<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MSM760 and validation users against AD/Radius in M and MSM Series</title>
    <link>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6873755#M4853</link>
    <description>&lt;P&gt;Been reading the documentation, but I must admit that I find it quite hard to understand in detail.&lt;/P&gt;&lt;P&gt;I have been taking over the administration of a MSM760 - originally it has been set up to validate clients on a Novell server through an external Radius server.&lt;/P&gt;&lt;P&gt;This has been causing a lot of issues on certain clients (mainly HP laptops) not wanting to authenticate unless you manually create a WiFi connetion and disable the certificate validation.&lt;/P&gt;&lt;P&gt;I have been taking it as being a Novell issue, but now after changing authentication to Active Directory, I see the exact same thing. Furthermore users now complain about being promted a certificate with the name "Dummy certificate". Nothing that I have been creating, but I managed to find a certificate under "Security", "Certificate Stores" carrying the name "Dummy Certificate". Current usage for this is "RADIUS EAP".&lt;/P&gt;&lt;P&gt;I do not understand the connection from this RADIUS EAP and the Active Directory validation, because what I did was to create a new VSC with generally the same settings as on the Novell validation VSC... execpt chosing "Active Directory" under Remote Authentication in the 802.1X group. Plus of coarse adding the MSM760 to our AD.&lt;/P&gt;&lt;P&gt;I works in many of the cases... but I would like it to work flawless and automatically with all clients. What is the best approach to connect MSM760 to AD and let clients authenticate against this?&lt;/P&gt;&lt;P&gt;Regards,m Lars.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jun 2016 13:35:25 GMT</pubDate>
    <dc:creator>hpbon</dc:creator>
    <dc:date>2016-06-29T13:35:25Z</dc:date>
    <item>
      <title>MSM760 and validation users against AD/Radius</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6873755#M4853</link>
      <description>&lt;P&gt;Been reading the documentation, but I must admit that I find it quite hard to understand in detail.&lt;/P&gt;&lt;P&gt;I have been taking over the administration of a MSM760 - originally it has been set up to validate clients on a Novell server through an external Radius server.&lt;/P&gt;&lt;P&gt;This has been causing a lot of issues on certain clients (mainly HP laptops) not wanting to authenticate unless you manually create a WiFi connetion and disable the certificate validation.&lt;/P&gt;&lt;P&gt;I have been taking it as being a Novell issue, but now after changing authentication to Active Directory, I see the exact same thing. Furthermore users now complain about being promted a certificate with the name "Dummy certificate". Nothing that I have been creating, but I managed to find a certificate under "Security", "Certificate Stores" carrying the name "Dummy Certificate". Current usage for this is "RADIUS EAP".&lt;/P&gt;&lt;P&gt;I do not understand the connection from this RADIUS EAP and the Active Directory validation, because what I did was to create a new VSC with generally the same settings as on the Novell validation VSC... execpt chosing "Active Directory" under Remote Authentication in the 802.1X group. Plus of coarse adding the MSM760 to our AD.&lt;/P&gt;&lt;P&gt;I works in many of the cases... but I would like it to work flawless and automatically with all clients. What is the best approach to connect MSM760 to AD and let clients authenticate against this?&lt;/P&gt;&lt;P&gt;Regards,m Lars.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 13:35:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6873755#M4853</guid>
      <dc:creator>hpbon</dc:creator>
      <dc:date>2016-06-29T13:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: MSM760 and validation users against AD/Radius</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6874657#M4855</link>
