<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MSM720 Controller Team with authenticating 802.1x+AD in M and MSM Series</title>
    <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799554#M4497</link>
    <description>&lt;P&gt;Under the controller --&amp;gt; Tools --&amp;gt; system tools --&amp;gt; select "Extra AD/Radius debug" and select run.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then if you perform the tests again, in the log files you should see additional logs getting captured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Oct 2015 01:16:10 GMT</pubDate>
    <dc:creator>RamKrish</dc:creator>
    <dc:date>2015-10-06T01:16:10Z</dc:date>
    <item>
      <title>MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6798628#M4489</link>
      <description>&lt;P&gt;Hello all !&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;I'm having&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;some&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;authentication&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;problems&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;in Active&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Directory.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Here's how&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;this&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;setup&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;at that time&lt;/SPAN&gt;:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;Was performed&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;successfully&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;join&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;AD&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Created&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a group&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;to authenticate in the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Controller&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;and&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;AD&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;It created the XYZ SSID with WPA2 protection &lt;SPAN class="hps atn"&gt;(&lt;/SPAN&gt;&lt;SPAN&gt;AES /&lt;/SPAN&gt; CCMP&lt;SPAN&gt;)&lt;/SPAN&gt; with Dynamic Key Source + 802.1x with AD.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;On the client &lt;SPAN class="hps atn"&gt;(&lt;/SPAN&gt;Win7) I manually configured the network to use PEAP.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;When you connect the network appears to enter the User / Password, however access is not established and I have error messages attached.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;I have this same setup on another client, the only difference is that on the client with problem we are in the environment with Team Controller MSM720 and MSM430 AP. &lt;SPAN class="short_text"&gt;And on the client where works have MSM760 + MSM460&lt;/SPAN&gt;.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;Is there any way to debug the Controller to communicate it to the AD is working or something else that can help me in this analysis ??&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;Tk.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 12:53:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6798628#M4489</guid>
      <dc:creator>johnk3r</dc:creator>
      <dc:date>2015-10-02T12:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6798706#M4490</link>
      <description>&lt;P&gt;Few things to verify:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;check the Authentication section --&amp;gt; Active directory and ensure at least one&amp;nbsp;Active Directory group is activated.&amp;nbsp; By default AC and Non-AC Active Directory group is disabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have configured any specific/custom group attributes, make sure the same "group name" is configured on the Active Directory as well.&amp;nbsp; Because when the controller searches for the name, its going to look for the group attribute match.&amp;nbsp; If the retrieved user group attribute didnt match what you have configured in the custom group attribute, then the authentication would fail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont think its a certificate issue because the radius reject is seen on the logs.&amp;nbsp; But just for testing, can you test the manual profile on the Windows client without "validate server certificate" option?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 16:13:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6798706#M4490</guid>
      <dc:creator>RamKrish</dc:creator>
      <dc:date>2015-10-02T16:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6798722#M4491</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;Thank you for&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;RamKrish&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;help.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;I will check&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the issue&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;of the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;default&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;group.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I believe&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the two&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;are disabled&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class="hps"&gt;I do not set&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;any attributes&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;for&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the AD&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;group.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class="hps"&gt;&lt;SPAN class=""&gt;The setting that was made in client without the certificate option.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class="hps"&gt;&lt;SPAN class=""&gt;I will post results after the test. Thank you.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 02 Oct 2015 17:28:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6798722#M4491</guid>
      <dc:creator>johnk3r</dc:creator>
      <dc:date>2015-10-02T17:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799509#M4494</link>
