[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 479
  • Last Modified:

Wireless Networking: Roaming between RADIUS secured base stations

Hello wireless experts,

I have been tasked with extending the range of our RADIUS secured internal WLAN network.
I use Intellinet 300N access points, capable of four SSIDs combined with radius.

Simplified we have this setup:
Internal LAN, vlan1
Guest LAN, vlan100
DMZ, vlan101

Radius Backend: Windows Server 2008r2 with NPS role, Users from Active Directory.

Right now, I am using several 300N with the same SSID to span the DMZ (WPA2-PSK) and GUEST (WPA2-PSK) networks. Only one AP is used also for the INTERNAL Lan (WPA2-Enterprise), altogether hosting three SSIDs.

First of all, this setup is working and roaming between WPA2-PSK works as expected.

My thought was to put the third (RADIUS) SSID on the other AP's as well. I used a device and passphrase template in NPS for the devices and tested them all individually (working well).

The problem: Roaming is not stable. The client stays connected as long as the login AP stays in reach. Then it roams over and has no connection; roaming back to the original AP.
This continues until the connection is lost completely.

Also, it happens that some clients identify the wrong AUTH type for the network, say you want to connect to GUEST and are prompted to enter user / password combination (logs confirm the client sees a WPA2 Enterprise).

I hope it is just a misconfiguration or wrong assumption on my part. Or the AP's crap (working well without RADIUS)?

Thanks for the insight!
Helge
0
Daniel Helgenberger
Asked:
Daniel Helgenberger
1 Solution
 
Craig BeckCommented:
It sounds like misconfiguration to be perfectly honest (if I understand the OP correctly).  The fact that the other SSIDs are working says the APs and RADIUS are fundamentally ok.
0
 
bill30Commented:
There is a possible issue with roaming and authenticating before a timeout.  Radius authentication has more hoops to jump through than WPA-PSK authentiation.  At the bottom of the following article, it shows authentication rates based off of reduced connectivity conditions.  With Cisco you could do a debug showing you where you are running into trouble.  Looking at the manual didnt show much for Radius Authentication troubleshooting.

http://www.codealias.info/technotes/performance_of_eap_and_radius_authentication_in_roaming_scenarios

Also check to see if you are on the latest firmware on the AP's as that may help you with the roaming, but it looks like the last firmware update was 2011 on v1.05.  There is a possibility that these AP's will not handle roaming and Radius server authentication.
0

Featured Post

Veeam and MySQL: How to Perform Backup & Recovery

MySQL and the MariaDB variant are among the most used databases in Linux environments, and many critical applications support their data on them. Watch this recorded webinar to find out how Veeam Backup & Replication allows you to get consistent backups of MySQL databases.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now