{"id":2114,"date":"2015-12-22T12:55:00","date_gmt":"2015-12-22T12:55:00","guid":{"rendered":"https:\/\/jay-miah.co.uk\/?p=2114"},"modified":"2024-11-18T13:02:17","modified_gmt":"2024-11-18T13:02:17","slug":"cisco-wireless-central-authentication-using-peap-with-the-vwlc-as-the-aaa-server","status":"publish","type":"post","link":"https:\/\/jay-miah.co.uk\/index.php\/cisco-wireless-central-authentication-using-peap-with-the-vwlc-as-the-aaa-server\/","title":{"rendered":"Cisco Wireless- Central Authentication using PEAP with the vWLC as the AAA server"},"content":{"rendered":"<p>In this Step-by-Step guide we will set-up central authentication on the vWLC using PEAP \u2013 Protected Extensible Authentication Protocol, this type of authentication uses a certificate on the server side, which we validate \u2013 this must be from a valid CA on our PKI, however in this example we will use a self signed certificate issued by the vWLC. The supplicant will use a username and pw for the AAA server to validate the user, therefore we will use mutual authentication.<\/p>\n<p>The WLC will act as the AAA Server, we will create a local EAP profile to authenticate a local user. check out \u201c<a href=\"http:\/\/presspi\/?p=668\">Setting up Central Authentication using PEAP with the vWLC as the AAA server<\/a>\u201d for more information on the EAP types.<\/p>\n<p><strong>Configure the networking<\/strong><\/p>\n<p>Make sure all the networking in the background is working, the vWLC management interface and the AP must be connected to a trunk port on the switch, this is to support VLANs. Also a DHCP Server must be available to service clients with IP addresses from the relevant VLANs.<\/p>\n<p><strong>Create a Local EAP profile for PEAP<\/strong><\/p>\n<p><strong>1.<\/strong>\u00a0Login to the Wireless LAN Controller, and click\u00a0\u201cSecurity\u201d \u2013 \u201cLocal EAP\u201d \u2013 \u201cProfiles\u201d\u00a0\u2013\u00a0\u201cNew\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"436\" class=\"wp-image-2115\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-1.jpeg\" \/><\/p>\n<p><strong>2.<\/strong>\u00a0 Give the new profile a name and click\u00a0\u201cApply\u201d, in this example we have used \u201cLocal-PEAP\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1011\" height=\"94\" class=\"wp-image-2116\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-2.jpeg\" \/><\/p>\n<p><strong>3.<\/strong>\u00a0Tick the\u00a0\u201cPEAP\u201d\u00a0box to allow the profile to use PEAP as its authentication method, and click\u00a0\u201cApply\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"108\" class=\"wp-image-2117\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-3.jpeg\" \/><\/p>\n<p><strong>4.<\/strong>\u00a0From the left hand menu select\u00a0\u201cAuthentication Priority\u201d\u00a0and verify\u00a0\u201cLOCAL\u201d\u00a0is selected in the\u00a0\u201cOrder used for Authentication\u201d\u00a0box.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"494\" height=\"199\" class=\"wp-image-2118\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/5-16.jpeg\" alt=\"5\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Create a local user<\/strong><\/p>\n<p><strong>1.\u00a0<\/strong>Under\u00a0\u201cSecurity\u201d\u00a0\u2013\u00a0\u201cAAA\u201d\u00a0select\u00a0\u201cLocal Net Users\u201d\u00a0and click\u00a0\u201cNew\u201d. Create a new user for authentication and click\u00a0\u201cApply\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"591\" height=\"202\" class=\"wp-image-2119\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/5-17.jpeg\" alt=\"5\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1082\" height=\"59\" class=\"wp-image-2120\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/4-5-5.jpeg\" alt=\"4.5\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Create the WLAN<\/strong><\/p>\n<p><strong>1.<\/strong>\u00a0Navigate to\u00a0\u201cWLANs\u201d\u00a0select\u00a0\u201cCreate New\u201d\u00a0and hit\u00a0\u201cGo\u201d. Give the profile and SSID a name. in this example we have used \u201cLocal-PEAP\u201d the profile name &amp; SSID can be anything you like. Click\u00a0\u201cApply\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"151\" class=\"wp-image-2121\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-7.jpeg\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>2.<\/strong>\u00a0From the\u00a0\u201cGeneral\u201d\u00a0tab enable the WLAN and select an interface to map to the SSID, this can be any available VLAN on the network which we want users to be connected to upon successful authentication, DHCP will also issue an IP address from this range so the interface must be correctly configured.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"403\" class=\"wp-image-2122\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-8.jpeg\" \/><\/p>\n<p><strong>3.<\/strong>\u00a0Click the\u00a0\u201cSecurity\u201d\u00a0tab and verify that under layer 2 we have the following selected\u00a0\u201cWPA+WPA2\u201d,\u00a0\u201cWPA2 Policy\u201d\u00a0and\u00a0\u201c802.1X\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"587\" class=\"wp-image-2123\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-9.jpeg\" \/><\/p>\n<p><strong>4.