      <description>&lt;P&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class="hps"&gt;Hello&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN&gt;Groups&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;"default"&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;were&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;disabled.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;I&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;enable&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the group&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;"Default&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;non&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;AC&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Active Directory&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Group". It is necessary to link the VSC in this group &lt;SPAN&gt;?&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;Error logs are the same.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;The VSC this as egress VLAN. And we are using Mobility traffic manager in VSC.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;I honestly have no idea of where this problem. Already read documentation and how to.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text"&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;&lt;SPAN&gt;I accept new ideas for this case ..&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 20:49:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799509#M4494</guid>
      <dc:creator>johnk3r</dc:creator>
      <dc:date>2015-10-05T20:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799552#M4495</link>
      <description>&lt;P&gt;Check if both the controller in the team shows as JOINED state.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Initially just enable both the Default Group and test.&amp;nbsp; Disable any custom specific groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you have successfully tested with Default Groups, then you can enable the custom AD groups on the authentication profile.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2015 00:47:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799552#M4495</guid>
      <dc:creator>RamKrish</dc:creator>
      <dc:date>2015-10-06T00:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799553#M4496</link>
      <description>&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;I had already done the tests that you mentioned&lt;SPAN&gt;.&lt;/SPAN&gt; However unsuccessfully&lt;SPAN&gt;.&lt;/SPAN&gt; Both Controllers communicating with the AD &lt;SPAN class="hps atn"&gt;(&lt;/SPAN&gt;&lt;SPAN&gt;JOIN)&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Any idea how to debug communication?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 06 Oct 2015 01:09:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799553#M4496</guid>
      <dc:creator>johnk3r</dc:creator>
      <dc:date>2015-10-06T01:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799554#M4497</link>
      <description>&lt;P&gt;Under the controller --&amp;gt; Tools --&amp;gt; system tools --&amp;gt; select "Extra AD/Radius debug" and select run.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then if you perform the tests again, in the log files you should see additional logs getting captured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2015 01:16:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6799554#M4497</guid>
      <dc:creator>RamKrish</dc:creator>
      <dc:date>2015-10-06T01:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6800218#M4501</link>
      <description>&lt;P&gt;I will have just short notice. Sorry for that I know that you are solving AD vs MSM. But my experience with MSM and AD integration is not so good. (but last time I used this was in older firmwares 5.x.x).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So all setups where I need to use 802.1X and WPA2-AES dynamic keys I am solving using traditional RADIUS server. In Windows world simply with Microsoft Network policy server.&amp;nbsp; This will use AD and all policies are based on standard. Results are great. Functional on first touch.&lt;/P&gt;&lt;P&gt;Just add Radius clients (each AP for non-access controlled VSC), add some policies based on groups.&lt;/P&gt;&lt;P&gt;Especially this is great for computer-based authentication.&lt;/P&gt;&lt;P&gt;From my view this is more transparent and better logged.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I am very interested about AD integration if you will be successful.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2015 15:07:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6800218#M4501</guid>
      <dc:creator>Michal DoleÅ¾al</dc:creator>
      <dc:date>2015-10-07T15:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6800244#M4502</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;Hello&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Michal !!!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;Thanks for the tip.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;If you&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;have any&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;procedure&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;or documentation&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;on how to perform&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;this&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;configuration&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;please&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;send&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;me&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;I will&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;take the tests&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;today and&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;tomorrow.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;If you have&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;no&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;success&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I will&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;think of&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;another form of&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;authentication.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2015 15:43:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6800244#M4502</guid>
      <dc:creator>johnk3r</dc:creator>
