Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Setting Up 802.1x with Cloud RADIUS and Nile

Introduction

The following guide covers how to set up SecureW2's Cloud RADIUS with Nile Infrastructure to enable passwordless 802.1X. This document will also cover Network Segmentation, and Troubleshooting. If you'd like to learn more about the solution, you can read our solution brief here.

The following are the high-level steps to set up the Nile Infrastructure with SecureW2:

  1. Setting Up the SecureW2 JoinNow Management Portal.
  2. Running the Getting Started Wizard, setting up our Identity Provider, and getting RADIUS details.
  3. Set up Cloud RADIUS in the Nile Portal. (Authentication Settings):
    • Setting up the RADIUS to be used by the SSID involves putting in the IP address of the RADIUS server, ports, and shared secret in your Nile Access Points
  4.  set up the Secure Wireless SSID (Wireless Settings):
    • Set up an SSID for WPA2-Enterprise, and set up any segments for the desired site.
  5. Use SecureW2 JoinNow MultiOS to connect to the Network.
    • Enrolling for a certificate, connecting to the network.
  6. Troubleshooting
    • Looking at RADIUS and Enrollment/Configuration Events in SecureW2.

Prerequisites

  • Active Subscription to JoinNow Cloud Connector Bundle.
  • Active Subscription to Nile Access Point.

Setting up the JoinNow Management Portal

Please Log-in to the JoinNow Management Portal and run the Getting Started Wizard.

  1. Navigate to Device Onboarding > Getting Started and set up settings as shown below:
  2. Click Create.
  3. The process will take 60-90 seconds to complete. Afterward, a Network Profile and a RADIUS Server will be generated.

Setting Up an Identity Provider:

Next, we will need to create some credentials to use to enroll for a certificate. We will use the Identity Provider that comes with SecureW2 for testing purposes, but you can use any SAML Identity Provider like Azure, and Okta for certificate enrollment.

  1. This can be done in Identity Management > Identity Providers.
  2. Click Edit on the DEFAULT IDENTITY PROVIDER.
  3. Click Users.
  4. Click Add a User.
  5. Enter in details as show below. The username and password will be used to enroll for the certificate that will be used for authentication.
  6. Click Save.

Setting up Cloud RADIUS

  1. Navigate to RADIUS > RADIUS Configuration.
    1. Here you will see the RADIUS Servers available to use.
  2. Save the details of the server that is best for your geo-location so we can enter it in Nile in the next sections.

NOTE: If you don't see a Server for your region like the image below, contact us to inquire about our Global RADIUS Servers.

Nile Authentication Settings

  1. Log-in into the Nile Portal.
  2. Navigate to Settings > Authentication
  3. Click Add Authentication.
  4. Name: RADIUS Server Name
    1. Host1:
    2. Host2:
  5. Once you have set up this, please select the Geo scope of your Cloud RADIUS server.
  6. Click Save.

Nile Wireless Settings

  1. Login to the Nile Portal and click on the Settings tab from the left-side Navigation Panel.
  2. Under the Wireless tab, select Type as Enterprise.
  3. For Name: Please name the SSID name you would like to create.
  4. For Security: Please select the WPA2 Enterprise or WPA3 Enterprise option from the list.
  5. Segments: If you had set up RADIUS Authentication for a particular segment, that segment will be displayed under the drop-down menu. Please select the appropriate segment.
  6. Navigate to the Service area. Under Subnet, click the arrow on the right-hand side and select the IP Subnet range from the dropdown.
  7. Log-in to the SecureW2 Management Portal.
  8. Navigate to Policy Management > Network Policies and create a new Network Policy.
  9. Navigate to Settings and Click Add Attribute. Set the Attribute as Nile-NetSeg and list Segment desired under Value.
    1. Attribute: Nile-NetSeg
    2. Value: Engineering
  10. Your wireless SSID is set up now.

Connecting to the Network

After completing the set-up, run JoinNow MultiOS on a test device. The dissolvable client will enroll for a certificate and install a Network Profile which will use the certificate for 802.1X authentication.

Note: Corporate-managed devices can use APIs to automate the issuance and management of certificates. To learn more, read the guides listed in the Navigation on the left under MDM / EMM Integrations.

To start the process:

  1. Navigate to Device Onboarding > Network Profiles.
  2. Click View on the required Network Profile.
  3. Click JoinNow and the <MultiOS dissolvable client will download.

    Note: MultiOS has different user experiences for the varying operating systems. E.g. Android users get an App, iOS get a .mobileconfig file.
  4. Run the client. When you click Next, you will be redirected to a Web SSO where you will enter in the credentials, we created in step 3: setting up the JoinNow Management Portal.
  5. The device will enroll for a certificate and connect to the network.

Troubleshooting

You can view RADIUS events logs in the SecureW2 Management Portal by navigating to Data and Monitoring > RADIUS Events.

You can view device configuration or enrollment issues by viewing General Events, which is also in Data and Monitoring.

For more details on the error codes found in our logs, or if you have any questions at all, please contact us today and we’d be happy to help!