Hi,
We purchased several MSM430 APs and the MSM 720 controllers for the enterprise and need to configure 802.1x AD authentication.
I've read all other posts in the forum, but have got nowhere.
To summarize what has been done:
- A non AC VSC was created and set to use WPA/Dynamic key, and AD auth
- Access Control is off in the VSC
- We created an AD group "Wireless-Group", and put in the members
- We created a similar group "Wireless-Group" in the MSM interface, disabled AC on that group, and restricted it to the VSC
- The "Default non AC Active Directory" group is enabled, AC disabled, and restricted to the VSC
- After all this, we joined the domain
The logs and wireshark traces show that LDAP between the MSM and the DCs works, as the MSM enumerates all of the user's group memberships. In the logs:
Jan 3 13:39:54 debugradiusd D:rlm_ldap: performing user authorization for enry
--snip lots of ldap stuff as the MSM enumerates all of my groups--
Jan 3 13:39:54 debug radiusd D:rlm_ldap: user enry authorized to use remote access
--snip lots of postrgres stuff, then: --
Jan 3 13:39:54 debug radiusd D:rlm_sql (ldap_sql): User enry not found in radcheck
Jan 3 13:39:54 debug radiusd D:radius_xlat: ''
Jan 3 13:39:54 debug radiusd D:radius_xlat: 'SELECT * FROM radius.ldap_authorize_group_check(9, '0x00', 5)'
Jan 3 13:39:54 debug radiusd D:rlm_sql_postgresql: Status: PGRES_TUPLES_OK
Jan 3 13:39:54 debug radiusd D:rlm_sql_postgresql: affected rows =
Jan 3 13:39:54 debug radiusd D:radius_xlat: 'SELECT * FROM radius.ldap_group_reply(9, '0x00', 5, 'enry')'
Jan 3 13:39:54 debug radiusd D:rlm_sql_postgresql: Status: PGRES_TUPLES_OK
Jan 3 13:39:54 debug radiusd D:rlm_sql_postgresql: affected rows =
Jan 3 13:39:54 debug radiusd E:internal authorization attributes are missing.
Jan 3 13:39:54 debug radiusd D:Query: DELETE FROM radius.radrequest WHERE req_number = 9
Jan 3 13:39:54 debug radiusd D:rlm_sql_postgresql: Status: PGRES_COMMAND_OK
Jan 3 13:39:54 debug radiusd D:rlm_sql_postgresql: affected rows = 15
Jan 3 13:39:54 debug radiusd D:rlm_sql (ldap_sql): Released sql socket id: 4
Jan 3 13:39:54 debug radiusd D: modsingle[authorize]: returned from ldap_sql (rlm_sql) for request 9
Jan 3 13:39:54 debug radiusd D: modcall[authorize]: module "ldap_sql" returns ok for request 9
Jan 3 13:39:54 debug radiusd D:modcall: leaving group (returns ok) for request 9
Jan 3 13:39:54 debug radiusd D:modcall: leaving group authorize (returns updated) for request 9
Jan 3 13:39:54 debug radiusd D: rad_check_password: Found Auth-Type EAP
Jan 3 13:39:54 debug radiusd D:auth: type "EAP"
Jan 3 13:39:54 debug radiusd D: Processing the authenticate section of radiusd.conf
Jan 3 13:39:54 debug radiusd D:modcall: entering group authenticate for request 9
Jan 3 13:39:54 debug radiusd D: modsingle[authenticate]: calling eap (rlm_eap) for request 9
Jan 3 13:39:54 debug radiusd D: rlm_eap: Request found, released from the list
Jan 3 13:39:54 debug radiusd D: rlm_eap: EAP NAK
Jan 3 13:39:54 debug radiusd D: rlm_eap: EAP-NAK asked for EAP-Type/leap
Jan 3 13:39:54 debug radiusd D: rlm_eap: No such EAP type leap
Jan 3 13:39:54 debug radiusd D: rlm_eap: Failed in EAP select
Jan 3 13:39:54 debug radiusd D: modsingle[authenticate]: returned from eap (rlm_eap) for request 9
Jan 3 13:39:54 debug radiusd D: modcall[authenticate]: module "eap" returns invalid for request 9
Jan 3 13:39:54 debug radiusd D:modcall: leaving group authenticate (returns invalid) for request 9
Jan 3 13:39:54 debug radiusd D:auth: Failed to validate the user.
Jan 3 13:39:54 debug radiusd A:Login incorrect: [PACIFICA\\enry] (from client localhost port 74 cli 88-53-2E-9B-E1-55)
Jan 3 13:39:54 debug radiusd D:Finished request 9
Jan 3 13:39:54 debug radiusd D:Going to the next request
Jan 3 13:39:54 debug radiusd D:--- Walking the entire request list ---
Jan 3 13:39:54 debug radiusd D:Cleaning up request 0 ID 222 with timestamp 50e5d074
Jan 3 13:39:54 debug radiusd D:Waking up in 1 seconds...
Jan 3 13:39:54 debug iprulesmgr Received RADIUS Packet (Length:'86',Code:'Access-Reject',Id:'83', Calling-Station-id='88-53-2E-9B-E1-55') from RADIUS Server (Ip:'127.0.0.1',Port:'1645') for User (nas-port:'74',username:'PACIFICA\enry').
Jan 3 13:39:54 debug iprulesmgr Sending RADIUS Access Reject (id='152') to RADIUS Client (ip-address='169.254.0.4',port='33700').
Everything looks good up to the lines that speak of "No such EAP type leap", and then failure to authenticate.
It is essential that we get this working, AD authentication was a key selling point on this and if it doesn't work we will have to find alternatives.
Note that other VSCs that don't use AD authentication work fine.