1752555 Members
4968 Online
108788 Solutions
New Discussion

Re: iMC UAM MS AD authentication issue

 
denclan
Visitor

Re: iMC UAM MS AD authentication issue

Hi,

 

I'm seeing the same issue at the moment on IMC v7.0 . Did you get it resolved?

 

I'm getting client authentication failures with code "E63053::Invalid authentication type" via the IMC interface.

 

Regards,

denclan

nappy513
Visitor

Re: iMC UAM MS AD authentication issue

I made some progress, but the issue certainly isn't completely resolved.  UAM is defiantely one of the more difficult/complicated NAC systems I've deployed.  I'll break this into two parts:

 

First, at one point, with RADIUS, I did get the error you are describing.  I belive I hadn't imported a RADIUS certificate for UAM yet and that was causing it.  Once I generated a cert (had to add a Windows CA for this :( ), I think that was resolved.

 

Using PEAP/MS-Chapv2 against UAM as a RADIUS server: In one deployment, I found that I was sending the Called-Station-ID context in the wrong format.  I was using the SSID group as an access condition to assign access scenarios in the access service assigned to domain users.  Well, the SSID wasn't read correctly, and this triggered the "E63121::receive no packet from mschapv2server" error (certainly not very imitative of the issue...).  Peter Debruyne's blog (http://abouthpnetworking.com/2014/01/10/msm-with-uam-mac-authentication/) put me on the right track here.  I do get the same issue regarless of how the access devices are configured--HP(ProCurve) or HP(MSM).  So once I changed the Called-Station-ID format in the VSC, it works, but it never works the first time.  When no users have authenticated in about ~an hour, I always get the "E63121::receive no packet from mschapv2server" error on the first authentication attempt (the error log shows a blank next to the SSID field).  After that one error, the next manual attempt will always work.  Still working with HP support on this, but it's unusable for users.  I've set up a NPS server using NAS-ID as a condition for RADIUS in the meantime.  I suspect IMC work work fine if I removed the SSID as a condition, but it's pretty much required for the deployment.

 

On the guest/byod mac auth SSID: I have the same issue right now on two deployments.  It was kinda working on 7.0 E203, but due to the guest self-registration bug mentioned in the patch notes (if they didn’t use self-service, users were getting something like a 'network problem' error on registration request), I since upgraded up to E203P04 then to E203H06 (had to request the newest versions from HP support--only E203P03 is posted to the web), and now I'm getting "E63053::Invalid authentication type" when a user is forwarded to the BYOD portal.  When a user connects, I see the byodanonymous login with the correct mac address as the login name and the correct OS fingerprint, but that user gets the wrong portal page (they get the default HP-branded portal), with "The user is not online" under "User Information".  No idea why the system isn't correctly associating the login.  My setups are all fairly simple, with no L3 hops between the users, the authentication devices (MSM 460s) and the portal forwarding device (H3C switch or a VSR).

 

I'm relatively frustrated at this point, but let me know if this describes what you are facing.  I'll continue to post updates, but I'm working on a few dozen projects at once, so they may be infrequent.  Eventually, I'd like to get EAP-TLS functioning in IMC without iNode... but not for a while.

 

Gary

NeilR
Esteemed Contributor

Re: iMC UAM MS AD authentication issue

Having the same problem. I'm coming from the Procurve Manager IDM solution which I have working fine - using NPS and AD groups. 802.1x for users & workstations, smart devices (wired and wireless), MAC for voip. 

 

Trying to do the same thing with UAM - docs certainly imply that this should work. But I get the same thing. Wireshark shows IMC radius responding with MD5, not PEAP/MSchap.

 

Got the workstation certificate mode to work. But spolied by PCM - I can see by username where they are logged in with what mac and IP. Response to state change is near instantaneous.

 

Also I use user and workstation authentication, as workstations are in domain...but the IMC LDAP sync brings ws samaccoutname over with a trailing $ - not sure how to remove that.

 

IMC is way harder and much more expensive. Not so happy at the moment.

 

I also have a ticket in w HP - but still trying to sync up for the troubleshooting

 

Neil

 

 

UPDATE: Peter_Dubryn has the answer - even though we at 2008, when I changed the domain level setting for UAM back to 2003 I was able to log in my 802.1x user. Some succes finally. Thx!

