Post on 14-Dec-2015
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
AOS & CPPM INTEGRATIONCONFIGURATION & TESTING
EAP TLS & EAP PEAP
by Abilash Soundararajan
EAP-TLS
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Certificate Requirements for EAP-TLS architecture (EAP tunnel termination on CPPM)
User Certificate
Root CA Cert
Radius CA Cert
Signing CA Cert
Root CA in Trusted Root CA list
Certificate Requirements for EAP-TLS architecture (EAP tunnel termination on Controller)
User Certificate
Server Cert
Trusted CA Cert
Root CA Cert
Signing CA Cert
Root CA in Trusted Root CA list
SETTING UP EAP-TLS TERMINATION ON CPPM
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Steps for EAP-TLS (Termination on CPPM)
• Creating CA & Signing CA on CPPM
• Configuring Controller– SSID profile– Dot1x profile– Server & Server Group– AAA profile– VAP Profile– Mapping to AP-group
• Configuring Device & Services in CPPM
• Creating CSR, Radius cert and uploading it
• Creating User in CPPM
• Creating Client Certificates
• Checking Access Tracker
• Troubleshooting from Controller
Creating CA & Signing CA on CPPM
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating CA & Signing CA on CPPM
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking CA cert info
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configuring Controller – SSID profile
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configuring Controller – Dot1x profile
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configure server info and map to server group
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Mapping Dot1x, AAA & SSID profiles
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Mapping Do1x to AAA profile Mapping AAA & SSID to VAP Profile
Add this VAP to the AP-group that needs this SSID.
Add Controller to the devices in CPPM
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating an Enforcement Policy
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating Enforcement Policy Rules
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
• There are different ways of doing this step.• In this case we are going to check, if the Certificate submitted by client for
authentication has in its common name “Company_ABCD”, which is also in our list of Signing CAs.
Creating Service in CPPM to cater to EAP-TLS requests
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Adding ESSID name to the list of conditions to be checked to match this Service.
Adding necessary Authentication Methods & Sources necessary
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Mapping the Enforcement Profile configured
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating CSR for RADIUS server
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Note: Need to download 2 files. “CertSignRequest.csr” & “CertPrivKey.pkey”
Creating Radius server cert with corresponding CA
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Uploading the Radius server cert to Server Certs
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
New Radius certificate seen in the Server Certs
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating User certificates
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking Certificates created and Exporting Client certificate
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Exporting Client Certificate with private key, secured with a Passphrase
Installing the Client certificate on the end device
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Creating the user in the Local user database (as CN of the user will be checked in Local DB)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Troubleshooting Radius Service from Controller
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
• Current service will not help in doing aaa test-server – As its only meant for EAP-TLS & EAP-PEAP
• Below addition in services can help in doing an MSChapv2 as well– Disable it post testing for stricter security compliance
Checking logs on CPPM for successful test authentication
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs on Controller for Successful/ failed test authentication
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
(Master) #show log security 30 | include User,server,failAug 4 10:55:53 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0Aug 4 10:55:53 :124019: <INFO> |authmgr| Test server response: Authentication SuccessfulAug 4 11:02:52 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPMAug 4 11:02:57 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1Aug 4 11:02:57 :124019: <INFO> |authmgr| Test server response: Authentication failedAug 4 11:05:15 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPMAug 4 11:05:20 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1Aug 4 11:05:20 :124019: <INFO> |authmgr| Test server response: Authentication failedAug 4 11:06:20 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPMAug 4 11:06:20 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found.Aug 4 11:06:20 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0Aug 4 11:06:20 :124019: <INFO> |authmgr| Test server response: Authentication SuccessfulAug 4 11:07:09 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPMAug 4 11:07:14 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=1Aug 4 11:07:14 :124019: <INFO> |authmgr| Test server response: Authentication failedAug 4 11:14:50 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPMAug 4 11:14:50 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found.Aug 4 11:14:50 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0Aug 4 11:14:50 :124019: <INFO> |authmgr| Test server response: Authentication SuccessfulAug 4 11:15:56 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPMAug 4 11:15:56 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found.Aug 4 11:15:56 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0Aug 4 11:15:56 :124019: <INFO> |authmgr| Test server response: Authentication SuccessfulAug 4 11:16:36 :124011: <INFO> |authmgr| Test authenticating user Employee1:****** using server Company-ABC-CPPMAug 4 11:16:36 :121041: <DBUG> |authmgr| User Employee1 MAC=00:00:00:00:00:00 not found.Aug 4 11:16:36 :124004: <DBUG> |authmgr| Auth server 'Company-ABC-CPPM' response=0Aug 4 11:16:36 :124019: <INFO> |authmgr| Test server response: Authentication Successful
