<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029147#M210922</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would you recommend using the EAP-TLS authentication method with the LDAP setup on the ACS or the Active Directory setup on the ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found this docoument online and was going to follow this to try have Active directory user authentication and certificate based authentication. But this setup is with Active Directory setup in the ACS as LDAP doesn't support MS-CHAP in ACS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps10315/products_configuration_example09186a0080b4cdb9.shtml"&gt;http://www.cisco.com/en/US/products/ps10315/products_configuration_example09186a0080b4cdb9.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would this be the ideal setup? it has auto enrollment of the clients so it would check the user that is logged into the PC is currently in AD, and that the machine has the certificates required. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the supplicant is a standard on a windows 7 box?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any throughts? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Aug 2012 07:46:56 GMT</pubDate>
    <dc:creator>cuellar52</dc:creator>
    <dc:date>2012-08-22T07:46:56Z</dc:date>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029145#M210920</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cisco 5508 wireless controller&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Cisco ACS 5.1&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;LDAP connection&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup the wireless controller to do RADUIS authentication with the ACS 5.1 using LDAP. The setup is currently working, Brief info below on setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I setup the PC client to use WPA2-Enterprise AES and authentication method CISCO PEAP. When I connect to the SSID this will prompt for a username and password. I will enter in my AD details and the ACS with the LDAP connection will authenicate and on the network I go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I want to add machine authentication with CERTIFICATES, each laptop and pc in our network has CA certificates installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please explain a way that I can add these certificates into the ACS 5.1 so I pretty much want to import them into the ACS. Once they are imported inside I want the ACS to check that the certificates are on the PC and then prompt for the AD username and password, and only once it meets these two conditions it allows the workstation onto the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it will be a two form authentication one with certificates and the other ldap.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me out with the certificate aspect? to incorprate this into my already working LDAP setup?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029145#M210920</guid>
      <dc:creator>cuellar52</dc:creator>
      <dc:date>2019-03-11T02:26:42Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029146#M210921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Edgardo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need the anyconnect supplicant in order to set certificate authentication (eap-tls) for machines for example. And then set the user authentication via password (peap). Current windows supplicants (native supplicants) do not allow this flexibility.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To create eap-tls authentication on the radius side, all you need is the chain that is used to sign the machine or user cert, for example if the certificate path is: user, intermediate, root, you will have to upload intermediate and root and set them to trust for eap-tls authentication:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is more informatoin - &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.1/user/guide/users_id_stores.html#wp1124651"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.1/user/guide/users_id_stores.html#wp1124651&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 22:39:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029146#M210921</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-21T22:39:19Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029147#M210922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would you recommend using the EAP-TLS authentication method with the LDAP setup on the ACS or the Active Directory setup on the ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found this docoument online and was going to follow this to try have Active directory user authentication and certificate based authentication. But this setup is with Active Directory setup in the ACS as LDAP doesn't support MS-CHAP in ACS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps10315/products_configuration_example09186a0080b4cdb9.shtml"&gt;http://www.cisco.com/en/US/products/ps10315/products_configuration_example09186a0080b4cdb9.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would this be the ideal setup? it has auto enrollment of the clients so it would check the user that is logged into the PC is currently in AD, and that the machine has the certificates required. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the supplicant is a standard on a windows 7 box?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any throughts? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 07:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029147#M210922</guid>
      <dc:creator>cuellar52</dc:creator>
      <dc:date>2012-08-22T07:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029148#M210923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I suggest using AD setup since its easier to configure, you can use the GUI options to search for groups, and build policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With lap you only have the option of adding two leap servers per instance, with AD you have the entire domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is a new setup please consider upgrading to 5.3 with the latest patch, Cisco has worked hard in making the acs to AD integration resilient and it's good to stay up to date.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Windows 7 has the native supplicant but you may need to turn on the services (wireless zero and wired autoconfig).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 09:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029148#M210923</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-22T09:39:38Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029149#M210924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the information, I will be trying to implement an AD setup, Are you able to recommend the upgrade path I should take to reach ACS 5.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My current verison is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Secure ACS&lt;/P&gt;&lt;P&gt;Version : 5.1.0.44.3&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD valign="bottom" width="100%"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;BR /&gt;I am using the ACS appliance and I wouldnt want to revert back in case I did the upgrade incorrectly. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 02:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029149#M210924</guid>
      <dc:creator>cuellar52</dc:creator>
