Hello Friends,
To address the EAP authentication issue on your Cisco wireless controller configured as a Radius client for a Windows 2022 NPS, here is a detailed checklist and step-by-step guide for troubleshooting:
Checklist:
- EAP Configuration Verification:
- Ensure the NPS server supports the EAP types required by your clients (e.g., EAP-MSCHAPv2).
- Verify that these EAP types are enabled and correctly configured on the NPS server.
- Network Policy Configuration:
- Check that the network policy on the NPS server matches the conditions of the incoming requests (e.g., NAS Port Type, Windows Groups).
- Cisco WLC Configuration:
- Confirm that the Cisco WLC is correctly configured to use the NPS server as a Radius server.
- Verify the shared secret and IP address settings.
- Certificate Validity:
- Ensure the certificates used for EAP methods are valid and trusted by both the server and client devices.
- Event Viewer Logs:
- Check the Event Viewer logs on the NPS server for detailed error messages.
Step-by-Step Guide:
1. Verify EAP Configuration on NPS Server:
- Open the NPS Console:
- Go to
Start
>Administrative Tools
>Network Policy Server
.
- Go to
- Edit Network Policies:
- Expand
Policies
and selectNetwork Policies
. - Double-click on the relevant network policy (e.g.,
Secure Wireless ISJWLC
).
- Expand
- Check Conditions:
- Go to the
Conditions
tab. - Ensure the conditions match your wireless clients (e.g.,
NAS Port Type: Wireless - IEEE 802.11
,Windows Groups
,Day and Time Restrictions
).
- Go to the
- Check Constraints:
- Go to the
Constraints
tab. - Under
Authentication Methods
, ensure thatEAP-MSCHAPv2
is selected. - If using PEAP, ensure
Protected EAP (PEAP)
is configured withEAP-MSCHAPv2
.
- Go to the
- Apply and Save:
- Click
OK
to save changes.
- Click
2. Verify Cisco WLC Configuration:
- Access WLC Web Interface:
- Open a web browser and log in to the Cisco WLC web interface.
- Configure Radius Authentication:
- Navigate to
Security
>AAA
>Radius
>Authentication
. - Ensure the NPS server is listed with the correct IP address and shared secret.
- Navigate to
- Verify WLAN Settings:
- Go to
WLANs
and select the SSID configured for Radius authentication. - Ensure that the SSID is using the correct Radius server for authentication.
- Go to
3. Check Certificate Validity (if using EAP-TLS or PEAP):
- Validate Certificates:
- Ensure both server and client certificates are valid and not expired.
- Check that the certificates are trusted by both the server and clients.
- Import Trusted Certificates:
- On the NPS server, import the CA certificates to the
Trusted Root Certification Authorities
store. - Ensure the client devices also trust the CA certificates.
- On the NPS server, import the CA certificates to the
4. Review Event Viewer Logs:
- Open Event Viewer:
- Go to
Start
>Administrative Tools
>Event Viewer
.
- Go to
- Check NPS Logs:
- Navigate to
Custom Views
>Server Roles
>Network Policy and Access Services
. - Look for errors related to EAP authentication and note the
Reason Code
andDescription
.
- Navigate to
- Investigate Specific Errors:
- Use the
Reason Code
to find specific solutions. For instance, Reason Code22
indicates an unsupported EAP type.
- Use the
Example Commands:
- Get IP Configuration on Server: shell ipconfig /all
- Check Firewall Rules: powershell Get-NetFirewallRule | where {$_.DisplayName -like "*ICMPv6*"}
- Add Firewall Rule for ICMPv6: powershell New-NetFirewallRule -DisplayName "Allow ICMPv6-In" -Protocol ICMPv6 -IcmpType 128 -Action Allow
By following this detailed checklist and step-by-step guide, you should be able to diagnose and resolve the EAP authentication issue on your Cisco WLC and Windows 2022 NPS setup.
If you need further assistance, please feel free to ask.
Best regards,
Rosy