Download & Install Root CA Certificate to the list of Trusted CAs in the EAP-TLS client
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Server Validation settings in Client
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Choosing Client cert for authenticating while connecting & Successful Authentication
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking Security logs for the EAP-TLS event
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs in Access Tracker (CPPM)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Client Attributes sent and Authentication Sources used
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
EAP-TLS WITH TERMINATION ON CONTROLLER
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Create Server certificate for Controller – Generate CSR for controller
Generate certificate for WLAN controller using CSR
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Upload the certificate to the controller as Server certificate and also the CA certs
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Map the certificates to Dot1x profile and enable Termination
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configuring CPPM Service
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Configuring Authentication Method for Service
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Enforcement policy for Service
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Ensure that you have User in the DB with the same Name as CN in the User cert
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Controller Side verification – auth-tracebuf
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Controller side log verification – Security logs
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs in the Access Tracker (CPPM)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking logs in the Access Tracker (CPPM)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
EAP-PEAP
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Certificate Requirements for EAP-PEAP architecture (EAP tunnel termination on CPPM)
Root CA Cert
Radius CA Cert
Signing CA CertRoot CA in Trusted Root CA list
Username: Employee1Password:xxxxxx
Certificate Requirements for EAP-PEAP architecture (EAP tunnel termination on Controller)
Server Cert
Trusted CA Cert
Root CA Cert
Signing CA CertRoot CA in Trusted Root CA list
Username: Employee1Password:xxxxxx
EAP-PEAP WITH TERMINATION ON CPPM
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
No change in controller config when compared to EAP-TLS setup (Termination on CPPM)
Option disabled as termination is disabled
Only change in CPPM Service config when compared to EAP-TLS (Termination on CPPM)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Client config for EAP-PEAP (Auth Method, Server Certificate & Trusted Root CA)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking the steps of EAP-PEAP with termination on CPPM
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking controller logs for EAP-PEAP authentication
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking authentication logs at Access Tracker (CPPM)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Access Tracker showing Outer and Inner EAP tunnel methods
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
EAP-PEAP WITH TERMINATION ON CONTROLLER
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Only change from EAP-TLS (with termination on controller) in config for EAP-PEAP
Change in CPPM Service config (compared to EAP-TLS with termination on controller)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Auth-tracebuf from controller showing steps in EAP-PEAP authentication
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Checking security logs in controller for the authentication
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Logs at Access Tracker (CPPM)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Logs at Access Tracker (CPPM)
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
MISCELLANEOUS TROUBLESHOOTING TIPS
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Check the service that is being used in case failed authentication
In the below output for some reason its hitting wrong Service “test123”, while name of our service is “Company_ABCD-EAP-PEAP”
Check if right Authentication methods are configured
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
In the below output only “Mschap” was configured as the Authentication method, while actually “EAP-PEAP” was required.
Ensure right certificates are used at CPPM, Controller & Client
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved
Always ensure • The certificate path is correct and
right certificates are positioned in right devices.
• The root CA is trusted in the client device
• Validate the server certificate in client for mutual authentication & mention the exact CN of the Authentication server.
THANK YOU!!!
CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved