Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

WPA2 Enterprise and iOS8

Seems after updating to iOS 8, I can no longer connect to my companies Cisco WPA2 Enterprise wireless network. This worked in iOS 7.

iPhone, iOS 8

Posted on Sep 17, 2014 10:40 AM

Reply
Question marked as Best reply

Posted on Sep 17, 2014 10:59 AM

Thanks for sharing.


Are you asking a question?

45 replies

Sep 24, 2014 8:13 AM in response to doxman13

We have the same error at our company. After updating to IOS 8 our staff and my Apple Iphone 4S / Iphone 5 / Ipad 2 with IOS 8 no longer connect to our internal network through HP wireless controller wish authenticates to our company server.


We also use wpa2 enterprise at the wireless controller at our switch.


No official annoncement from Apple yet!


What I can gather is the LEAP authenticate is now disablet in IOS 8 =(

Sep 24, 2014 8:56 AM in response to chochhold

update done on the iphone 4s (downloaded the update over wpa2-enterprise authenticated wifi)! now it is not able to connect - same error as with ipad 3, ipad air and iphone 5 (it would not have made any sense to me if there would be a difference between the devices, because they all use the same libraries).


this is the error log from our radius:


Authentication Details:

Connection Request Policy Name: Secure Wireless Connections

Network Policy Name: network mobile wifi

Authentication Provider: Windows

Authentication Server: xxx013.xx.xx

Authentication Type: EAP

EAP Type: Microsoft: Smart Card or other certificate

Account Session Identifier: -

Logging Results: Accounting information was written to the local log file.

Reason Code: 23

Reason: An error occurred during the Network Policy Server use of the Extensible Authentication Protocol (EAP). Check EAP log files for EAP errors.

Sep 25, 2014 2:06 AM in response to beejybone

Hi everybody,


I've created the EAP-TLS authentication in my company. We manage the certificates and the wi-fi profiles via an Airwatch MDM.


- With iOS8 and the MDM Wi-Fi profile, we can't connect to the network -> Authentication error on the phone side / EAP-TLS hanshake failed on the anchor side.


- With iOS8 and the Wi-Fi set up manually (after the installation of the certificate) -> It works !


Last weird case : With iOS8 and the MDM Wi-Fi profile, I create a new Wi-Fi on the phone with the same SSID, etc... -> it works until the wifi be lost or shut.



My conclusion :

I think the EAP-TLS works (I can create it manually), but iOS8 cannot connect if there a configuration profile.



Aurélien, France

Sep 25, 2014 6:00 AM in response to DarvADM

@DarvADM - That is very interesting because I found the exact same thing, but with Maas360. It will not connect when the Wifi profile is pushed by Maas360, but once the device certificate is installed, we can set up the wifi manually using the same SSID and EAP-TLS and then it connects. We do have to accept the Cisco ACS cert for some reason, the first time it connects, even though the pushed wifi profile was supposed to be set up to trust the CA and the ACS cert. I'm thinking that Maas360 and Airwatch and maybe other MDM's need to push the wifi profile a little differently, and maybe related to trusting CA cert. What are you using for Radius/Authentication server?

Sep 25, 2014 7:43 AM in response to DarvADM

this is definitly no NPS issue! if you have to acknowledge the root certificate depends if you push the root cert to be trusted with your MDM. once you trust the connection (during the first connection) it works. so the certificate just needs to be trusted on your device, otherwise the client does not communicate with the radius at all. if you see the log on your radius the connection to the radius is fine, but the parameters are incorrect.

Sep 26, 2014 8:55 AM in response to beejybone

iOS 8 is more strict about the configuration of RADIUS server trust in iOS 8 than in iOS 7. In iOS 7, it was possible to create a Wifi configuration profile that sets trust to the RADIUS server improperly. In that case, the user could manually join the network and get prompted to trust the RADIUS server certificate. In iOS 8, if using a configuration profile to configure WiFi, you must configure trust to the RADIUS server properly. Apple has a knowledge base article which explains how to configure RADIUS server trust when using TLS, TTLS, or PEAP: OS X Server: How To Configure RADIUS Server Trust in Configuration Profiles when using TLS, TTLS, or PEAP


If you don't have a Mac, you can get a WiFi debug logging profile from Apple here: https://developer.apple.com/bug-reporting/ios/wi-fi/


After installing the profile, join the network manually by going to Settings > WiFi > Other. Manually enter the details for the network, including Security and Mode and then join the network. In most cases, it will successfully join and you will be prompted to trust the RADIUS server certificate. Next, follow the instructions in the Apple developer link above to sync the debug logs to the device. Locate the log files that begin with com.apple.networking.eapol.log. Now, follow the instructions in the Apple kb article to locate the "TLSServerCertificateChain" key and you will see the certificates that are presented by the RADIUS server. Follow the directions in that article to extract those certificates and then add them to your WiFi configuration profile and you'll be in business.


-wifigood

Oct 6, 2014 11:55 AM in response to wifigood

The post from wifigood is what helped resolve it for us. Thank you. I went through the whole process described in the Apple Kb of extracting the server certificate that was presented using the debug profile and syncing to itunes and converting PEM to CER only to find it was the same certificate that I had loaded on the radius server (ACS) in the first place. And it still didn't work, until I looked more closely at the apple KB that was posted above and it said to make sure you trust exactly the "Common Name" of the radius cert. And if you have more than one radius server you can use a wildcard with a star - i.e. *.company.comp.corp (replaced our domain name here). And then we found out that it worked without uploading and pushing the separate radius server certificates when we tried connecting to our other ACS servers. So in other words, the only thing we needed this whole time was to enter *.company.comp.corp in the field in the Maas360 wifi profile that said "Trusted Server Certificate Name" or something like that. If you're not sure what the IOS 8 device is using as the trusted server name, look at the EAPOL debug as described in the Apple KB and look for <key>TLSTrustedServerNames</key> and it will show what it is using. Then compare that to the CN in the radius certificate.

Oct 7, 2014 11:55 AM in response to beejybone

Really? something called WPA2 "Enterprise" that does not actually work in the enterprise?!?! Gosh who made that?

I wonder where they actually tested it in the enterprise, a teenager's bedroom?

Are the employee in the QA department former employees of Target or Home Depot's IT security?


Sorry for all the negativity, but I have a bunch pampered and blissfully ignorant users who are telling me that "Wi-Fi is not working" and expecting me to fix the Wi-Fi (and not their iPucks). Can you imagine how happy I was to find out that the students and teachers have "fixed it" by turning on all their Wi-Fi hotspots on their phones? That killed it for all the 2.4Ghz clients, including our non-iOS corporate machines.

WPA2 Enterprise and iOS8

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.