3 Configure The Network For Access Point 802.1X Authentication
3 Configure The Network For Access Point 802.1X Authentication
Currently, Cisco access points (Wave 2) support 802.1X authentication with a switch port for EAP-Flexible
Authentication via Secure Tunneling (EAP-FAST), EAP-Transport Layer Security (EAP-TLS), and EAP-Protected
Extensible Authentication Protocol (EAP-PEAP) methods. Now you can enable configurations and provide
credentials to the access point from Cisco WLC.
Cisco access points (Wave 1) support EAP-FAST only (AP1700, AP2700, and AP3700).
EAP-FAST Protocol
You can establish a secure TLS tunnel with RADIUS in the EAP-FAST protocol that Cisco developed. However, the
access point requires a strong shared key with a Protected Access Credential (PAC), either provided via in-band
provisioning (in a secured channel) or via out-band provisioning (manual). Note that the EAP-FAST type
configuration requires dot1x credentials configuration for the access point, because the access point will use EAP-
FAST with the Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAP V2) method.
https://learningspace.cisco.com/dkitserver/content/show?x=MyCKmco561wrt9DD&isLatest=false 1/7
9/22/21, 12:38 PM Implementing Cisco Enterprise Wireless Networks - Student Learning Guide
type configuration requires dot1x credentials configuration for the access point. The access point also must go
through LSC provisioning. Access points use the PEAP protocol with the MS-CHAP V2 method.
The access point acts as the 802.1X supplicant and is authenticated by the switch against the RADIUS server,
which supports EAP-FAST, EAP-TLS, and EAP-PEAP. When dot1x authentication is enabled on a switch port, the
device that is connected to it authenticates itself to receive and forward data other than 802.1X traffic.
To authenticate with the EAP-FAST method, the access point requires the credentials of the RADIUS server. You
can configure it at the Cisco WLC, from where it will pass on to the access point via a configuration update request.
For EAP-TLS or EAP-PEAP, the access points use the certificates (device ID and CA) that the local certificate
authority (CA) server makes significant.
aaa new-model
!
dot1x system-auth-control
!
Now, configure the access point switch port interface Gigabit Ethernet 0/4.
spanning-tree portfast
edge
Configure the Access Point for 802.1X Authentication (GUI) (Cisco AireOS)
https://learningspace.cisco.com/dkitserver/content/show?x=MyCKmco561wrt9DD&isLatest=false 2/7
9/22/21, 12:38 PM Implementing Cisco Enterprise Wireless Networks - Student Learning Guide
Set a common username and password for all the access points that join to Cisco WLC with the Global
Configuration feature.
Configure the Access Point for 802.1X Authentication (GUI) (Cisco IOS XE)
Here you see the Add AP Join Profile page.
https://learningspace.cisco.com/dkitserver/content/show?x=MyCKmco561wrt9DD&isLatest=false 3/7
9/22/21, 12:38 PM Implementing Cisco Enterprise Wireless Networks - Student Learning Guide
To configure the 802. 1X username and password (GUI), take these steps:
1. Choose Configuration > Tags & Profiles > AP Join.
2. Choose the appropriate AP Join profile.
https://learningspace.cisco.com/dkitserver/content/show?x=MyCKmco561wrt9DD&isLatest=false 4/7
9/22/21, 12:38 PM Implementing Cisco Enterprise Wireless Networks - Student Learning Guide
In the Name field, enter the name for the network device. You can provide a descriptive name to the network
device that can differ from the hostname of the device. The device name is a logical identifier.
In the Device Profile field, click the drop-down list and choose Cisco as the vendor of the network device. You can
use the tool tip next to the drop-down list to see the flows and services that the selected vendor’s network devices
support, as well as the RADIUS Change of Authorization (CoA) port and type of URL redirect that the device uses.
These attributes are defined in the device type’s network device profile.
Check the RADIUS Authentication Settings check box in the RADIUS Authentication Settings section.
You must create an identity group for the AP credentials to belong to and then create an identity for the APs to use.
Take these steps:
https://learningspace.cisco.com/dkitserver/content/show?x=MyCKmco561wrt9DD&isLatest=false 5/7
9/22/21, 12:38 PM Implementing Cisco Enterprise Wireless Networks - Student Learning Guide
1. Navigate to Administration > Identity Management > Groups and add an identity group for the AP Dot1X
credentials.
2. Then navigate to Administration > Identity Management > Identities and create an identity for the APs that
matches the identity that you created on the APs. Be sure to place the new identity in the group that you
created for this purpose.
Navigate to Policy >Policy Sets and add a policy set to verify the credentials that you configured on the WLC for
the access points.
The next figure shows the policy set Port_Auth. The condition here is that if the device is an AP and uses wired
802.1X, then proceed to the authorization profiles.
https://learningspace.cisco.com/dkitserver/content/show?x=MyCKmco561wrt9DD&isLatest=false 6/7
9/22/21, 12:38 PM Implementing Cisco Enterprise Wireless Networks - Student Learning Guide
Expand the View column for the Policy Set Name and create an authorization policy. This example shows a rule
that is named AP_Authentication, which will permit access if the user belongs to the IdentityGroup AP.
The 802.11ac Wave 2 access points can use 802.1X authentication on a switch with which three of the following
protocols? (Choose three.)
EAP-AKA
EAP-FAST
EAP-TLS
PEAP
© 2021 Cisco and/or its affiliates. All rights reserved. Printed contents of [email protected]
https://learningspace.cisco.com/dkitserver/content/show?x=MyCKmco561wrt9DD&isLatest=false 7/7