Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Configurar la autenticación basada en certificados (EAP-TLS)

Siga los procedimientos adecuados y las demostraciones en vídeo que se indican a continuación para configurar la autenticación EAP-TLS basada en certificados para su red inalámbrica o cableada.

Cuando configure una conexión inalámbrica o por cable, un paso importante es configurar el acceso seguro a la red. Con Juniper Mist Access Assurance, puede configurar un método de autenticación mediante 802.1X.

El Protocolo de autenticación extensible: Seguridad de la capa de transporte (EAP-TLS), uno de los protocolos compatibles con la autenticación 802.1X, comprueba los certificados de cliente y servidor en cada punto de la ruta de comunicación. Este método de autenticación utiliza certificados digitales de confianza para validar a los usuarios y proporcionar un acceso a la red sin problemas.

Prerrequisitos

  • Debe obtener certificados digitales, es decir, certificados X.509 de origen, de entidades emisoras de certificados (CA), que sean terceros de confianza, o generar los certificados internamente.

  • Debe configurar el dispositivo cliente como un suplicante que un servidor RADIUS pueda autenticar mediante 802.1X. Normalmente, los clientes se configuran mediante administración de dispositivos móviles (MDM) o directivas de grupo en implementaciones de producción.

  • Su red debe tener la serie Juniper® de puntos de acceso de alto rendimiento para llevar a cabo la autenticación de cliente inalámbrico.

  • Configure el certificado de servidor TLS empresarial público o privado que usará el servidor RADIUS en la nube.

  • Familiarícese con los siguientes procedimientos:

Configurar la autenticación basada en certificados (EAP-TLS) para redes inalámbricas

Para configurar la autenticación basada en certificados en una red inalámbrica mediante el portal de Juniper Mist:

  1. Importe una entidad emisora de certificados (CA) raíz de confianza. Juniper Mist usa el certificado generado por la CA como certificado de servidor.
    1. En el portal de Juniper Mist, haga clic en En el menú izquierdo del portal de Juniper Mist, seleccione Organización > Access > certificados. La página Certificados muestra la lista de certificados ya agregados (si los hay).
      Aparece la página Certificados, que muestra la lista de certificados ya agregados (si los hay).
    2. Haga clic en Agregar entidad emisora de certificados para importar el certificado. Si ha configurado la infraestructura de clave pública (PKI), importe las CA raíz e intermedias. Consulte Usar certificados digitales.
      Una vez importada una CA, el servidor de autenticación confía en cualquier certificado de cliente emitido por esta CA.
      Del mismo modo, un dispositivo cliente valida un certificado de servidor verificando si está firmado por una CA de confianza que haya agregado.
  2. Crear políticas de autenticación.

    Sin ninguna política de autenticación, los servidores rechazan todos los intentos de los clientes de conectarse a la red. Para permitir conexiones de clientes válidos, debe agregar las reglas adecuadas para configurar las políticas de autenticación.

    1. En el menú izquierdo del portal de Juniper Mist, seleccione Organización > políticas de acceso > autenticación para crear una nueva regla que proporcione acceso a los clientes con certificados válidos. .
    2. Defina una política de autenticación con los siguientes detalles. Seleccione la opción requerida para cada campo de las respectivas listas desplegables. En la lista siguiente se muestran entradas de ejemplo.
      1. Nombre: escriba un nombre para la política.
      2. Criterios de coincidencia: seleccione EAP-TLS.
      3. Directiva: seleccione Permitido.
      4. Directivas asignadas: seleccione Acceso a la red permitido.
  3. Configure el SSID.

    Las LAN inalámbricas (WLAN) son elementos modulares y cada WLAN contiene la configuración de un identificador de conjunto de servicios (SSID) determinado.

    1. En el menú izquierdo del portal de Juniper Mist, seleccione Organización > plantillas inalámbricas > WLAN.

      En la página Plantillas WLAN, haga clic en una plantilla existente para abrir su página de configuración o haga clic en Crear plantilla en la esquina superior derecha de la página para crear una plantilla.

