<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Problem: EAP-TLS failed SSL/TLS handshake because of an  in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240193#M140101</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the delay in the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It took 2 months to Cisco TAC to solve the problem. At the end there were a bug with the version 1.1.4. When I tried to export the certificate The GUI restarts it self. &lt;/P&gt;&lt;P&gt;But the real problem was the conversion of the certificate form .pfx to .pem . It seems that the version of the OpenSSL wasn´t works properly. The good one (for me) is the version 0.9.8k.&lt;/P&gt;&lt;P&gt;It was a wierd problem because the same certificate that works with an ACS server wasn´t works with the ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 02 Oct 2013 07:42:32 GMT</pubDate>
    <dc:creator>jrodriguez</dc:creator>
    <dc:date>2013-10-02T07:42:32Z</dc:date>
    <item>
      <title>ISE Problem: EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240185#M140093</link>
      <description>&lt;P&gt;Hello, I´m stucked with this problem for 3 weeks now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´m not able to configure the EAP-TLS autentication. &lt;BR /&gt;In the "Certificate Store" of the ISE server I have Installed the Root, policy and the Issuing certificates as "trust for client authentication",and in the Local store I have a certificate issuing for the same issuing authority which sign the thw client ones. &lt;BR /&gt;The ISE´s certificate has been issued with the "server Authentication certificate" template.&lt;BR /&gt;The clients have installed the certificates&amp;nbsp; also the certificate chain.&lt;BR /&gt;When I try to authenticate the wireless clients I allways get the same error: "&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication failed : 12514 EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain"&lt;BR /&gt;and "OpenSSLErrorMessage=SSL alert&lt;BR /&gt;code=0x230=560 ; source=local ; type=fatal ; message="Unknown CA - error self-signed certificate in chain",OpenSSLErrorStack=&amp;nbsp; 1208556432:error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned:s3_srvr.c:2720"&lt;BR /&gt;I don´t know what else can I do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you &lt;BR /&gt;Jorge &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:27:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240185#M140093</guid>
      <dc:creator>jrodriguez</dc:creator>
      <dc:date>2019-03-11T03:27:55Z</dc:date>
    </item>
    <item>
      <title>ISE Problem: EAP-TLS failed SSL/TLS handshake because of an unkn</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240186#M140094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What CA are you using and how many intermediate certs are in the chain?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 21:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240186#M140094</guid>
      <dc:creator>Richard Atkin</dc:creator>
      <dc:date>2013-05-28T21:16:09Z</dc:date>
    </item>
    <item>
      <title>ISE Problem: EAP-TLS failed SSL/TLS handshake because of an unkn</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240187#M140095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the Below are the certificate details&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE Certificate Signed by XX-CA-PROC-06&lt;/P&gt;&lt;P&gt;User PKI Signed by XX-CA-OTHER-08&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ISE certificate Store i have the below certificates&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;XX-CA-OTHER-08 signed by XX-CA-ROOT-04&lt;/P&gt;&lt;P&gt;XX-CA-PROC-06 signed by XX-CA-ROOT-04&lt;/P&gt;&lt;P&gt;XX-CA-ROOT-04 signed by XX-CA-ROOT-04&lt;/P&gt;&lt;P&gt;ISE certificate signed by XX-CA-PROC-06&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled - 'Trust for client authentication' on all three certificates&lt;/P&gt;&lt;P&gt;this is unchecked - 'Enable Validation of Certificate Extensions (accept only valid certificate)'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i check the certificates of current user in the Client PC this is how it shows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;XX-CA-ROOT-04 is listed in Trusted root Certification Authority&lt;/P&gt;&lt;P&gt;and XX-CA-PROC-06 and XX-CA-OTHER-08&amp;nbsp; are in Intermediate Certificate Authorities&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 05:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240187#M140095</guid>
      <dc:creator>vinupeter_19</dc:creator>
      <dc:date>2013-05-29T05:37:48Z</dc:date>
    </item>
    <item>
      <title>ISE Problem: EAP-TLS failed SSL/TLS handshake because of an unkn</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240188#M140096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure about ISE, but other Cisco WLAN products have a limitation whereby they only support one intermediate cert, could be something like that? Do you have access to an alternative PKI that has a shorter chain that you can use for testing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 06:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240188#M140096</guid>
      <dc:creator>Richard Atkin</dc:creator>
