLANs > Create New > Go as shown in the image. Step 2. Choose a name for the SSID and profile, then click Apply as shown in the image. CLI: > config wlan create <id> <profile-name> <ssid-name> Step 3. Assign the RADIUS server to the WLAN. CLI: > config wlan radius_server auth add <wlan-id> <radius-index> GUI: Navigate to Security > AAA Servers and choose the desired RADIUS server, then hit Apply as shown in the image.

Step 4. Optionally increase the session timeout CLI: > config wlan session-timeout <wlan-id> <session-timeout-seconds> GUI: Navigate to WLANs > WLAN ID > Advanced and specify the Session Timeout as shown in the image.

Step 5. Enable the WLAN. CLI: > config wlan enable <wlan-id> GUI: Navigate to WLANs > WLAN ID > General and enable the SSID as shown in the image.

Declare WLC on ISE Step 1. Open ISE console and navigate to Administration > Network Resources > Network Devices > Add as shown in the image. Step 2. Enter the values. Optionally, it can be a specified Model name, software version, description and assign Network Device groups based on device types, location or WLCs. a.b.c.d correspond to the WLC's interface that sends the authentication requested. By default it is the management interface as shown in the image.

For more information about Network Device Groups review this link: ISE - Network Device Groups Create New User on ISE

Step 1. Navigate to Administration > Identity Management > Identities > Users > Add as shown in the image. Step 2. Enter the information. In this example, this user belongs to a group called ALL_ACCOUNTS but it can be adjusted as needed as shown in the image.

Create Authentication Rule Authentication rules are used to verify if the credentials of the users are right (verify if the user really is who it says it is) and limit the authentication methods that are allowed to be used by it.

Step 1. Navigate to Policy > Authentication as shown in the image. Step 2. Insert a new authentication rule as shown in the image. Step 3. Enter the values. This authentication rule allows all the protocols listed under the Default Network Access list, this applies to the authentication request for Wireless 802.1x clients and with Called-Station-ID and ends with ise-ssid as shown in the image. Also, choose the Identity source for the clients that matches this authentication rule. This example uses Internal users identity source list as shown in the image.

Once finished, click Done and Save as shown in the image. For more information about Allow Protocols Policies consult this link: Allowed Protocols Service For more information about Identity sources consult this link: Create a User Identity Group Create Authorization Profile The authorization profile determines if the client has access or not to the network, push Access Control Lists (ACLs), VLAN override or any other parameter. The authorization profile shown in this example sends an access accept for the client and assigns the client to VLAN 2404. Step 1. Navigate to Policy > Policy Elements > Results as shown in the image.

Step 2. Add a new Authorization Profile. Navigate to Authorization > Authorization Profiles > Add as shown in the image. Step 3. Enter the values as shown in the image.