Solved

Problems with EAP-TLS set up

Posted on 2007-11-21
4
1,197 Views
Last Modified: 2008-08-26
Hi all

I am currently trying to set up a WLAN using EAP-TLS for authentication. I am using Cisco ACS 4.1 authenticationg users with AD.

At the moment I seem to have no problem with Domain users, they log on through the wired network, obtain a certificate and from then on will authenticate and join the WLAN set up.

However when ever a Domain admin tries this it fails. I get the following message in the ACS failure log; "External user not found".

Any help would be greatfully recieved.

PLease feel free to ask questioned as i know this is a little vauge.
0
Comment
Question by:147755
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 5

Expert Comment

by:amac81
ID: 20329085
Are the domain admins in a different container than the regular users in AD?  (usually the case) If so, you'll need to confirm that the authentication is checking not just the users container but the administrators container as well.
0
 
LVL 5

Accepted Solution

by:
amac81 earned 500 total points
ID: 20329110
Of course, if you have a container which contains the users which are authorized then, that will make it a whole lot easier.
0

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question