IPSEC-tunnell from FreeRadius to WLC Cisco

Saleh Abuzid Saleh.Abuzid at hist.no
Wed May 13 15:12:03 CEST 2009


Our university college (HiST) is trying to establish an IPSec tunnel between a FreeRadius server using Openswan OpenSwan 2.4.12 and a Cisco WLC running 4.2.173.00. 

 

To start the IPSec negotiation we need RSA-keys at both ends of the tunnel ( freeradius, WLC  Cisco), or Pre-shared keys (PSK).

 

Case 1:

 

On the Freeradius Server we two pairs of keys on the command line  as follows:

 

- Keypair for the FreeRadius-server:

Freradiushost# ipsec newhostkey --hostname "FreeRadius" -output  /etc/ipsec.secrets  -bits 1024.

 

- Keypair for the wlc:

Freradiushost# ipsec newhostkey -hostname "wlcname" -output "RSAKeyFileName" -bits 1024

However, the WLC doesn't accept the RSA keys generated.

 

The file produced looks like this:

 

: RSA   {

            # RSA 1024 bits "wlcname" etc.

            # for signatures only etc.

            #pubkey=xxxxxxx

            Modulus: xxxx

            PublicExponent: xxx

            #everything after this point is secret

            PrivateExponent: xxx

            Prime1: xxxx

            Prime2: xxxx

            Exponent1: xxxx

            Exponent2: xxxx

            Coefficient: xxxx

            }

 

We try to paste the wlc's keys into the web interface under the menu Security, Advanced, CA Certificate, IPSec Certs. 

 

But, to no avail, the page at "ip-number of wlc" says: Error in setting Certificate".

 

How should we generate the RSA keys in OpenSwan in order to get them into the Cisco WLC?

 

Case 2:

 

We have also tried to use Pre-shared keys. But alas, the Cisco WLC doesn't respond to the request from Freeradius Server.

How should these PSK's be formed and what settings should be used? Any configuration examples of IPSEC on the OpenSwan, or generic explanations would be welcome as well.

 

Shared Secret Format: ASCII

Shared Secret: <same as on OpenSwan>

Key Wrap: <not used>

Port Number: 1812

Server Status: Enabled

Support for RFC 3576 : Enabled

Server Timeout:  2 seconds

Network User:    Enable

Management:     Enable

IPSec                Enable

IPsec Parameters 

IPSec: HMAC SHA1

IPSEC Encryption: AES CBS

(Shared Secret will be used as the Preshared Key)

IKE Phase 1     Aggressive (tried main as well, with corresponding settings in OpenSwan)

Lifetime (seconds) 28800

IKE Diffie Hellman Group Group 2 (1024 bits)

 

Remarks:

 

I would like to mention two tings:

 

The path is open between FreeRadius server and WLC Cisco.

The FreeRadius server was tested with other Linux IPSec tunnels, and this worked flawlessly.

The setup of the FreeRadius is changed in each case to correspond with settings on the WLC.

 

Looking forward to getting help from you! 

 

P.S.: It seems that IPSEC tunnels vs. WLCs is not what's easy to get help with; we've contacted several major Norwegian consulting firms with little or no response.

 

 

Regards

 

Saleh Abuzid

Dept. engineer, Dept. of servers- and networks,

HiST - Sor-Trondelag University College (www.hist.no <http://www.hist.no/> )

 

 Phone: ++47 73559672

E-mail: Saleh.Abuzid at hist.no

 

 

Saleh Abuzid

 

Gunnerus gate 1

Høgskolen i Sør-Trøndlag (HiST)

 SPO-IKT

Avdelingsingeniør

 

tlf: 73559672

E-mail: Saleh.Abuzid at hist.no

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20090513/bceeb865/attachment.html>


More information about the Freeradius-Users mailing list