Linux Research: Objectives & Technical Requirements
Objective
Enable Linux workstations in the research department with full 802.1X EAP-TLS authentication, including:
-
Certificate-based authentication (EAP-TLS)
-
Dynamic ACL (dACL) enforcement from ISE
-
UFW firewall integration for local enforcement
Current Blocker
Certificate "password required" issue with nmcli
When configuring EAP-TLS via NetworkManager/nmcli, the system prompts for a certificate password even when the private key is unencrypted or password is provided.
Status: Fix documented but needs implementation and testing.
Technical Requirements
Certificate Configuration
# Certificate files required
/etc/ssl/certs/client-cert.pem # Client certificate
/etc/ssl/private/client-key.pem # Private key (0600 permissions)
/etc/ssl/certs/ca-chain.pem # CA trust chain
NetworkManager 802.1X Profile
nmcli connection add \
type 802-3-ethernet \
con-name "wired-eaptls" \
802-1x.eap tls \
802-1x.identity "workstation@inside.chla.org" \
802-1x.client-cert /etc/ssl/certs/client-cert.pem \
802-1x.private-key /etc/ssl/private/client-key.pem \
802-1x.ca-cert /etc/ssl/certs/ca-chain.pem
ISE Policy Requirements
| Component | Configuration |
|---|---|
Authentication Policy |
EAP-TLS with certificate authentication profile |
Authorization Policy |
Linux_Research identity group → dACL + VLAN |
dACL |
Permit DNS, NTP, AD; permit research resources; deny all else |
Certificate Authentication Profile |
Match SAN or CN to endpoint identity |