802.1x Setup 5508 WLC

Posted on 2012-12-27
1 Endorsement
Last Modified: 2013-01-23
Hey Experts,

I'm looking to get any additional tips to configuring 802.1x authentication over wireless on a Cisco 5508 and 1142 AP's. The config on the WLC is very straightforward: one WLAN that will use 802.1x to authenticate users. We have one ACS and AD server to handle the authentication process. I'm still verifying what type of authentication we will be doing, EAPOL, EAP-TLS, ETC

 Is the configuration on the WLC as simple as configuring the RADIUS server and enabling 802.1x for the SSID on the controller? Are there any cool testing methods in case authentication does not work? It seems pretty straight forward, but I'm looking for any gotchas that may arise that you have experienced. I'm not a wireless guy per say. If you need more info, I will gladly provide. Thanks again guys.
Question by:Leeeee
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3

Expert Comment

ID: 38724828
RADIUS out of Active Directory is pretty straight forward. If AD fails to authenticate a client, and the access points are setup for RADIUS authentication, then that client would simply not join the wireless network.
LVL 22

Accepted Solution

mcsween earned 500 total points
ID: 38724886
I just set this up in my environment.  You will need a Root CA and a NPS server.  I set my domain joined computers to only authenticate using only the computer certificate (smart card or other certificate in NPS).  You can setup your WiFi networks for the clients in Group Policy under Computer Config, Policies, Windows Settings, Security Settings,  Wireless Network Policies.

I set mine up to use TLS Authentication Only (Certificates) with the exception of a half dozen people that are allowed to use PEAP/EAP-MSCHAP v2.  This can be accomplished with multiple Network Policies on your NPS server.

Here are some links I used to set mine up.

This one gets you the jist of what you are doing but he doesn't use a LAG to connect the controller to the network which I strongly suggest you do.

Here is how Cisco wants you to do it, I used most of this and this talks about setting up the LAG.

This will help you get your Root CA setup (do not install this on a domain controller unless you absolutely have to)

Follow Other Cisco Lightweight Access Points (LAPs) about 1/2 way down to setup DHCP server to autoconfigure  your access points
LVL 22

Expert Comment

ID: 38724914
If you run into specific questions feel free to post in here and I'll help as best I can.  If this controller is going to support multiple subnets across WAN links you will also want to setup H-REAP (local switching) for the APs located outside the building where the WLC is.  If you are not familiar with the term CAPWAP read up on it and you will see why H-REAP is needed in remote offices.
NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.


Author Comment

ID: 38724964
@mcsween, Awesome thank you. We have LAG set up from the WLC to a stack of 3750's. Let me digest some of the material in the links. We will not be using H-REAP as nothing will be traversing the WAN, at least not currently. I'm more concerned about the Microsoft side of things (they're running a PKI environment with smart cards) then the 802.1x set up on the controller.

Thanks again, I'll report back.
LVL 22

Expert Comment

ID: 38725647
The 802.1x setup on the controller is a piece of cake; just enter the radius server and secret on the WLC and that's it.  Configuring your NPS server can be a bit tricky if you aren't familiar with it.  

I'm not using smart cards in my environment but as I understand them, they work the exact same way as certificates.  You will still want to enable certificate auto-enrollment for your wireless computers (AD Computer objects) so they can authenticate to the wireless before the user logs on.  Once the user logs in the authentication switches over to the user or smart card.

Author Comment

ID: 38731592
@mods, please keep this open...implementing next week..thanks

Author Comment

ID: 38810647
Straight forward, thanks mcsween.

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question