    2. En la página Plantillas WLAN, haga clic en Agregar WLAN.
    3. Asigne un nombre al SSID. Normalmente, este nombre es el mismo que el nombre de WLAN.
    4. Seleccione una opción para cada uno de los campos siguientes:
      • Tipo de seguridad: seleccione Empresa (802.1X). Además, seleccione WPA2 o WPA3.
      • Servidor de autenticación: autenticación MIST.
      • VLAN: especifique el tipo de VLAN que utilizará el AP en la conexión del conmutador.
      Ahora la configuración del SSID está completa.
    5. Haga clic en Crear.
  4. En la página Plantillas WLAN, en La información de este artículo se refiere a, seleccione Toda la organización o Grupos de sitios/sitios.

En los siguientes vídeos se muestra cómo configurar la autenticación basada en certificados (EAP-TLS) para redes inalámbricas.

Let's start it with Mist Access Assurance and we'll start by looking at various 802.1x authentication use cases. There's both wireless and wired but the first very simple use case we'll look at the wireless certificate-based or EAP-TLS authentication. What do we need to get this up and running? So objective is allow you know our clients to authenticate to the network and allow them on the network if they're presenting trusted digital certificates.

Prerequisites we need client certificates installed on client devices. We have a separate video how you can create your own certificate authority and sign client certificates if you don't have any PKI and you just want to do your lab testing for example. That's a there is a good video covering that.

In production environment in production deployments the client certificates are typically distributed automatically by MDM solutions or mobile device management or group policies if you're in the Windows environment or any other onboarding solutions. But we are assuming that in for our exercise client certificates are already in there. Before we go into configuration I just want to review the authentication flow.

What's actually going to happen when client is trying to access the network? So we have a wireless client, we have a Mist AP, we have access assurance service that's configured. So client will try to associate to the AP which advertises 802.1x enabled SSID. The client the AP will ask about the IP identity.

In other words, what's your what's your username? Client will send the IP identity response. At this point, the Mist Access Assurance will present its server certificate that's to provide the mutual authentication.

So client will need to trust the Mist access assurance certificate to say okay I'm actually trusting this service to pass authentication credentials. Then after the client validates the service certificate and client can either truly validate the certificate or it can bypass that service certificate validation that there is a setting that you can configure. Not a great practice, actually, a horrible practice from a security point of view, but for testing in lab purposes, would be a good option.

Now after the client validated the server certificate in a TLS scenario, client is presenting its own client certificate, or in other words, called client hello and sends it over through the AP to the Mist access assurance service. At this point, access assurance will look at the client certificate and validate it against the trusted certificate authority list that that it has configured. In other words it will look at okay so which certificate authorities do I trust in my configuration? Is any of those trusted CA's signed the client certificate? And if yes, great the certificate is validated right, and at this point, we can look through authentication policy rules and make sure that we are matching a configured authentication policy rule and at this point we declare success.

If configured, we can also send a VLAN. We can send a role to the AP so it can assign the client into the right network and at this point we're good to go. Now let's look at the actual setup procedure - what do we need to configure this? So right now, we have an organization, the test organization. We'll be using for this tutorial that has one test AP connected, one switch connected with virtually no config on it whatsoever.

So we will start by configuring the access assurance for our use case to authenticate clients using EAP-TLS only validating certificates all we need to do is to go to Organization > access certificates. We'll need to import our certificate authority. If you have your own PKI infrastructure then you would import your root certificate authority typically also your intermediate CA so it's going to be a couple of certs that you will need to to import only the public certificate you would need to import obviously not the private keys. So we just we are just telling access assurance which certificates to trust based on this trust chain.