      <dc:date>2013-05-29T06:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Problem: EAP-TLS failed SSL/TLS handshake because of an</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240189#M140097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank for your answer RikJonAtk, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you have guessed, my certificate chain has a Root, then a Policy, then a Issuing and at last the certificate. I´ve tested with a 2 level PKI (root and Issuing) and the result was similar.&lt;/P&gt;&lt;P&gt;The same certificate with the same 3 tier&amp;nbsp; structure works in a ACS server for a Laptop but not for an iPad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------- Edit-----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, no problem with the ipad neither. It needs ro reset the network settings. So there is no problem to authenticate clients with ACS and a 3 tier PKI structure but the same certificates doesn´t works in ISE.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 07:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240189#M140097</guid>
      <dc:creator>jrodriguez</dc:creator>
      <dc:date>2013-05-29T07:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Problem: EAP-TLS failed SSL/TLS handshake because of an</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240190#M140098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I´ve open a TAC because a possible bug in 1.1.4 version.&lt;/P&gt;&lt;P&gt;One of the symtoms is this: When I try to export a certificate from the "local Certificates" the service application ISE is reloaded (you could see form the console).&lt;/P&gt;&lt;P&gt;This bug should not affect in the primary problem, the EAP-TLS authentication, maybe&amp;nbsp; the 3 tier certificate&amp;nbsp; chain is the problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jun 2013 07:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240190#M140098</guid>
      <dc:creator>jrodriguez</dc:creator>
      <dc:date>2013-06-10T07:53:02Z</dc:date>
    </item>
    <item>
      <title>ISE Problem: EAP-TLS failed SSL/TLS handshake because of an unkn</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240191#M140099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi &lt;SPAN style="font-size: 10pt;"&gt;Jorge,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Did you get anything back from Cisco on this? I have ran into a similiar issue. it would be interesting to know if this is a bug or misconifg on my side!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 14:24:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240191#M140099</guid>
      <dc:creator>Brian McPhillips</dc:creator>
      <dc:date>2013-08-21T14:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Problem: EAP-TLS failed SSL/TLS handshake because of an</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240192#M140100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran into an issue today where my client machines had multiple certificates with the same CN, even through we lined up the certs that were installed on the client by validate serial numbers. We ran a packet capture for the radius transaction and found that the client was sending a different intermediate and root then what was used in the chain for the client cert.....really strange and odd but this in our case wasnt an ise issue.&lt;BR /&gt;&lt;BR /&gt;Make sure you can go through the certificate settings on the client and validate that there arent any duplicate certs with the same CN that are present in the client's chain.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 06:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240192#M140100</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-08-22T06:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Problem: EAP-TLS failed SSL/TLS handshake because of an</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240193#M140101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the delay in the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It took 2 months to Cisco TAC to solve the problem. At the end there were a bug with the version 1.1.4. When I tried to export the certificate The GUI restarts it self. &lt;/P&gt;&lt;P&gt;But the real problem was the conversion of the certificate form .pfx to .pem . It seems that the version of the OpenSSL wasn´t works properly. The good one (for me) is the version 0.9.8k.&lt;/P&gt;&lt;P&gt;It was a wierd problem because the same certificate that works with an ACS server wasn´t works with the ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 07:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240193#M140101</guid>
      <dc:creator>jrodriguez</dc:creator>
      <dc:date>2013-10-02T07:42:32Z</dc:date>
    </item>
    <item>
      <title>I know this is an old thread</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240194#M140102</link>
      <description>&lt;P&gt;I know this is an old thread but do you happen to have the BUG ID? I have a client that just contacted me that is running ISE 1.1.4 and is having exactly the same issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 00:14:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240194#M140102</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-01-28T00:14:12Z</dc:date>
    </item>
    <item>
      <title>Hi Neno,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240195#M140103</link>
      <description>&lt;P&gt;Hi Neno,&lt;/P&gt;
&lt;P&gt;Are you talking about this defect:&lt;/P&gt;
&lt;P&gt;CSCud00831&amp;nbsp;&amp;nbsp;&amp;nbsp; eap-tls authentications start failing after a while decrypt error&lt;/P&gt;
&lt;P&gt;~ Jatin&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 00:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240195#M140103</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-01-28T00:23:44Z</dc:date>
    </item>
    <item>
      <title>No, the customer of mine that</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240196#M140104</link>
      <description>&lt;P&gt;No, the customer of mine that I was helping is getting the exact same error that is in this thread:&lt;/P&gt;