      <dc:date>2015-10-07T15:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6800266#M4505</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;easy to do.&lt;/P&gt;&lt;P&gt;First you must install the role on some Windows Server (I recommend 2008 R2 and later)&lt;/P&gt;&lt;P&gt;This role is Windows Network policy server (NPS). You need just policy server, nothing more.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second you need to setup communication between MSM controller, APs and NPS. This is common RADIUS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So on MSM you need:&lt;/P&gt;&lt;P&gt;Go to Authentication - go to RADIUS profiles, click Add New profile and fill the details.&lt;/P&gt;&lt;P&gt;IP address is the IP of your Windows NPS and preshared key is your own secret key for communication between controller and NPS (same must be filled in NPS).&lt;/P&gt;&lt;P&gt;Untick Use Message authenticator. Check authentication method which must be set to MSCHAPv2. For HA setup you need two NPS servers, so you can fill both, but for test you can use just one (primary).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On NPS server:&lt;/P&gt;&lt;P&gt;Go to RADIUS Clients and Servers - Radius clients - New and fill the details.&lt;/P&gt;&lt;P&gt;Here you are working with two common scenarios. First one is authentication box checked on your VSC in MSM. In this case you need add here just controller IP address. But if you would like to be completely independent on controller (so unticked Access controller/Authentication) you must add here all APs. (just note: In linux and freeradius it is possible to add range of IPs, in Windows not).&lt;/P&gt;&lt;P&gt;you need add the name, IP address and preshared key which you fill in MSM setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At this time you passed the all the basics. Now it is the time for policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use RADIUS for Guest access and also for 802.1X. So in first case you will use just MSCHAPv2 protocol, in second case you need to use EAP protocol (TLS for certificates or PEAP for passwords).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you need to use both methods you must in conditions divide those two access methods.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Policies - Network policies just add a new one. On first tab you fill the name, next, on second tab you need to set conditions of access. Just click add, choose Windows Groups and choose group of users you would like to give the access. and OK. You can specify here the condition for authentication protocol, add second condition and choose Authentication method and choose appropriate (Windows use EAP as EAP-TLS, PEAP and MSCHAP derivates). Next. Then Leave access granted and next. In EAP types you must add correct method you want to use.&lt;/P&gt;&lt;P&gt;Here you must have certificate in system you will use for encryption (can be used internal or self-signed).&lt;/P&gt;&lt;P&gt;On the last page you are specifying other details like VLANs, access lists etc. But this is very complex.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have this policy:&lt;/P&gt;&lt;P&gt;you must check on MSM your VSC. You must go to 802.1X config and choose (check) previously created RADIUS profile.&lt;/P&gt;&lt;P&gt;If you would like to have total independence untick access control/authentication. So all traffic including authentication will go thru AP (not controller).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try the access. It is written directly from my head so it can be small mistakes.&lt;/P&gt;&lt;P&gt;How to check the result if something fails. Easily - check first system log on your NPS server where are reported problem with NPS itself, mainly problem with client communication. (like bad passwords etc).&lt;/P&gt;&lt;P&gt;And the most important: Security log, where you will see RADIUS packets and result of policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some problems connected to this:&lt;/P&gt;&lt;P&gt;If you need to have dynamic VLANs - my experience is that APs must be provisioned to be on tagged VLAN (with management interface) - best is to manually force the AP to do this. And then create virtual interface for APs VLAN to connect all APs by L2 discovery (discovery on this interface must be allowed). But this is good question to discussion. I only write my experience and working setup.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2015 17:02:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6800266#M4505</guid>
      <dc:creator>Michal DoleÅ¾al</dc:creator>
      <dc:date>2015-10-07T17:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: MSM720 Controller Team with authenticating 802.1x+AD</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6800685#M4513</link>
      <description>&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;Hello !&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;I have good&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;news&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;in this case.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;The configuration&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;performed&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;in the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Controller&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;was correct&lt;/SPAN&gt;, the problem &lt;SPAN class="hps"&gt;is in the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;DNS&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;configured in the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Controller.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;It was&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;set up&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;two&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;local DNS&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;and&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;Join&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;AD&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;functioned perfectly&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;After&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;reverse&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;DNS&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;authentication&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;worked perfectly.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;Now, as&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I did not have&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;problems with&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the Join&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;previously configured&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;DNS&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;...&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN class=""&gt;&lt;SPAN class="hps"&gt;Case closed !!!&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 08 Oct 2015 20:31:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm720-controller-team-with-authenticating-802-1x-ad/m-p/6800685#M4513</guid>
      <dc:creator>johnk3r</dc:creator>
      <dc:date>2015-10-08T20:31:31Z</dc:date>
    </item>
  </channel>
</rss>

