Configure EAP-TLS using ISE and Meraki AP

Configure EAP-TLS using ISE and Meraki AP

  • #wireless
  • #security
- Last updated on

This post describes how to set up a Meraki WLAN with 802.1x using EAP-TLS as an Authentication Method.

If you want to get some background about the flow process of EAP-TLS, please take a look at my previous post, along with RFC 5216 page.

Components Used

  • Windows 10 Workstation (Wireless Supplicant)
  • Meraki MR52 (Authenticator)
  • Cisco ISE (Authentication Server)
  • Windows Server 2016 (Certificate Authority)
  • Some L2/L3 Network devices help with end-to-end communication.

Topology Implemented

topology implemented

You can use other alternatives or combinations of the components above mentioned, but for this demo, I will play around with the above topology, we expected to have complete reachability between the Authenticator, Authentication Server, and Certificate Authority Server to get the wireless authentication using EAP-TLS.

Configure

I will mainly focus on the Authenticator, and the Authentication Server side, however, I’m going to scope some supplicant and CA configurations as well.

Let’s start with the Authenticator = Meraki Side

  1. The first step is to configure an SSID in the Meraki Dashboard, in the desired Meraki Network go to:

as shown in the image.

starting the eap configuration

After saving, click on edit settings.

  1. Under Access Control (select the SSID)
  • Association requirements: Enterprise with my RADIUS server as shown in the image.

continue with the eap configuration

  • Splash page None (direct access)
  • RADIUS servers (Here, you need to enter the IP address and the shared secret that is used to validate the MR52 on the ISE side.
  • Optionally, you can enable RADIUS CoA, and you can set the RADIUS Accounting (I’m just leaving the default values) as shown in the image.

configuring ise

  • The client IP assignment (It’s up to you, you can use Bridge mode with or without VLAN tagging, or simply use NAT mode for simplicity as shown in the image.

configuring the Meraki dashboard

  • I’m leaving the rest of the options per Meraki default as shown in the image.

Meraki default options

  1. It is a good idea to verify that you can reach the RADIUS server from the MR52 before you continue, go to

Now, the Authenticator side is done!

RADIUS server (ISE configuration)

Radius with ISE configuration

  1. Go to: 

And click Add.

  • On this Allowed Protocol list, you can enter the name for the list. In this case, Allow EAP-TLS box is checked and other boxes are unchecked as shown in the image.

configuring ISE protocols

  1. Go to:

as shown in the image.

configuring resources

  1. Create New User on ISE. Go to:

as shown in the image.

configuring identities

configuring identities v2

  1. Create Policy set. Go to:

and then click on the plus (+) icon in the upper-left corner as shown in the image.

configuring policy set ISE

  1. Set the policy name (it could be something generic)

Under the conditions menu, select “Network Access Protocol > EQUALS RADIUS”, and lastly, select the name of the policy result set in step 1 as shown in the image.

configuring policy set ISE v2

  1. Create an Authentication Policy.

Go to the > icon on the body’s right side as shown in the image.

configuring policy set authentication

  1. Go to Authentication Policy > click on the plus (+) icon, and set “the conditions & use” as shown in the image.

configuring policy set authentication v2

  1. Go to Authorization Policy > click on the plus (+) icon, and set “the conditions & results profiles” as shown in the image.

configuring policy set authorization

  1. Verify

configuring policy set authorization v2

  1. Certificate on ISE. Go to:

as shown in the image:

ISE generate certificate

As shown in the image.

ISE generate certificate v2

The result:

ISE generate certificate v3

As shown in the image.

ISE generate certificate v4

  1. From here is necessary to go into the Windows Server (Certificate Authority) > open a web browser and Request a Certificate to complete the ISE configurations as shown in the image.

ISE generate certificate v5

  1. Click Advanced certificate request as shown in the image.

ISE generate certificate v6

  1. Click Submit a certificate request by using a base-64….  as shown in the image.

ISE generate certificate v7

  1. Paste the CSR generated on step 12 in the Base-64 encoded certificate request. From the Certificate Template: drop-down option, choose Web Server and click Submit as shown in the image.

ISE generate certificate v8

  1. Once you click Submit, you get the option to select the type of certificate, select Base-64 encoded, and click Download certificate chain as shown in the image.

ISE generate certificate v9

  1. Going back to the ISE server

Extract the certificates, the main file will contain two certificates, one root certificate, and another intermediate. The root certificate can be imported under

As shown in the images.

ISE import signed certs

Once you click Submit, the certificate is added to the trusted certificate list.

  1. Go to

and add the intermediate certificate as shown in the image.

ISE bind certificate

  1. To view the certificate, navigate to 

as shown in the image.

ISE viewing certs

Windows Workstation (Supplicant)

To authenticate a wireless user through EAP-TLS, you have to generate a client certificate.

  1. Go to the CA and create a user using the same credentials used in the RADIUS server (ISE configuration) step 3.

CA user creation

For this lab, I’m creating a matching user on both sides (ISE & CA) you can integrate an AD or LDAP to your ISE server and reference it under the policy set authentication as well.

  1. Connect your Windows computer to the network so that you can access the server. Open a web browser and enter this: https://severIPaddress/certsrv

The credential belongs to the recent user created on the CA & ISE.

login on CA

  1. Click Request a certificate as previously done, however this time you need to select User as the Certificate Template as shown in the image.

CA request certificate

  1. Click User Certificate as shown in the image.

login on CA

  1. Go to:

as shown in the image.

  1. Click Install this certificate to install the certificate in the local machine.

install the certificate on user's windows computer

  1. Go to:

Select Manually connect to a wireless network > Next** as shown in the image.

install the certificate on user's windows computer v2

  1. Network name (This name must match with the SSID in The Authenticator = Meraki Side Step 1) > Security type: Select WPA2-Enterprise > Next.

wireless profile creation on windows

  1. Click Change connection settings.

wireless profile creation on windows v2

  1. Select Microsoft: Smart Card or other certificate and click Settings.

wireless profile creation on windows v2

  1. Select Trusted Root Certification Authorities (this is the certificate issued from the CA server) > Click OK as shown in the image

Trusting root certs in windows

  1. Click Advanced Settings and select User or computer authentication from the 802.1x settings tab > Click OK as shown in the image.

Trusting root certs in windows v2

  1. Go to Wireless network, select the correct profile (ISE_TLS in this example) and Connect as shown in the image.

connecting to EAP-TLS SSID

Verify

After the successful authentication to the WLAN, go to the ISE server dashboard > Operations > RADIUS > Live Logs as shown in the image.

verifying connection

An example of what a successful EAP-TLS log looks like:

successful connection output

I will post some troubleshooting steps in a different post!

Thanks for reading!

Copyright © 2024 Darwin Castro