Aruba ClearPass Workshop - Wireless #4 - AD Client Certificates EAP-TLS

  Рет қаралды 51,487

Airheads Broadcasting

Airheads Broadcasting

Күн бұрын

Пікірлер: 28
@mister-ikks
@mister-ikks 7 жыл бұрын
Hello Herman, I agree with René; good and straightforward video.On a small note for everyone who, just like me, tries to reproduce what Herman is building.When you configure the Certificate Authority you need to have Certificate Templates which have Auto enroll enabled. Otherwise you don’t get the certificate pushed.I myself copied the 'Workstation Authentication' and 'User' Templates. Then In the security tab I enabled the auto enrolment for Domain Computers and Domain Users respectively.
@hermanrobers
@hermanrobers 7 жыл бұрын
Rens, thanks for adding that. I do see that I have indeed an Arubalab User template in my CA. I setup the CA far before I recorded the video, so had to do depend on my memory what I had to change in the past. I'm not sure if the Computer template had to be replicated, and I'm pretty sure that in older versions of Windows Server, like 2003 Server, you HAD to copy the templates in order to make things word. It seems that in Server 2016, which I used for this workshop, the templates are better fit and need less modification. If I find time, I might redo the AD server installation and CA installation; that is just a lot of work ;-) I think with your suggestion most people should be able to reproduce the automatic certificate enrollment.
@nebojsamarkovic629
@nebojsamarkovic629 7 жыл бұрын
Hi Herman, keep up the good work as these videos are of great help (not easy to find how-to guides on CPPM :-))! If you need suggestions on what to cover in future, I would suggest Onboard.
@AirheadsBroadcasting
@AirheadsBroadcasting 7 жыл бұрын
Hi Herman's away this week but we'll make sure he gets your suggestion. Thanks for watching!
@AirheadsBroadcasting
@AirheadsBroadcasting 7 жыл бұрын
Got it, and there will be Onboard (planned, and also OnGuard and Guest) in some of the later Workshop videos.
@keninjain466
@keninjain466 3 жыл бұрын
Hello Herman, Is there any video for Mac OS X machine authentication same as above, as you did for Windows machine, our company is trying for Mac OS machine?
@kontburakula
@kontburakula 5 жыл бұрын
Great Job Herman!
@davidibrahim7809
@davidibrahim7809 4 жыл бұрын
Another nice video Herman. A question please. Do I need to have both user and machine certificates on a client machine to be able to use "User or Computer authentication" under the client's 802.1x settings? Is it possible to have only machine certificate and still use EAP-PEAP and EAP-TLS without using EAP-MSCHAPv2?
@hermanrobers
@hermanrobers 4 жыл бұрын
For the setting User or Computer authentication you will need both a user and a computer certificate with EAP-TLS. If you prefer just computer authentication, you should configure your client for Computer authentication only. You cannot mix TLS and MSCHAPv2, for example TLS for computer certificated and MSCHAPv2 for user authentication in PEAP. If you do user & computer, the authentication method has to be the same.
@renejorissen
@renejorissen 7 жыл бұрын
Hi Herman, good and straightforward video. Maybe you can extend the setup with EAP-TLS with OCSP support
@ricardoraul
@ricardoraul 7 жыл бұрын
Hi, once again great work. do you mind covering a little more the windows settings for EAP-TLS, specifically the "validate the server's identity" and "connect to these servers" the reason i am asking is because i have always tried to make my connection fail by changing the name of the server I am connecting to but it doesn't matter, it always connects so i am not sure what is the option for
@AirheadsBroadcasting
@AirheadsBroadcasting 7 жыл бұрын
@Rene Jorissen: Thanks, good topic. Let me find a good moment to put that in video (for ADCS); may be combined with Onboarding.
@ricardoraul
@ricardoraul 7 жыл бұрын
ABC Networking , with onbarding will be perfect as it fill that options for you automatically when it downloads the profile
