cancel
Showing results for 
Search instead for 
Did you mean: 

Setup 802.1x on WiFi network using Ruckus Cloud

david_levine
New Contributor III

Hi all,

I am trying to get 802.1x working on our ICX switches and on our WiFi. 

All switches and APs / WiFi networks are managed in Ruckus Cloud.

I have configured a test wireless network for Enterprise AAA (802.1x), and have a RADIUS server setup (Windows 2019 with the NPS role). 

When I try to connect to the WiFi network, I get prompted for my username and password, but I don't get past that, and cannot connect.

I am completely new to this; Is there any testing tool or tips that might help? 

I have added all our APs as RADIUS clients in the NPS server, and have double checked the shared secret.

I have created a basic Network Policy in the NPS server; grant access to domain users, Microsoft PEAP w/ MS-CHAP-v2. Nothing special... just trying to get username/password auth to connect to the WiFi.

When trying to connect from a laptop, I get prompted for username and password, but cannot successfully auth. Pretty much same behavior if trying from a domain joined laptop or a non domain joined laptop.

Any tips are much appreciated!

1 ACCEPTED SOLUTION

david_levine
New Contributor III

So, a little embarrassing, but it looks like stuff started working once I set the local Windows firewall on the NPS server to allow all incoming connections. 

This is strange because - when installing / configuring the NPS role - the corresponding allow rules were automatically created (I had double checked that a few times while working through this process). So, maybe there is some port requirement other than UDP 1812, 1645, 1813, 1646... and TCP 135 and RPC Dynamic Ports...

Image_ images_messages_60954a4e131c1e0a9578d940_0899f232ad20d20bcc98a9aba8e70fe8_NPSfirewallrules-f23f1493-5d4b-4a05-9512-f5881d02457f-1987452671.png

Anyone run into this before?

Thanks!

View solution in original post

14 REPLIES 14

David, for the NPS side, a log analyser would help show you if the requests are even hitting the Radius server and if so, why they are failing. Im working through a similar issue monitoring the NPS logs using https://www.deepsoftware.com/iasviewer/ (its free and has a portable app which doesn't require installation).

Thanks - I'll check that tool out!

syamantakomer
Community Admin
Community Admin

Hi Devid,

Please check and make sure auth method (EAP - PEAP) has a certificate mapped to it, else auth will not work.

Image_ images_messages_6093e95f758f933b8d563564_f45113afe0a5c774c7dcf67567adc461_cap2-efc6a7bf-5850-4b0e-8a00-d96003c55ae7-112802341.png

If still facing issue, check event viewer >> Customer Views >> Server Roles >> Network Policy And Access Service >> Review the most recent authentication attempt. It will give you more info like if request is even reaching the server and hitting the correct policy, and what is the reason for auth failure, etc.

Image_ images_messages_6093e95f758f933b8d563564_52c5db891cd199f34e84b856f4ed8e34_cao1-cb2da4ed-7174-4d0c-bcbe-15c951dcc126-142386789.PNG

To see the complete picture, we need to review and collect information from below points.

  1. Radius policy should be configured correctly with a certificate in auth method.
  2. Radius server profile on Cloud should be configured correctly.
  3. Make sure shared secrete is same on both sides, on Cloud and on Radius server.
  4. Make sure AP IPs are added to radius client list on Radius Server.

For troubelshooting:

  1. Setup packet capture on the AP where test client is connecting.
    - Select AP on cloud GUI >> Click on More Action >> Test Connection >> Packet Capture >> Set "Capture Interface" to "Wired" and start capture when client is ready to connect.
  2. Setup and run wireshark on NPS server, and set the filter for AP IP address to filter the traffic coming from radius server.
  3. Now connect the client and try 2-3 times so that you have more captures for review.
  4. Post 2-3 failure, stop captures on AP and on radius server side.
  5. Save captures from AP, radius server and review all to see the connection flow.
    - AP capture
    - Server capture
    - Server event logs.

Parallelly, if Cloud Analytics is working, it can also show you complete client connection flow and can pin point the failure.

If still facing issue, open a case with support for further help.


Syamantak Omer
Sr.Staff TSE | CWNA | CCNA | RCWA | RASZA | RICXI
RUCKUS Networks, CommScope!
Follow me on LinkedIn

Thanks for the detailed reply;

Regarding the first part - yes - there is a certificate mapped for PEAP

Image_ images_messages_6093fe85758f933b8d56363c_bb6e7888440e2c6ef7ba962c73dfc46c_npsconfig-da719bed-881a-4faa-b2b6-d07100c4763c-297787602.png

When looking at the NPS Event Log, I only see some logs from when I was initially trying to add the APs (had initially deployed windows server standard, and was trying to add APs using cidr... had to upgrade edition to Datacenter to do that :))

I don't see any authentication attempts in the NPS event log at all.

As for making sure the RADIUS server is configured correctly in the Cloud, there is nothing else aside from defining it in the WiFi network setup, correct?

Image_ images_messages_6093fe85758f933b8d56363c_04b397621ff65ca6cdafa6f525a90109_WiFitest802.1x-edef2811-ec15-4dea-9cf5-8d46a139b8e5-760113917.png

Shared secret is the same, and all AP IP addresses have been added. Again, added using cidr, but maybe I will try adding individually see if that makes a difference.

I was looking around in Analytics, but I don't see any reference to the failed connection / auth attempts from my laptop and another test laptop I have. So, not sure if I am not looking where I should be.

I will look at doing a packet trace also.

Thanks,

If you are not seeing any logs in event viewer, check the connectivity between AP to radius server.

For server config on Cloud, it is only available under WLAN settings.

On Analytics, you will see a search box on top, just put the failing client MAC address and search for it.


Syamantak Omer
Sr.Staff TSE | CWNA | CCNA | RCWA | RASZA | RICXI
RUCKUS Networks, CommScope!
Follow me on LinkedIn