In our case, we're using our lab certificates that we've created in in another video so I'm going to open up this lab Mist CA that we've created in a different video I'm going to copy the certificate contents paste it in here so it will now decode my CA common name it will see okay it's valid until this at this date it's actually a CA cert because it's self-issued we can hit save. So now we've imported the certificate authority at this point we are trusting any client certificates have been issued by the CA right very very simple and remember in in the in this step where the client is validating the server certificate how do you know which server certificate to trust so by default Mist access assurance will get its own cert signed by your organization CA. So this is an automatically generated certificate authority for your Mist organization that is signing the certificate for access assurance authentication service.

You can optionally import your own certificate if you want to if you want clients to trust certificates issued by your organization right. For now, we will just use default search. Now the next step for us to complete our basic scenario we can go to organization auth policies by default you could see there is there no policies configured all the authentication requests will be implicitly denied so we'll need to create a rule to allow valid clients to connect. So click on add rule. We'll just say this is wireless EAP-TLS authentication and all we need is to say on the left hand side we are matching on certain criteria. User labels on the right hand side we're deciding what we want to do with this types of users. So here, we are saying we want to look at wireless users. These are predefined labels that that we have in access assurance by default and we want to match on the authentication type EAP-TLS meaning clients will use certificates at this point, that's really all you need to do.

The initial testing right your your policy says allow clients to connect if they match these two criterias and you know technically you would you would have been also able to assign VLANs. We can actually do that here as welL. So we want to assign a VLAN, how do we do that? We can create a label. We can create a label and let's say we want to assign a VLAN 750 let's just say it's going to be our corp VLAN the label type will be AAA attribute okay and the label value would be VLAN. So in this case, you want to assign VLAN 750 and now we if we click here oh now we have our new label showing up so what what this rule is going to do is if a client has a valid cert and it's a wireless client we will allow them to connect and we will assign them to VLAN 750. Very simple very easy let's say.

The next step is to configure our SSID, right? We'll go to Organization > WLAN Templates. We'll create a template we'll call it mist-secure-net i don't know create add WLAN. I'm going to use the same SSID name i'm going to configure it as 8.1x security actually we can also use WPA3 we can then scroll down under authentication service list. We don't need to configure radio servers anymore none of that all we have to do is say our authentication server is Mist Auth. That's it.

The last step is if we are doing dynamic VLAN assignment which we do in in our scenario we want to enable dynamic VLANs we'll say the VLAN type is standard and we'll just say that for now we will only allow VLAN 750 and if no VLAN is sent back from from access assurance, we'll just call it we'll just assign the client into default VLAN 1, that's it just enabling some filters as best practices. Click create our SSID is ready. The last thing for us is to assign this to our org so the template will get advertised on our app. We only have one side, so we can assign it to the org, otherwise you could have assigned the template to the side of your choosing. Hit save. Now our configuration is ready and we can now go ahead and test with a real client.

Create the authentication policies with Mist Access Assurance considering the same exact scenario with TLS users authenticating using certificates and TLS users authenticating using credentials. The first thing that we will do is we will import the root CA certificate so we can trust the certificates on our client signed by that CA. So we'll go to organization > access certificates and I'll click on add certificate authority.

I will go to my folder where I have all the pre-configured items ready. I'm going to copy my root CA cert, import it in here. It's the same cert we used with the other two vendors. It's now imported, it's decoded, we're good to go and good to proceed. We'll then go to organization authentication policies. Actually we go to identity providers first.

We need to configure an identity provider in here and unlike with ClearPass and ICE, we don't need to have a local AD on-prem. We would actually be able to talk to Okta as our identity provider to fetch the user group information to authenticate users and provide them with network access. So I will click on add IDP.

I will select this connector type as auth since we will use native API connector to talk to Okta. I will open my setup instructions since my Okta app has been pre-created. Same as AD for other providers so I'm going to take tenants. I'm going to select the auth type as Okta, paste the tenant ID. I'll take the client ID, paste it in here. I'll take the private key so we can authenticate ourselves to Okta.

Add it right there and finally I'll configure the ROPC API ID for TTLS authentication and it's secret. The last thing I will do is I will configure the domain name. So the domain name would actually tell us based on the user realm like when the user signs in as user at like in this case lab.mystify.com. We'll take that domain based on the domain. We'll talk to a respective IDP in our configuration so just give it a name called Okta. Click create. We have our IDP configured now.

