Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Radius Cisco AP authentication

    pfSense Packages
    1
    1
    934
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      p3tter
      last edited by

      Hi, im struggling to get the authentication between the cisco AP clients and the freeRadius server.
      when i test the radius authentication from the cisco AP console it works, im also using the radius for console access and that works.

      here is the pfsense log:

      Sep 17 19:18:31 radiusd 79380 Login incorrect: [petter1/<via auth-type="EAP">] (from client ASA port 0 via TLS tunnel)
      Sep 17 19:18:31 radiusd 79380 Login incorrect: [petter1/<via auth-type="EAP">] (from client ASA port 355 cli 4485.00e2.952d)

      my pfsense EAP config:

      EAP:
      
      Default EAP Type MD5
      
      Certificates for TLS:
      
      using Pfsense Cert Manager
      
      private key password <blank>
      
      SSL CA certificate radius (created this under Pfsense Cert manager)
      
      SSL Server Certificate radius
      
      EAP-TTLS:
      
      Default EAP type MD5
      
      EAP-PEAP:
      
      MSCHAPv2</blank>
      

      does anyone have some tips? :)</via></via>

      1 Reply Last reply Reply Quote 0
      • First post
        Last post
      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.