Authentication failure - PEAP - MS-CHAPv2

Matthieu Lazaro matthieu.lazaro at eservglobal.com
Thu Jun 11 09:50:56 CEST 2009


kissg a écrit :
>
>  
> It really is an AP issue. Using another AP (SMC WEBT-G) with the same
> Radius config works... Both Windows XP and Ubuntu connects
> successfully, no matter if I set certificate validation on or off...
> Anyway, there are two EAP setting which is supported by the Cisco AP:
> Open mode with EAP, and something called "Network mode". I'm going to
> try setting the latter one, maybe it helps. If not, a firmware update
> will be needed (I think).
>  
> Thanks for all your comments!
>  
> Regards
> Gergely Kiss
>
>
Hello,

I know how to configure those Cisco AP 1131 AG and it's working for me.
As it is too long and heavy to put some screen shots of the web
interface, here are parts of the configuration you should have.

Here are parts of the configuration you should have:

aaa new-model
!
!
aaa group server radius rad_eap
 server <IP@ of freeradius> auth-port 1812 acct-port 1813
!
aaa group server radius rad_mac
!
aaa group server radius rad_acct
 server <IP@ of freeradius> auth-port 1812 acct-port 1813
!
aaa group server radius rad_admin
 server <IP@ of freeradius> auth-port 1812 acct-port 1813
!
aaa group server radius rad_eap1
 server <IP@ of freeradius> auth-port 1812 acct-port 1813
!
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authentication login eap_methods1 group rad_eap1
aaa authorization exec default local
aaa accounting network acct_methods start-stop group rad_acct
!
aaa session-id common
.......................
dot11 ssid <ssID Name>
   authentication open eap eap_methods1
   authentication key-management wpa version 2
   guest-mode
   information-element ssidl wps
!
dot11 holdoff-time 60
dot11 aaa csid ietf
dot11 aaa dot1x compliance draft10
dot11 network-map
power inline negotiation prestandard source
eap profile < Profile Name>
 method mschapv2
!
..............................
radius-server local
  nas <ip @ of radius server> key secret
!
radius-server attribute 32 include-in-access-req format %h
radius-server host <IP@> auth-port 1812 acct-port 1813 key secret
radius-server vsa send accounting
bridge 1 route ip
!
................................

I hope it helps a little.

Best Regards,

Matt



More information about the Freeradius-Users mailing list