Chris,

We had the same issue you are talking about here at UofR. After hours of
trying to figure it out, we decided to use the WLSM as a local radius
server for the WLSE and all of our APs.  This has been working for us
and it keeps our infrastructure authentications separate from our client
authentications.  They are all going, through the WLSM to the Radius
Server.

Another note regarding 12.3(4), and WLSM version 1.3.1.  When the
clients associate with the AP, and received an IP address from DHCP, it
was not recognized by the WLSM and showed up as 0.0.0.0 ip on the
mobility mobile node.  The fix was to reboot the AP, or force a
re-authentication on a new AP.  At the same time, the WLSM was nailing
the radius server with client requests.  We have apparently fixed these
issues with an upgrade to 12.3(7) on the AP, WLSM to 1.4.1, and the 720
sup module to 12.2.18sxd5.  You may want to look at this upgrade if you
are having these issues.

Good luck.

Chip        

-----Original Message-----
From: Chris Hart [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, August 31, 2005 12:13 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] WinXP 802.1x and password changes

>>
>>>Chris Hart wrote:
>>>
>>>>WLSM to pass 802.1x PEAP/MSCHAPv2  Authentication to the Radius
server 
>>>>for client authentication
>>>>along with WDS and management  -  From what I have read this is
LEAP.
>>>
>>>
>>>Gotcha..
>>>
>>>We don't have the WLSM, so I'm not sure how well our architecture
maps 
>>>to yours, but what we do:
>>>
>>>We have our AP management interfaces on several RFC-1918 networks. On

>>>each /24, we have one AP configured to be the WDS master and one as a

>>>slave/backup.
>>>
>>>We run a radius server on the master and slave APs solely for
>>>authenticating the WDS domain, since we were never able to get the
LEAP 
>>>stuff sorted out. All of our participating APs in the WDS then 
>>>authenticate to the local WDS masters.
>>>
>>>What version of IOS do you have on the APs? There's a problem with
UDP 
>>>and WDS with 12.3(4)JA
>>
>>We are at 12.3(4).   I will have to look into this bug.
>
>
>Basically, it interferes with UDP traffic headed out via the default 
>route, which includes the WDS traffic to the WLSE.
>
>I should have been more specific above.. we use LEAP and the radius
server 
>on the master AP to do our AP-AP and AP-WLSE authentication. We use
OSC's 
>RADIATOR to do our 802.1x EAP-TTLS authentication. We aren't using the 
>AP's radius server to do user authentication.
>
>-JEff

I upgraded the code on a few AP's and they now connect to the WLSM/ 
WDS.    My only issue currently is the WLSE does not seem to be able to 
authenticate with the WLSM/WDS.  I can see the Auth ok message on the 
FreeRadius server.

Thanks again for pointing out the bug.


Chris Hart
(847) 467-7747
IT-TNS
Northwestern University, Evanston
[EMAIL PROTECTED]

**********
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to