The last step is to go to access authentication policies and create the two policies that we need based on our requirements. First, we will create a rule for certificate authentication. What we'll then do is in the match criteria on the left hand side we will use labels to match in certain conditions.

In our case, we need to match on wireless users that are using certificates or TTLS to authenticate and we also need it to match on the group employee that we will take from IDP. But as you can see by default we are not having any label associated with the group so what we can do is we can create a label right from that same place. We'll call it employee group.

We will select label type as directory attribute and the label value will be group and the actual value will be employee. Click create. We can now select this label on the left hand side. It shows up here as the directory attribute. Now we are matching on all these three conditions. Then on the right hand side we are deciding what we want to do with these types of users. By default we will allow access to the network but we also want to assign VLAN 750 and role corp. Again we need to create labels for that. So we'll go and create first corp VLAN label.

The label type will be AAA attribute and the value would be VLAN. I'll configure it as 750. I'll then create corp role attribute and I'll just configure it as corp. And then I'm going to create also labels for BYD VLAN and BYD role. So 751 and finally BYD role. Good to go.

So we can select corp VLAN and corp role. Now we'll create one more rule for our users that are doing TTLS based authentication. So we'll call it credential authentication and we'll match on wireless users that are doing TTLS and that they're also part of the same employee group.

And on the right hand side we'll assign them BYD VLAN and BYD role. At this point we can hit save and our authentication policy setup is done. The last thing is to create the actual WLAN template. So I'm going to go to WLAN templates. I'm going to create a new one. I'm going to call it MIST 802.1X. I'm going to click create.

Add a WLAN. Select security as 802.1X. And in this case we don't need to configure radio servers one by one. We don't need to add APs as radio clients. None of that is required. We'll just go and select MIST authentication as our authentication service. That's it. We'll then just go on and configure dynamic VLANs. It's the same two VLANs that we will be sending. So 750.751. Click create and just assign this template to the org.

Click save. At this point we should be able to test with our client devices. We have one laptop that's connected using a certificate. It got the role corp. We have a mobile device that connected using TTLS using username and password and got the role BYD. And now let's take a look deeper and look at the client insights.

What can we see with MIST access assurance here? So what you could see is in addition to the all the client events that are coming from the access point and that are showing the user experience, from the network perspective, you also see all the events coming from the NAC side of things as the client goes through the authentication and authorization process. So, first event is, okay, we're seeing the client certificate. We are grabbing all the metadata about the user certificate.

We see that the client trusted our server cert that's provided by the MIST authentication service. We'll then did a IDP lookup against Okta. And we got all the user group information from Okta. So we know now this user is part of all these user groups. And we see one of these groups is actually employee, which we needed to match on. And finally, when we look at the NAC client allowed access event, we're saying, okay, this client is good to go. It's allowed in the network. This is the VLAN that we are assigning from a NAC perspective. This is the user role that we are assigning from the NAC perspective.

And this is the authentication rule that hit during that process. So if we click on that link, it will actually go and highlight, this is the rule that this particular user hit during the auth process, right? Similarly, if we look at the mobile device, if we look at the client insights, we're now seeing that in this case, client trusted the service certificate, but instead of showing the client certificate, it actually did the IDP authentication using username and password credentials against Okta. Finally, we got the user role and group information from Okta.

And we've allowed client to access the network, assign a different VLAN 751 and different user group. But in this case, we are hitting a different authentication rule in our policy. So again, if we click on it, we're saying that particular user went through a different role.

Ahora su red está lista para autenticar clientes de forma segura mediante EAP-TLS. La nube de Juniper Mist verifica los certificados de cliente y concede acceso y autorización en función de la configuración de la política de autenticación.

Puede ver los clientes asociados en el portal de Juniper Mist en:

  • Seleccione Clientes > clientes cableados para ver los detalles del cliente
  • Seleccione Supervisar > niveles de servicio > información para ver los eventos del cliente.