 

However - when the user logs in, the autehtnication does not take place - only after I up/down the port. I think this occurs because I'm also trying to authenticate the machine and this currently fails as I haven't syncd the host, so IMC downs the port

Robär
Occasional Visitor

Re: iMC UAM MS AD authentication issue

Hi,

 

i have a similar problem concerning MSCHAPv2.  I have synchronized AD accounts (LDAP user in IMC) and have one local test user in IMC. I have configured root and server certificate and can authenticate my test user. 

 

If i try an LDAP user i got the error message E63121::receive no packet from mschapv2server

 

My AD is implemented on an 2012 Microsoft Server, i would like to use PEAP with MSCHAPv2 for authentification.

 

IMC Version is 7

 

Thanks in advance

 

Robert

NeilR
Esteemed Contributor

Re: iMC UAM MS AD authentication issue

I'm running 2008 so not sure if there is 2012 issue. BUt did you set the domain controller OS version to 2003? Wont' work otherwise. Also 7.1 is latest - are you at that version - some fixes in UAM over 7.0

 

User > User Access Policy > Service Parameters > System Settings > Domain Controller-Assisted PEAP Authentication

Robär
Occasional Visitor

Re: iMC UAM MS AD authentication issue

Thanks a lot Neil,

 

i used the "v7.0 HP Intelligent Management Center User Access Manager Administrator Guide" for implementing my cases, and there is nothing about "Domain Controller-Assisted PEAP Authentication".

 

Now everything is running, you solved my problem !


@NeilR wrote:

I'm running 2008 so not sure if there is 2012 issue. BUt did you set the domain controller OS version to 2003? Wont' work otherwise. Also 7.1 is latest - are you at that version - some fixes in UAM over 7.0

 

User > User Access Policy > Service Parameters > System Settings > Domain Controller-Assisted PEAP Authentication


 

 

Merry Christmas in advance

 

Robär

NeilR
Esteemed Contributor

Re: iMC UAM MS AD authentication issue

Great! Glad to have helped. Yes running the latest versions. Seems stable and some good improvments .

 

BTW found that info on another post here, I think Mr Debruyne. I think he als posted recdently that a fully patched 2012 AD with latest imc versions was functional now.

timaz
Advisor

Re: iMC UAM MS AD authentication issue

Hi NeilR;

 

I did not have any certificate on my IMC server while using PEAP-MSCHAv2, but after adding a Root Certificate Authority and a server certificate, it seems that I managed to get rid of tha "Invalid Authentication Type" error message. after searching the net, I found one of your post again abot configuring Server Parameter (this post) and configured the iMC in that way. but after this point, when I try to connect any client to the switch port, I don't get any log at the "User Access Log > Authentication Failure Log" !! but after taking some captures with Wireshark, I saw that the switch sends many RADIUS Request messages to IMC and after some time, it gets "Reply Message: No This User" from the IMC and rejects the user. but I integrated the IMC with existing AD and can see the AD users list on the IMC while clicking on the "LDAP USERS". it is interesting that, I have one local user on IMC and even loging in with that user, results the same error!! so I'm thinking about the default port that IMC and AD are talking to each other through it (the port while configuring Server Parameters to make iMC to work with PEAP authentication server). the default port is listed as 9812 and I uses Windows 2012 R2 on both of iMC server and AD DC. I defined a filter on Wireshark to find that port, but it seems this port is not used by these devices to talk. do you have any idea abot this?

NeilR
Esteemed Contributor

Re: iMC UAM MS AD authentication issue

Since you posted same to both threads, I'll add same reply here for completeness - 

 

If you have a windows Active Directory base for your users, doing it via LDAP makes more sense then trying to add users and passwords. All the PDFS from my posts should give a pretty complete picture on how to do this.

 

Don't think the server certificate should have been required for just UID/Password , but may be something about windows. All my testing had a cert installed, either LDAP user or not.

 

So something easy to overlook may be the user account format setup on the LDAP server. Make sure to include the remove prefix and delimiter \ as that's how the accounts are sent by the clients. see attached screen shot.

 

You should be able to see the account name that the client is sending in Wireshark btw.

 

I'm using all the default ports for everything. However might want to make sure windows firewall is not active on imc, at least until you get everything working.

vtb
Occasional Visitor

Re: iMC UAM MS AD authentication issue

i had the same issue once i create virtual computer on AD and applyied on 

User>User Access Policy>Service Parameters>System Settings>Domain Controller-Assisted PEAP Authentication

AD authentication works !!!! thanks lot