<\/strong>\u00a0Click the\u00a0\u201cAAA\u00a0Servers\u201d\u00a0tab, scroll down and tick the\u00a0\u201cLocal EAP Authentication\u201d\u00a0enabled tick box. From the drop down menu select the profile we created earlier\u00a0\u201cLocal PEAP\u201d\u00a0and make sure that\u00a0\u201cLOCAL\u201d\u00a0is set at the top in the\u00a0\u201cOrder used for Authentication\u201d, finally click\u00a0\u201cApply\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"726\" height=\"358\" class=\"wp-image-2124\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-10.jpeg\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Client Testing\u00a0<\/strong><\/p>\n<p>Using the client device perform the following tests:<\/p>\n<p><strong>1.<\/strong>\u00a0Check to make sure the SSID is being broadcast<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"434\" height=\"336\" class=\"wp-image-2125\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-11.jpeg\" \/><\/p>\n<p><strong>2.<\/strong>\u00a0Select the SSID and connect to it providing the credentials of the user created earlier.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"537\" height=\"218\" class=\"wp-image-2126\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-12.jpeg\" \/><\/p>\n<p>The user will be prompted with a certificate warning, if a trusted certificated is used from a valid CA the certificate will be shown as trusted, in this example we have used a self signed certificate by the vWLC therefore its appearing as not verified. click\u00a0\u201cMore Details\u201d\u00a0to view the certificate properties.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"538\" height=\"271\" class=\"wp-image-2127\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/16-18.jpeg\" alt=\"16\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"536\" height=\"374\" class=\"wp-image-2128\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/17-13.jpeg\" alt=\"17\" \/><\/p>\n<p>Once we are happy the certificate is from a trusted source click\u00a0\u201cAccept\u201d\u00a0to continue and connect<\/p>\n<p><strong>3.<\/strong>\u00a0Verify the connection is successful<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"434\" height=\"336\" class=\"wp-image-2129\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-15.jpeg\" \/><\/p>\n<p><strong>4.<\/strong>\u00a0Verify the \u00a0correct IP address is being obtained by the client when connected to the relevant VLAN, in this case we used VLAN 20.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"460\" height=\"506\" class=\"wp-image-2130\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-16.jpeg\" \/><\/p>\n<p><strong>5.<\/strong>\u00a0On the WLC, verify the connected client is visible and that central authentication is being performed, navigate to\u00a0\u201cMonitor\u201d \u2013 \u201cClients\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1377\" height=\"146\" class=\"wp-image-2131\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-17.jpeg\" \/><\/p>\n<p>Click on the\u00a0\u201cClient MAC Addr\u201d\u00a0and view the details of the client. from the details we can see that the client is connected to the \u201cLocal-PEAP\u201d SSID using the local user account \u201cJay\u201d and the authentication is being handled centrally at the WLC.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1061\" height=\"724\" class=\"wp-image-2132\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-18.jpeg\" \/><\/p>\n<p>If we scroll down to the\u00a0\u201cSecurity Information\u201d\u00a0we can see that we are using \u201c802.1x\u201d along with \u201cPEAP\u201d as our authentication method.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"183\" class=\"wp-image-2133\" src=\"https:\/\/jay-miah.co.uk\/wp-content\/uploads\/2024\/11\/word-image-2114-19.jpeg\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this Step-by-Step guide we will set-up central authentication on the vWLC using PEAP \u2013 Protected Extensible Authentication Protocol, this type of authentication uses a<\/p>\n","protected":false},"author":1,"featured_media":2134,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6,17],"tags":[104,126,129],"class_list":["post-2114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-network","category-security","category-wireless","tag-authentication","tag-eap","tag-peap"],"_links":{"self":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=2114"}],"version-history":[{"count":1,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2114\/revisions"}],"predecessor-version":[{"id":2135,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/2114\/revisions\/2135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/media\/2134"}],"wp:attachment":[{"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=2114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=2114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jay-miah.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=2114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}