Cisco Access Point 1130ag EAP with Windows XP Clients

I am trying to get a laptop to Authenitcate with my Raduis Server(192.168.10.10) over a Cisco Access Point 1130.  
The Access point is a radius client with IP address of 192.168.10.211
Radius server is 192.168.10.10
Remote Access Policy Windows-Groups Root\Domain Users; Root\Domain Computers
The computer and user attempting to access the domian are both members of those groups.
Radius EAP Methods are Protected (EAP)

Any advice why I cannot connect?

!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ap
!
enable secret 5 $1$HFDt$sfrkhunilT7quKN9neaQv1
!
aaa new-model
!
!
aaa group server radius rad_eap
 server 192.168.10.10 auth-port 1645 acct-port 1646
!
aaa group server radius rad_mac
!
aaa group server radius rad_acct
!
aaa group server radius rad_admin
 server 192.168.10.10 auth-port 1645 acct-port 1646
!
aaa group server tacacs+ tac_admin
!
aaa group server radius rad_pmip
!
aaa group server radius dummy
!
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authorization exec default local 
aaa accounting network acct_methods start-stop group rad_acct
!
aaa session-id common
!
!
dot11 vlan-name Blairsville vlan 3
!
dot11 ssid LSI
   vlan 3
   authentication open eap eap_methods 
   authentication network-eap eap_methods 
   guest-mode
   infrastructure-ssid optional
   information-element ssidl advertisement wps
!
dot11 network-map
power inline negotiation prestandard source
!
!
username Cisco password 7 047802150C2E
!
bridge irb
!
!
interface Dot11Radio0
 no ip address
 no ip route-cache
 !
 encryption vlan 3 mode ciphers tkip 
 !
 ssid LSI
 !
 channel 2422
 station-role root
!
interface Dot11Radio0.3
 encapsulation dot1Q 3 native
 no ip route-cache
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
 bridge-group 1 spanning-disabled
!
interface FastEthernet0
 no ip address
 no ip route-cache
 duplex auto
 speed auto
!
interface FastEthernet0.3
 encapsulation dot1Q 3 native
 no ip route-cache
 bridge-group 1
 no bridge-group 1 source-learning
 bridge-group 1 spanning-disabled
!
interface BVI1
 ip address dhcp client-id FastEthernet0
 no ip route-cache
!
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip radius source-interface BVI1 
radius-server attribute 32 include-in-access-req format %h
radius-server host 192.168.10.10 auth-port 1645 acct-port 1646 key 7 0120120D550C031D70
radius-server vsa send accounting
bridge 1 route ip
!
!
!
line con 0
line vty 0 4
!
end

Open in new window

TechSupportLearningAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

hanckeCommented:
More information about the laptop will help in troubleshooting - is this the only laptop having trouble? Are there others setup exactly like this one that aren't having trouble?

Also - do you have an AV on this laptop that could have a firewall turned on? Ensure UDP ports 1812 and 1813 are open, as RADIUS uses these ports for authentication and accounting messages.
0
TechSupportLearningAuthor Commented:
All laptops, no firewall. All upd ports are open as this is on an internal network.
0
mikecrCommented:
The access point uses radius, not the clients. First, do you have a certificate on the authentication server and client? This is required for PEAP. Do you have the Active Directory account dialin tab set to control access through remote access policy? If you are using Microsoft IAS, then you need to run the wizard and set up a wireless access policy if you haven't already. Make sure that the radius authentication is the same for both IAS and the access point.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Wireless Networking

From novice to tech pro — start learning today.