<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PEAP strong machine authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986810#M180073</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see your answers in line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some questions regarding PEAP authentication.&amp;nbsp; Specifically&amp;nbsp; how&amp;nbsp; Machine Authentication works and how it is secured. It seems that&amp;nbsp; if I have enabled Machine Authentication in my network, every wane&amp;nbsp; who&amp;nbsp; knows PC&amp;nbsp; domain name can access network, is it true? &lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is not true, there is much more to machine authentication then just knowing your domain name. For machine authentication to occur, a computer must be joined to the domain using an admin account. The machine credentials are aquired dynamically (they are not set by any administrator or user) through kerberos and with default settings usually change every 30 days.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Here is what I mean “ Machine Authentication allows your PC to connect&amp;nbsp; to the network by authenticating as "Computer" before a legitimate user&amp;nbsp; logs in. This allows a machine to obtain group policies just like it was&amp;nbsp; connected to a wired network and this is a unique feature of the&amp;nbsp; Windows Client.”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Yes the main purpose of machine authentication to allow machine GPO to execute and give the computer network access during the bootup process. When a user authenticates, the supplicant will not allow any traffic flow until it receives an eap-success for the user transaction.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get this from &lt;A href="http://www.techrepublic.com/article/ultimate-wireless-security-guide-manual-peap-deployment-for-windows-wireless-client/6148574" rel="nofollow"&gt;http://www.techrepublic.com/article/ultimate-wireless-security-guide-manual-peap-deployment-for-windows-wireless-client/6148574&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So&amp;nbsp; I was looking&amp;nbsp; on ACS logs and it seems that&amp;nbsp; PC just sent it’s domain&amp;nbsp; name&amp;nbsp; to ACS, and it authenticates computer&amp;nbsp; by its name.After this&amp;nbsp; computer have access to network.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The machine should have sent its computer credentials not the domain name (format is computername.domain.com).&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So could you please tell me how can I implement strong machine&amp;nbsp; authentication without going&amp;nbsp; EAP-TLS way ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Machine authentication via PEAP is usually the easiest way to authenticate machines to the network. It uses mschapv2 which is a hashing algorithm used between the client and the domain without sending the password.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;One more thing about using Machine Access Restrictions. The cisco anyconnect client is going to support eap-chaining in an upcoming release, this a feature that will allow you to set the order of eap authentication when a workstation joins the network. So you will have the ability to fire a machine authentication request followed by user authentication referenced in this article - &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2150542" rel="nofollow"&gt;https://supportforums.cisco.com/thread/2150542&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 05 Aug 2012 21:58:46 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2012-08-05T21:58:46Z</dc:date>
    <item>
      <title>PEAP strong machine authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986807#M179937</link>
      <description>&lt;P&gt;Hello there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some questions regarding PEAP authentication.&amp;nbsp; Specifically how&amp;nbsp; Machine Authentication works and how it is secured. It seems that if I have enabled Machine Authentication in my network, every wane&amp;nbsp; who knows PC&amp;nbsp; domain name can access network, is it true ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Here is what I mean “ Machine Authentication allows your PC to connect to the network by authenticating as "Computer" before a legitimate user logs in. This allows a machine to obtain group policies just like it was connected to a wired network and this is a unique feature of the Windows Client.”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get this from &lt;A href="http://www.techrepublic.com/article/ultimate-wireless-security-guide-manual-peap-deployment-for-windows-wireless-client/6148574" target="_blank"&gt;http://www.techrepublic.com/article/ultimate-wireless-security-guide-manual-peap-deployment-for-windows-wireless-client/6148574&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I was looking&amp;nbsp; on ACS logs and it seems that&amp;nbsp; PC just sent it’s domain name&amp;nbsp; to ACS, and it authenticates computer&amp;nbsp; by its name.After this computer have access to network.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So could you please tell me how can I implement strong machine&amp;nbsp; authentication without going&amp;nbsp; EAP-TLS way ?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986807#M179937</guid>
      <dc:creator>ngtransge</dc:creator>