@AirheadsBroadcasting
@AirheadsBroadcasting 7 жыл бұрын
@Ricardo Villarreal: Good suggestion for a video, let me find a moment to create content around that. In summary, with the validate server identity there are 2 parameters: Connect to these servers and Trusted Root CAs. The 'Connect to these servers' ensures that the name of the RADIUS certificate (in the workshop it is radius.arubalab.loc) matches what you configured there. So if you put radius.arubalab.loc in there, your client should ONLY connect if the presented certificate matches radius.arubalab.loc. In the Trusted Root CAs, you can select that the RADIUS certificate can only be issued by the selected CAs. In our lab, we select our Lab CA. If the client sees the RADIUS cert with the proper name, but from a non-selected CA, it will still reject to authenticate. So for a secure deployment: - Tick: Validate Server Certificate - Tick: Connect to these servers, and fill in the name (CN/SAN) for your RADIUS certificate(s) - Tick: the CA that issued your RADIUS certificate. I like the topic and will schedule a video on this.
@ricardoraul
@ricardoraul 7 жыл бұрын
yes, that totally makes sense and that is what the theory says all over the internet :) but i have tried to test this in Windows 8.1 and regardless of the name i put for the servers it still connects which is weird to me. And thanks for taking the time to reply our comments.
@skysinful
@skysinful 3 жыл бұрын
Nice video, so if the cert is created by AD i can then just import the AD root CA into the clearpass cert trust list?
@hermanrobers
@hermanrobers 3 жыл бұрын
Yup, that's basically it.
@spectregeistvirtual
@spectregeistvirtual 5 жыл бұрын
excellent video for eap tls
@narekmovssyan4349
@narekmovssyan4349 4 жыл бұрын
Hi Herman, can you please help ? What if we want to authenticate both with username and if the computer is added to the domain ? Like username and computer authentication.
@hermanrobers
@hermanrobers 4 жыл бұрын
That is a client setting. You can configure your Windows client to do 'User / Computer authentication', what it will do then is first when connecting use the computer account and after that change to user authentication. The ClearPass built-in [Machine Authenticated] role will be applied for computers that have gone through a computer authentication. In the Enforcement stage you can use that (cached) role to put domain authenticated computers in different roles.
@narekmovssyan4349
@narekmovssyan4349 4 жыл бұрын
@@hermanrobers Thank you Herman for your reply. So we cannot avoid of not configuring anything on client side ? I mean doing all in clearpass itself and nothing on client side.
@mubarakbasha4081
@mubarakbasha4081 5 жыл бұрын
keep up the good work
@n0ttsweet_
@n0ttsweet_ 4 жыл бұрын
Great... but what if we don't HAVE a bunch of premade certs? What then? Literally the most important part and doesnt say a word on it.
@null_zero
@null_zero 4 жыл бұрын
Herman's using a Windows Server Certificate Authority, he does show that at the beginning and that's assumed otherwise the video would need to be somewhat longer. I cover CA setup in the last 5 mins of this video: kzbin.info/www/bejne/f6m7e36Nptd0la8
Configuring RADIUS authentication using EAP-TLS in Windows NPS: Part 4
26:45
LIVE TV & MOVIE STREAMING COMPANIES are IDIOTS!
4:33
Doc Squiffy
Рет қаралды 12 М.
Zero to EAP-TLS - Aruba Lab Build - 'Grande Quad Shot' Edition
30:11
Airheads Broadcasting
Рет қаралды 16 М.
Aruba ClearPass Workshop (2021) - Wireless Access #2 RADIUS - Basic part 2
12:14
802.1X EAP Explained with Wireshark
16:07
SDN TechForum
Рет қаралды 4,2 М.
Aruba ClearPass Workshop - Onboard #2 - Onboard configuration
14:28
Airheads Broadcasting
Рет қаралды 19 М.
Securing RADIUS with EAP-TLS [Windows Server 2019]
39:18
OsbornePro TV
Рет қаралды 72 М.
25   802 1x and EAP Concepts
14:40
SecureNet
Рет қаралды 14 М.
EAP-TLS and PEAP: what they are, part 1
9:35
cciewireless
Рет қаралды 168 М.