&lt;H2 itemprop="name"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;The strange part is that they are only getting this error when trying to authenticate clients with certificates from their new Certificate Authority. Clients that have certificates from the old certificates authority are working fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the details:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;ISE:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Version - 1.1.3 - Patch 8&lt;/P&gt;
&lt;P&gt;EAP Certificate - Issued from the old Certificate Authority (CA-1)&lt;/P&gt;
&lt;P&gt;Certificate Store - Has the Root Certificates from both the old certificate authority (CA-1) and from the new one (CA-2). Both of them are set to be trusted for client authentications.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Clients&lt;/STRONG&gt;&lt;/SPAN&gt;:&lt;/P&gt;
&lt;P&gt;Version - Windows 7 - SP1&lt;/P&gt;
&lt;P&gt;EAP Certificate - Issued from the new Certificate Authority (CA-2)&lt;/P&gt;
&lt;P&gt;Certificate Store - Has both root certificates from the old (CA-1) and new (CA-1) certificate authorities.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The supplicant is set to trust both CAs&lt;/P&gt;
&lt;P&gt;While doing a bug scrub I ran across this one that I think my customer might be facing:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCtq31131"&gt;https://tools.cisco.com/bugsearch/bug/CSCtq31131&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 02:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240196#M140104</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-01-28T02:48:36Z</dc:date>
    </item>
    <item>
      <title>I'd suggest to test windows</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240197#M140105</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I'd suggest to test windows client with:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;1.] set supplicant to trust new CA only.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;2.] Supplicant cert store should have client cert issues by a new CA only.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;~ Jatin&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Jan 2016 17:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240197#M140105</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-01-31T17:46:40Z</dc:date>
    </item>
    <item>
      <title>I was doing a few tests today</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240198#M140106</link>
      <description>&lt;P&gt;I was doing a few tests today and I got the same error on ISE running 1.4.0.253 patch 6. The workaround suggested on the BUG = CSCtq31131 did not work.&lt;/P&gt;
&lt;P&gt;During my tests I basically removed the CA certs from the Trusted Certificates List, and imported them back into ISE and after that, the EAP-TLS AUTHC did not work even though on each certificate I checked the box located at:&lt;/P&gt;
&lt;P&gt;Trusted Certificates List --- &amp;gt; CA Certificate --- &amp;gt; USAGE --- &amp;gt; Trusted For: --- &amp;gt; Trust for authentication within ISE&lt;/P&gt;
&lt;P&gt;AND save the changes. Once I did this for each Trusted cert (Root &amp;amp; Intermediate), I stopped and restarted the ISE Services with no luck.&lt;/P&gt;
&lt;P&gt;Then I decided to start playing with the Certs individually and checked first the box: "TRUST for client authentication and Syslog" (sublevel of the path indicated above) for the Intermediate CA Cert of the chain (ISE Trusted Certificate list). Saved the changes and it did not work (I did not initialize the ISE Services).&lt;/P&gt;
&lt;P&gt;Finally I repeated the same steps for the Root CA Cert of the chain, checked the sublevel box as mentioned in the previous paragraph and the EAP-TLS worked fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will ask Cisco TAC and BU what is the difference between the "AUTHENTICATION WITHIN ISE" and the&amp;nbsp;"FOR CLIENT AUTHENTICATION AND SYSLOG" boxes for EAP Authentication.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 22:27:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/2240198#M140106</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2016-08-02T22:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: I was doing a few tests today</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/3732824#M140107</link>
      <description>&lt;P&gt;I had the same issue and resolved by editing the root certificate of the CA and choosing all options including client and syslog as mentioned by Camacho in the previous post.&lt;/P&gt;
&lt;P&gt;Thanks, OA&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 14:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/3732824#M140107</guid>
      <dc:creator>o.adames</dc:creator>
      <dc:date>2018-10-25T14:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: I was doing a few tests today</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/3904752#M140108</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your response. we have a mdm onboarded iphone which is configured for EAP-TLS. we are getting this error even though the options you mentioned are enabled for CA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are getting this error "&lt;SPAN&gt;EAP-TLS failed SSL/TLS handshake after a client alert"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Aravind.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 17:29:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-problem-eap-tls-failed-ssl-tls-handshake-because-of-an/m-p/3904752#M140108</guid>
      <dc:creator>aravikumar</dc:creator>
      <dc:date>2019-08-07T17:29:54Z</dc:date>
    </item>
  </channel>
</rss>

