RCA-2026-03-09-001: Fix Applied
Resolution
nmcli con mod "Domus-Wired-EAP-TLS" \
ipv4.method manual \
ipv4.addresses "10.50.1.106/24" \
ipv4.gateway "10.50.1.1" \
ipv4.dns "10.50.1.90,10.50.1.91"
nmcli con up "Domus-Wired-EAP-TLS"
Verification
ip -4 addr show enp130s0 | awk '/inet/{print $2}'
# Output: 10.50.1.106/24
cat /etc/resolv.conf
# Output: nameserver 10.50.1.90, nameserver 10.50.1.91
CLI Mastery: nmcli Patterns
Connection Inspection
# List all connections with status
nmcli -t -f NAME,UUID,TYPE,DEVICE,STATE con show
# Show specific connection
nmcli con show "Domus-Wired-EAP-TLS"
# Filter to 802.1X and IPv4 settings
nmcli con show "Domus-Wired-EAP-TLS" | grep -E "802-1x|ipv4\."
# Show only 802.1X settings
nmcli -g 802-1x con show "Domus-Wired-EAP-TLS"
EAP-TLS Connection Creation
nmcli con add \
type ethernet \
con-name "Domus-Wired-EAP-TLS" \
ifname enp130s0 \
ipv4.method manual \
ipv4.addresses "10.50.1.106/24" \
ipv4.gateway "10.50.1.1" \
ipv4.dns "10.50.1.90,10.50.1.91" \
802-1x.eap tls \
802-1x.identity "modestus-razer.inside.domusdigitalis.dev" \
802-1x.ca-cert "/etc/ssl/certs/DOMUS-ROOT-CA.pem" \
802-1x.client-cert "/etc/ssl/certs/modestus-razer-eaptls.pem" \
802-1x.private-key "/etc/ssl/private/modestus-razer-eaptls.key" \
802-1x.private-key-password-flags 4
Modify Existing Connection
# Change IP address
nmcli con mod "Domus-Wired-EAP-TLS" ipv4.addresses "10.50.1.107/24"
# Add second DNS (append with +)
nmcli con mod "Domus-Wired-EAP-TLS" +ipv4.dns "10.50.1.91"
# Replace all DNS
nmcli con mod "Domus-Wired-EAP-TLS" ipv4.dns "10.50.1.90,10.50.1.91"
# Set autoconnect priority (higher = preferred)
nmcli con mod "Domus-Wired-EAP-TLS" connection.autoconnect-priority 100
Debugging EAP-TLS
# Enable debug logging
sudo nmcli general logging level DEBUG domains ALL
# Watch for connection changes
nmcli monitor
# Check wpa_supplicant logs
journalctl -u wpa_supplicant -f --since "5 minutes ago"
# EAP status via wpa_cli
wpa_cli -i enp130s0 status | grep -E "EAP|wpa_state|key_mgmt"
# Return to normal logging
sudo nmcli general logging level INFO domains DEFAULT
CLI Mastery: Certificate Inspection
# Get certificate paths from connection
CERT=$(nmcli -g 802-1x.client-cert con show "Domus-Wired-EAP-TLS")
KEY=$(nmcli -g 802-1x.private-key con show "Domus-Wired-EAP-TLS")
CA=$(nmcli -g 802-1x.ca-cert con show "Domus-Wired-EAP-TLS")
# Certificate expiry check
openssl x509 -in "$CERT" -noout -dates
# Days until expiry (30-day warning)
openssl x509 -in "$CERT" -noout -checkend $((86400*30)) && \
echo "Valid for 30+ days" || echo "EXPIRES WITHIN 30 DAYS"
# Validate certificate chain
openssl verify -CAfile "$CA" "$CERT"
# Check key matches certificate
openssl x509 -in "$CERT" -noout -modulus | openssl md5
openssl rsa -in "$KEY" -noout -modulus | openssl md5
# Both should output same hash
CLI Mastery: ip Command
# Show all IPv4 addresses with interface
ip -4 -o addr show | awk '{print $2, $4}'
# Show default gateway
ip route show default | awk '{print $3}'
# Show route to specific destination
ip route get 10.50.1.1
# ARP table
ip neigh show | awk '{print $1, $5}' | column -t
# Full network status one-liner
echo "IP: $(ip -4 -o addr show enp130s0 | awk '{print $4}')" && \
echo "GW: $(ip route show default | awk '{print $3}')" && \
echo "DNS: $(grep nameserver /etc/resolv.conf | awk '{print $2}' | tr '\n' ' ')"
CLI Mastery: Network Diagnostics
# Connectivity check
for h in 10.50.1.1 10.50.1.90 8.8.8.8; do
ping -c1 -W1 $h &>/dev/null && echo "$h: OK" || echo "$h: FAIL"
done
# DNS resolution test (both servers)
for dns in 10.50.1.90 10.50.1.91; do
echo -n "$dns: "
dig +short vault-01.inside.domusdigitalis.dev @$dns
done
# Interface errors and drops
ip -s link show enp130s0 | awk '/RX:|TX:|errors/{print}'
# Listen for EAP traffic
sudo tcpdump -i enp130s0 -c 10 'ether proto 0x888e'
Current Configuration
| Setting | Value |
|---|---|
Connection Name |
Domus-Wired-EAP-TLS |
Interface |
enp130s0 |
IP Address |
10.50.1.106/24 |
Gateway |
10.50.1.1 |
DNS Servers |
10.50.1.90, 10.50.1.91 |
EAP Method |
TLS |
Identity |
modestus-razer.inside.domusdigitalis.dev |
CA Certificate |
/etc/ssl/certs/DOMUS-ROOT-CA.pem |
Client Certificate |
/etc/ssl/certs/modestus-razer-eaptls.pem |
Private Key |
/etc/ssl/private/modestus-razer-eaptls.key |