      <description>&lt;P&gt;Ok, by trial and error I think that I now understand a bit of it.&lt;/P&gt;&lt;P&gt;took a certificate from out webserver, uploaded it to the certificate store, and iPhones are now getting this certificate displayed on connect. iPhones are asked to approve the certificate. Android just connects without any promts.&lt;/P&gt;&lt;P&gt;Some windows clients connects without problems - others will fail unless you manually create the wifi network, edit it and deselect the "validate server certificate" option.&lt;/P&gt;&lt;P&gt;The certificate is valid. It has been issued by a trusted&amp;nbsp;authority.. Then name of the certificate belongs to a server with another IP address though..&lt;/P&gt;&lt;P&gt;How can I let every connecting client act like an android: just connecting without certificate approvement or manual wifi creation?&lt;/P&gt;&lt;P&gt;Regards, Lars.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jul 2016 13:26:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6874657#M4855</guid>
      <dc:creator>hpbon</dc:creator>
      <dc:date>2016-07-01T13:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: MSM760 and validation users against AD/Radius</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6875054#M4856</link>
      <description>&lt;P&gt;Hi Lars,&lt;/P&gt;&lt;P&gt;The radius + MSM760 can be a headache.&lt;/P&gt;&lt;P&gt;The way radius is configured will decide how the connection authentication will work. EAP-TLS will require a certificate on the server and on the device. EAP-TTLS will require a certificate only on the server. Radius can also be set to always require a certificate or not, before it authenticates your device. I use EAP-TTLS + PAP with a wildcard certificate (valid for all *.domain.com servers).&lt;/P&gt;&lt;P&gt;Android by default does not require a certificate while apple devices do. Set Windows devices to use "Any valid certificate" because they mostly have the CA public keys installed already. Apple will accept them as well.&lt;/P&gt;&lt;P&gt;You can use EAP-PEAP+MSCHAP to allow devices to connect without profiles. This works for apple stuff too.&lt;/P&gt;&lt;P&gt;Good luck&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 09:23:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6875054#M4856</guid>
      <dc:creator>CraigS1971</dc:creator>
      <dc:date>2016-07-04T09:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: MSM760 and validation users against AD/Radius</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6875072#M4857</link>
      <description>&lt;P&gt;Hi Craig... and thank you for your comment... yes, it is giving me quite much of a headache...&lt;/P&gt;&lt;P&gt;I just want the MSM760 to validate users agains out Active Directory.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where to set the EAP-PEAP+MSCHAP?&lt;/P&gt;&lt;P&gt;Under Authentication, Radius Server I have got:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="label"&gt;PAP &lt;I&gt;(Required to support MAC-based authentication in VSCs)&lt;/I&gt;&lt;/SPAN&gt; &lt;IMG src="https://190.200.10.20/img/v1437166706/space.gif" border="0" alt="" width="1" height="4" /&gt; &lt;SPAN class="label"&gt;&amp;nbsp;&amp;nbsp;&lt;I&gt;To support WPA/802.1X clients you must select at least &lt;/I&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;I&gt;one of the following:&lt;/I&gt;&lt;/SPAN&gt; &lt;SPAN class="label"&gt;EAP-TTLS&lt;/SPAN&gt; &lt;SPAN class="label"&gt;EAP-PEAPv0&lt;/SPAN&gt; &lt;SPAN class="label"&gt;EAP-TLS&lt;/SPAN&gt; &lt;SPAN class="label"&gt;FIPS compliant operation&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Lars.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 10:43:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6875072#M4857</guid>
      <dc:creator>hpbon</dc:creator>
      <dc:date>2016-07-04T10:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: MSM760 and validation users against AD/Radius</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6875091#M4858</link>
      <description>&lt;P&gt;Hi Lars,&lt;/P&gt;&lt;P&gt;I just left mine all enabled and had to get our Packetfence NAC vendor to configure the radius server due to the complexity of our system.&lt;/P&gt;&lt;P&gt;I could send you some config files but they may confuse more than help.&lt;/P&gt;&lt;P&gt;You need to check files like:&lt;BR /&gt;/etc/raddb/ or /usr/local/etc/raddb (Depending how you installed radius)&lt;/P&gt;&lt;P&gt;eap.conf&lt;BR /&gt;./sites-enabled/default&lt;BR /&gt;./sites-enabled/inner-tunnel&lt;/P&gt;&lt;P&gt;This may help more: &lt;A href="https://www.eduroam.us/node/89" target="_blank"&gt;https://www.eduroam.us/node/89&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 12:18:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm760-and-validation-users-against-ad-radius/m-p/6875091#M4858</guid>
      <dc:creator>CraigS1971</dc:creator>
      <dc:date>2016-07-04T12:18:19Z</dc:date>
    </item>
  </channel>
</rss>