      <dc:date>2019-03-11T02:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP strong machine authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986808#M179975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well the main thing you have to understand is that in a windows 7 device, you can authenticate either user OR computer, not both. This is why you only see machine names in ACS. Now you can enable in ACS MAR.  I wouldn't recommend this though, but that's my opinion. This will check if the machine was authenticated and them use user authentication. However, this doesn't check all the time, so any other user can log in using their ad account as long as the MAR timer has not expired.  But if a user is on and the MAR timer expires, well authentication will fail and the machine will have to be rebooted and machine auth has to take place. MAR also does not work if the user uses both wired and wireless. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Aug 2012 20:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986808#M179975</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-08-05T20:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP strong machine authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986809#M180029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is machine authentication mandatory for Windows 7 PC to operate successfully in network ? And is it true what I say in first post, that if somebody not authorized knows PC domain name it could potentially use it&amp;nbsp; and authenticate ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if I correctly understand MAR checks if currently authenticated user have authenticated machine ? not authenticated machine have authenticated user ?&amp;nbsp;&amp;nbsp; What I mean is when machine is authenticated with domain name I can log into machine with local username(not from AD which&amp;nbsp; is external identity store for ACS), and I have full network access, even when I have MAR enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for help..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Aug 2012 21:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986809#M180029</guid>
      <dc:creator>ngtransge</dc:creator>
      <dc:date>2012-08-05T21:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP strong machine authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986810#M180073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see your answers in line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some questions regarding PEAP authentication.&amp;nbsp; Specifically&amp;nbsp; how&amp;nbsp; Machine Authentication works and how it is secured. It seems that&amp;nbsp; if I have enabled Machine Authentication in my network, every wane&amp;nbsp; who&amp;nbsp; knows PC&amp;nbsp; domain name can access network, is it true? &lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is not true, there is much more to machine authentication then just knowing your domain name. For machine authentication to occur, a computer must be joined to the domain using an admin account. The machine credentials are aquired dynamically (they are not set by any administrator or user) through kerberos and with default settings usually change every 30 days.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Here is what I mean “ Machine Authentication allows your PC to connect&amp;nbsp; to the network by authenticating as "Computer" before a legitimate user&amp;nbsp; logs in. This allows a machine to obtain group policies just like it was&amp;nbsp; connected to a wired network and this is a unique feature of the&amp;nbsp; Windows Client.”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Yes the main purpose of machine authentication to allow machine GPO to execute and give the computer network access during the bootup process. When a user authenticates, the supplicant will not allow any traffic flow until it receives an eap-success for the user transaction.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get this from &lt;A href="http://www.techrepublic.com/article/ultimate-wireless-security-guide-manual-peap-deployment-for-windows-wireless-client/6148574" rel="nofollow"&gt;http://www.techrepublic.com/article/ultimate-wireless-security-guide-manual-peap-deployment-for-windows-wireless-client/6148574&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So&amp;nbsp; I was looking&amp;nbsp; on ACS logs and it seems that&amp;nbsp; PC just sent it’s domain&amp;nbsp; name&amp;nbsp; to ACS, and it authenticates computer&amp;nbsp; by its name.After this&amp;nbsp; computer have access to network.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The machine should have sent its computer credentials not the domain name (format is computername.domain.com).&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So could you please tell me how can I implement strong machine&amp;nbsp; authentication without going&amp;nbsp; EAP-TLS way ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Machine authentication via PEAP is usually the easiest way to authenticate machines to the network. It uses mschapv2 which is a hashing algorithm used between the client and the domain without sending the password.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;One more thing about using Machine Access Restrictions. The cisco anyconnect client is going to support eap-chaining in an upcoming release, this a feature that will allow you to set the order of eap authentication when a workstation joins the network. So you will have the ability to fire a machine authentication request followed by user authentication referenced in this article - &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2150542" rel="nofollow"&gt;https://supportforums.cisco.com/thread/2150542&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Aug 2012 21:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-strong-machine-authentication/m-p/1986810#M180073</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-05T21:58:46Z</dc:date>
    </item>
  </channel>
</rss>

