Setting Up EAP-TLS WPA2-Enterprise with Cisco Wireless LAN Controller

Many are switching over to certificate-based 802.1x authentication because certificates can improve user experience and are better equipped to handle over-the-air credential theft. Certificates also eliminate password-related disconnects due to password change policies. Visits to IT for password troubles will be a thing of the past because certificates only need to be configured once and they are set on that device forever.

Switching over to a certificates with a Cisco Wireless Lan Controller (WLC) is incredibly easy with SecureW2’s cloud-based solution. SecureW2’s certificate-based authentication can support your current infrastructure or provide you with APs, RADIUS servers, and Identity Providers, etc. This page provides a step-by-step guide on how to set up WPA2-Enterprise with Cisco WLC.

Tech Overview

  1. Configure SecureW2 PKI Services
    • Setting up a PKI is no simple task, which is why SecureW2 does it for you. Our Getting Started Wizard allows you to create everything required for EAP-TLS configuration and management (Certificate Authorities, CRL, Management Software, etc.).
  2. Integrate with your Identity Provider
    • Authenticating users is much easier since SecureW2 integrates with every major LDAP and SAML IDP. Here are just a few of our integration guides
      • Active Directory / LDAP
      • Google Apps
      • Active Directory Federation Services
      • Okta
  1. Enroll Users for Certificates
    • Set up Onboarding SSID for BYOD Self-Service Certificate Enrollment
      • SecureW2’s best-in-class onboarding software, the JoinNow Suite, allows end users to enroll certificates and configure their devices from anywhere. Users can also be directed to the JoinNow Suite by configuring an Open SSID.
    • Using Gateway APIs to Auto-Enroll Managed Devices for Certificates
      • Instead of manually enrolling every managed device for a certificate, our Managed Device Gateway APIs can automatically enroll all your managed devices, through any major MDM software, for machine and/or user certificates.
  2. Configuring the RADIUS (AAA) Server
    • Integrating SecureW2 PKI Services with a RADIUS Server
      • Our PKI services integrate cleanly with all major RADIUS servers. We can work with your existing infrastructure to make implementation totally painless. No RADIUS infrastructure? No problem, SecureW2 comes built in with our Cloud RADIUS. Click here to read more about our RADIUS Solutions.
    • Integrating Cisco WLC with a RADIUS Server
      • Once you’ve figured out your RADIUS set up, the SecureW2 JoinNow Suite can configure your RADIUS server to integrate seamlessly with Cisco WLC. Below is a step-by-step guide.
    • To complete this setup, you will need the following:
      • A SecureW2 Network Profile configured for EAP-TLS
      • An Identity Provider
      • A Cisco WLC setup with Access Points

 

Onboarding Users for WPA2-Enterprise

An onboarding SSID is an open SSID users connect to initially to configure their devices for wireless access. The onboarding SSID redirects the user to the SecureW2 landing page where they can enroll for a certificate. From here, the OS of the user’s device is detected and a client is deployed that is specific to that device’s OS. The client then configures the device by installing the Wi-Fi certificate, RADIUS server certificate for server certificate validation, and appropriate network settings required to authenticate via EAP-TLS.

  1. Login to the Cisco Dashboard
  2. In the WLAN tab, click Go next to the Create New dropdown menu
  3. Enter a Profile Name and SSID, and then click Apply
  4. Click the Security tab, and in the Layer 2 Security dropdown menu, select None
  5. Click the Layer 3 tab, and in the Layer 3 Security dropdown menu, select Web Policy

Configuring the Onboarding SSID

Here you would select your Walled Garden configuration or Access Control List (ACL) from the IPv4 dropdown menu. We are going to go through a quick setup for those who do not have one configured before starting this guide.

  1. Click the Security tab on the top menu, and click Access Control Lists
  2. Click New, enter a name in the Access Control List Name text box, and click Apply
  3. In the list that appears, click the ACL you just created and click Add New Rule
    • Here you will see the information that can be populated into a new rule

Configuring Access Control List settings

  1. Navigate to the SecureW2 Management Portal, click Documentation, and click SecureW2 JoinNow Deployment Guide
  2. Scroll to the section in the guide called Chapter 2: Firewall Rules
  3. Here you will find an array of resources you need to allow through the Open SSID
    • For more details, check out our Onboarding SSID video in the Management Portal
  4. For testing purposes, the following are the IP Addresses that need to be allowed:

The required IP addresses to allow on the Open SSID

  1. Copy the first IP Address on the list and navigate to the Cisco dashboard
  2. In the new rules list for the ACL, type 1 in the Sequence textbox
  3. Select IP Address in the dropdown box for Source and paste the IP Address we copied from the guide into the IP Address textbox
  4. In the Netmask textbox, enter 255.255.255
  5. In the Action dropdown box, select Permit and click Apply
  6. Resuming our WLAN configuration, select the ACL List we created from the IPv4 dropdown box
  7. Click the checkbox next to Over-ride Global Config to enable it
  8. In the Web Auth Type dropdown box, select External (Re-direct to external server)
  9. Navigate to the SecureW2 Management Portal, click Network Profiles, and click View for the network profile you’ve configured for this guide
  10. Copy the URL of the landing page that opens and paste it in the URL textbox in the ACL List Configuration
  11. Click Apply
  12. In the General tab, check the box next to Status labelled Enable, and click Apply

Configuring the settings of the Open SSID

 

 

Integrating the SecureW2 Cloud RADIUS

First, we need to add the SecureW2 Cloud RADIUS Server into Cisco, so starting in the SecureW2 Management Portal:

  1. Under the heading AAA Management, click AAA Configuration
  2. Navigate to the Cisco dashboard and click Security
  3. Click Authentication beneath the heading RADIUS, and click New
  4. The following is the information from SecureW2 that you will enter in the Cisco RADIUS
    • Shared Secret
    • Primary IP Address (enter in the textbox called Server IP Address in Cisco)
    • Port
  5. After you have entered this information, click Apply

Information needed from SecureW2 to configure the RADIUS Server

 

Configuring a SSID for EAP-TLS Authentication

Now that we’ve configured the onboarding SSID that will enroll users for a certificate, we need to setup the secure SSID. This SSID needs to be configured for EAP-TLS WPA2-Enterprise Authentication. It also needs to be integrated with a RADIUS server (in this case the SecureW2 RADIUS) that will authenticate the users’ certificates and authorize them for network access.

  1. Click Network Profiles under the heading Device Onboarding
  2. Click Edit that applies to the network profile you created for this WPA2-Enterprise Authentication and copy the name of the network
  3. Navigate to the Cisco dashboard and click the WLANs tab
  4. Next to the dialog box called Create New, click Go
  5. Paste the name of the network into the Profile Name and SSID textboxes, and click Apply
  6. Click the Security tab and click AAA Servers
  7. In the Server 1 dialog box, select the server we created earlier, and click Apply

Configuring the Secure SSID to communicate with the SecureW2 RADIUS server

  1. Under the General Tab, click the check box for Enabled and click Apply

 

Concluding Thoughts

With the final click of Apply, you have set up an Onboarding and Secure SSID on your Cisco WLC, allowing you to begin enrolling for certificates. Please don’t hesitate to reach out to us if you have any questions. If you’d like to know how much you can impact your Security ROI, check out our pricing page.

Cisco is either registered trademarks or trademarks of Cisco Systems in the United States and/or other countries. Other trademarks, logos and service marks used in this site are the property of SecureW2 or other third parties.