Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Problem setting up WPA2-enterprise Wifi

Hi everybody,

I've got some difficulties setting up a Wifi access with 802.1x authentication. My setup consists in a XG330 firewall and APX120 access points.

I've followed these 2 guides:

- https://community.sophos.com/sophos-xg-firewall/f/recommended-reads/122559/sophos-xg-firewall-wireless-and-radius-authentication-on-windows-server-2016

- https://community.sophos.com/sophos-xg-firewall/f/recommended-reads/122559/sophos-xg-firewall-wireless-and-radius-authentication-on-windows-server-2016

I've got a MS CA configured on a W2016 server and a NPS Server on the same machine.

CA template is configured as stated by MS here:

https://docs.microsoft.com/en-us/windows-server/networking/technologies/nps/nps-manage-cert-requirements

NPS server auto-enroll a certificate based on this template, and this certificate is present in the machine certificate store of the NPS server.

Connection test from radius XG interface is successful, and is logged on the NPS server. But when I try to connect a laptop to the SSID, it ends with an error 23 on the XG side, and nothing is logged on the NPS.

Can someone point me to the correct way to solve this problem?



This thread was automatically locked due to age.
Parents
  • Hello Christian,

    you can 'tcpdump' the traffic between your XG and the NPS Server (XG/Advanced Shell):  

    tcpdump -i any udp port 1812 -vv

    With this tcpdump you see the RADIUS communication. To get better logs (in windows security log) you can use this command on NPS Server:

    auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable

    Regards,

    Ben



    format
    [edited by: Ben@Network at 7:52 PM (GMT -7) on 31 May 2021]
Reply
  • Hello Christian,

    you can 'tcpdump' the traffic between your XG and the NPS Server (XG/Advanced Shell):  

    tcpdump -i any udp port 1812 -vv

    With this tcpdump you see the RADIUS communication. To get better logs (in windows security log) you can use this command on NPS Server:

    auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable

    Regards,

    Ben



    format
    [edited by: Ben@Network at 7:52 PM (GMT -7) on 31 May 2021]
Children