Configurar la autenticación basada en certificados (EAP-TLS) para redes cableadas

Para configurar la autenticación basada en certificados para una red cableada mediante el portal de Juniper Mist:

  1. Importe una entidad emisora de certificados (CA) raíz de confianza. Juniper Mist usa el certificado generado por la CA como certificado de servidor. Consulte Usar certificados digitales para obtener más información.
  2. Crear políticas de autenticación.
    1. En el menú izquierdo del portal de Juniper Mist, seleccione Organización > Access >Políticas de autenticación.
      Cree una nueva regla para permitir el acceso a clientes con certificados válidos. Consulte Configurar directiva de autenticación.
      Defina una política de autenticación con los siguientes detalles. Seleccione la opción requerida para cada campo de las respectivas listas desplegables.
      1. Nombre: escriba un nombre para la política.
      2. Criterios de coincidencia: seleccione EAP-TLS.
      3. Directiva: seleccione Permitido.
      4. Directivas asignadas: seleccione Acceso a la red permitido.
  3. Configure el conmutador.
    1. En el menú izquierdo del portal de Juniper Mist, seleccione Organization > Wired > Switch Templates.

      En la página Plantillas de conmutador, haga clic en una plantilla existente para abrir su página de configuración o haga clic en Crear plantilla en la esquina superior derecha de la página para crear una plantilla.

    2. En la sección Servidores de autenticación, seleccione Mist Auth como servidor de autenticación.
    3. Desplácese hacia abajo hasta la sección Perfil de puerto y seleccione:
      • En el campo Modo, seleccione Acceso.
      • Habilite la opción Usar autenticación dot1x.
    4. Asigne el perfil de puerto a cada puerto del conmutador en el que los clientes cableados conectados requieran acceso a la red.

      En la sección Select Switches Configuration (Seleccionar configuración de conmutadores) de la ficha Port Configuration (Configuración de puertos), haga clic en Add Port Range (Agregar rango de puertos ) para asociar un perfil de puerto a un puerto.

      Figura 1: Asignar perfil de puerto a rangos de puertos en un conmutador Assign Port Profile to Port Ranges on a Switch
    5. Haga clic en Guardar.

Para conocer el procedimiento sobre cómo aprovechar los atributos de certificado para crear una directiva de autenticación, vea el siguiente vídeo:

Authentication policies a little bit. How can we use them in combination with certificates alone? What we will do is we'll create another example, right? So far we've just authenticated the user that used the test certificate we've created before. What if we want to differentiate between different types of users just by looking at certificates? So what I have done is I've created another test user certificate that has a different common name, that has different attributes in the subject that we will use to differentiate between our original test user and the new one.

So what I will do is I will create a label matching on certificate attribute and I will call this my new user one cert because our test user, where is it, the common name is different on the certificate. It's user one at different domain name, right? So we'll take a look at the certificate attribute and we'll match on the common name of this certificate. So in this case, we want to do a full match and just let's say we want to say if this certificate is being used, then we want to assign these users or this user into a different VLAN.

Let's just say other VLAN. So label value VLAN, let's say VLAN one. So I'm going to create another rule. I'm going to say special user or special cert, I should say, select wireless, select TLS. But in this case, we are also going to match on the certificate attribute that we've just configured. So all three conditions here must match in order for this specific policy to hit, right? And when it hits, we will assign the user into a different VLAN.

So we're going to hit save. Now we have two policy rules. Now let's connect the device. I've already configured my iPad with this new certificate. Okay. Now the iPad is connected to a different VLAN. Okay. We see that this is a new user, a different username connected to the same SSID, just assigned to a different VLAN ID. So if we click on it, we'll look at the insights. Let's see if we have new events in there just coming in. Okay. Now we are seeing the new set of events coming in.

We're seeing the new certificate. With a different common name in assert, this is the attribute we've been matching on. And now we see the new rule hit. And in this case, this specific user, this specific client went and hit a different rule. This is how we can make policies just by looking at the certificate with nothing else at our hands. And this is just an example. You could look at part of the subject in the certificate. You could look at the issuers if you have different CAs issuing certificates for other users. You could look at virtually any certificate attribute that you want to look at and use that as the differentiation factor in your access policies.

Ahora su red puede usar EAP-TLS para autenticar clientes de forma segura. La nube de Juniper Mist verifica los certificados de cliente y concede acceso y autorización en función de la configuración de la política de autenticación.

Puede ver los clientes asociados en el portal de Juniper Mist.

  • Seleccione Clientes > Clientes cableados para ver los detalles del cliente
  • Seleccione Supervisar > niveles de servicio > información para ver los eventos del cliente.

Vea el siguiente vídeo para obtener información sobre cómo configurar un dispositivo cliente de Windows para la autenticación EAP-TLS para pruebas o uso de laboratorio:

Configure a Windows device to use a certificate to authenticate-- again, still talking about the lab use cases where you need to man ually install a certificate, manually connect a device to the network . So we have our test lab client certificate with the CA cert embedded. We have our Mist certificate we've exported from the Mist dashboard previously.

So we're going to take those two files. We're going to copy them. We'll move over to our Windows machine. We're just going to paste those two files. So now we will install the client certificate. It is going to be installed as a user certificate. Click Next, put in the import password, confirm installation, and then install the Mist certificate as the trusted certification authority. So we could do-- here, we're going to install it as a trusted certification authority. Next click Finish. And we have installed our CA cert.

Now the next step is to configu re a profile on the Windows device to connect to our SSID using EAP-TLS using our client certificates. So now - by the way, if we want to validate that the client certificate has installed, we could sea rch for certificate manager, go to personal certificates. We now have our test certificate installed that we've created in th e previous step, assigned by our lab CA. You could see it right there.

So now we will create a manual network profile. So we'll go to Control Panel. We'll go to Network and Sharing Center. We'll click on Setup a new connection or network. We'll select Manually connect to a wireless network. We'll put in our SSID name. Security type will be WPA3 enterprise, right? Don't start this connection automatically just yet.

Let's click Next. Change connection settings, that's important. We'll then go to Security. So we'll change the default PIP for smart card or other cert EAP-TLS. We'll go to Settings. We'll then select the Mist certificate we've just imported. This is for the client to trust the Mist authentication service. Again, this is about the mutual authentication piece. We will then click OK. We'll go to Advanced Settings. And we'll use user authentication, because we have a user certificate, in our case. Click OK. Click OK. Click Close. We'll go select Turn on Wi-Fi. We'll connect to our Mist securenet SSID. We'll select our certificate. That's the certificate we've imported. Click OK. And our client device is connected.

Vea el siguiente vídeo para obtener información sobre cómo configurar un dispositivo cliente Android para la autenticación EAP-TLS para pruebas o uso de laboratorio:

Let's take a look how we configure an Android device, in this particular case this is a Pixel 7 device, with our certificate. So we have the same two certs that we need to copy over to the Android device, either through USB or any other way. You'll then go to Settings. You'll then go to Security and Privacy. You'll then need to install those certificates. We will go to encryption and credentials. Install a certificate. Always select Wi-Fi certificate.

First, select the mist certificate. Just call it mistcert. Click OK. Then install the user certificate, the test-lab-client that we have created before. That is the client - oh, that's the password. Should have read that. Desktop client. Installed as well, great.

Final step is to go to Netw ork settings. Go to internet. We will find our SSID we are trying to connect to. We'll select the EAP method as TLS. CA certificate will be mistcert, right there. Now, Domain is the name of the server common name. In the case of Mist default cert, that's off auth.mist.com. The user certificate will be test-lab-client. And identity is your common name of the certificate, basically, your username. In my case, that's my email address. I'm going to click Connect. And now you see my client disconnected using a certificate that we'll just load it.