      <dc:date>2012-08-28T02:21:50Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029150#M210925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would recommend the following path documented in the upgrade notes (make sure you install the latest patch on 5.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/installation/guide/csacs_upg.html#wp1199421"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/installation/guide/csacs_upg.html#wp1199421&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 03:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029150#M210925</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-28T03:05:15Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029151#M210926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have now upgraded my ACS to the latest version &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Secure ACS&lt;/P&gt;&lt;P&gt;Version : 5.3.0.40.6&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD valign="bottom" width="100%"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;BR /&gt;I have been given 3 certificates from the server and systems team, I have imported all 3 of these certificates to &lt;/P&gt;&lt;TABLE border="0" cellspacing="0" id="cuesBreadcrumbTable"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD nowrap="nowrap"&gt;Users and Identity Stores &amp;gt; &lt;/TD&gt;&lt;TD nowrap="nowrap" style="display: none;"&gt;... &amp;gt; &lt;/TD&gt;&lt;TD nowrap="nowrap"&gt;Certificate Authorities&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using Cisco Peap on the windows 7 supplicant&amp;nbsp; Security type WPA2-entireprise AES. I validate the server certificate select my companies certificate in the trusted root cerificate authority field.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then connect to my wireless network, it prompt for username and password......... it access my LDAP setup on the ACS using GTC that i still currently have in place and allows me to connect. Each time I connect it comes up saying do I trust the ACS certificate which is stored here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" id="cuesBreadcrumbTable"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD nowrap="nowrap"&gt;System Administration &amp;gt; &lt;/TD&gt;&lt;TD nowrap="nowrap" style="display: none;"&gt;... &amp;gt; &lt;/TD&gt;&lt;TD nowrap="nowrap" title="Configuration"&gt;Configuration &amp;gt; &lt;/TD&gt;&lt;TD nowrap="nowrap" title="Local Server Certificates"&gt;Local Server Certificates &amp;gt; &lt;/TD&gt;&lt;TD nowrap="nowrap"&gt;Local Certificates&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt; and lets the client connect. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the client to only connect if it trusts the Company domain certificate, not the local ACS certifcate that came with the server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to help with intructions on what I am met to do? Cause I am lost........ ideally I would like it to use the certificates that i put here &lt;/P&gt;&lt;TABLE border="0" cellspacing="0" id="cuesBreadcrumbTable"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD nowrap="nowrap"&gt;Users and Identity Stores &amp;gt; &lt;/TD&gt;&lt;TD nowrap="nowrap" style="display: none;"&gt;... &amp;gt; &lt;/TD&gt;&lt;TD nowrap="nowrap"&gt;Certificate Authorities&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Happy to take this convo offline really appertice some help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 07:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029151#M210926</guid>
      <dc:creator>cuellar52</dc:creator>
      <dc:date>2012-08-29T07:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029152#M210927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Edgardo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACS will need to be signed by a CA for the clients to trust the cert without flagging the user. Since you are using eap-tls for machine auth, you need a signed cert mapped to the eap interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that said for the ACS to trust the machine certificates you need to import these certs into another section:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you create a certificate authentication profile and that is mapped to the correct access policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In&amp;nbsp; the end your admins are right all you need is the intermediate and root certs imported in the section that you mentioned. If you only have a self signed certificate&amp;nbsp; for the ACS then you need to get this fixed in order to help move things&amp;nbsp; along from the client's perspective, it will not trust the ACS&amp;nbsp; certificate for eap-tls handshake (if ACS has a self signed cert and you&amp;nbsp; have the "validate server certificate" enabled on the supplicant". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 01:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029152#M210927</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-30T01:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029153#M210928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for that information, I am trying to remove the local ACS certificate that I generated by accident awhile ago, as this is not needed and it might be conflicting, when i try remove the certificate I get this error. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This System Failure occurred: Certificate is associated with a protocol. Hence it cannot be deleted.. Your changes have not been save. Click OK to return to the list page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it Ok to leave this certificate or should I be removing this? I dont want this to clash with the intermediate and root certs that I have imported. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 01:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029153#M210928</guid>
      <dc:creator>cuellar52</dc:creator>
      <dc:date>2012-08-30T01:51:32Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029154#M210929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are trying to remove the ACS local certificate you will not succeed if this is the only certificate installed. If you have the correct certificate present, then make sure the cert want to keep is used for both eap and https interfaces and then this will let you delete the certificate. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is your only certificate then you will have to generate another CSR and submit it to your CA for them to sign it and have the revoke the old one. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2012 02:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029154#M210929</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-30T02:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029155#M210930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tarik, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am very close to completing this project but I have ran into a hurdle can you help me out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have sent this docoument to my CA team (ACS cert setup for EAP export cert and installation.pdf)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only problem is when in this docoument it says select template ACS using your 2003 serverm, we aren't running 2003 server we are running 2008 R2 server, This doesn't have the option to select the ACS template?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there anyway we can import this template into 2008 R2 server? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any help would be great &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 03:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029155#M210930</guid>
      <dc:creator>cuellar52</dc:creator>
      <dc:date>2012-09-18T03:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029156#M210931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM&gt;Hi Edgardo&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I also encountered same sort of issue while&amp;nbsp; integrating ACS 4.2 with AD (Active Directory) on Win 2008 R2 platform. I&amp;nbsp; lowered down the functional level of AD from WIN 2008 R2 to WIN&amp;nbsp; 2003 and integration was smooth.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This workaround worked in my scenario.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Below mentioned link can give you more insight of the functional levels.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://technet.microsoft.com/en-us/library/cc787290%28v=ws.10%29.aspx"&gt;&lt;EM&gt;http://technet.microsoft.com/en-us/library/cc787290%28v=ws.10%29.aspx&lt;/EM&gt;&lt;BR /&gt; &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;You may have a look at the information available and you can decide course of action for your scenario.&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 06:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029156#M210931</guid>
      <dc:creator>Anim Saxena</dc:creator>
      <dc:date>2012-09-18T06:25:01Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029157#M210932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Edguardo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just use a web certificate template and that will working fine. Here are guidelines of the template you need for authenticating clients to the network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please look at section 5.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/user/guide/admin_operations.html#wp1076238"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/user/guide/admin_operations.html#wp1076238&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 19:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029157#M210932</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-18T19:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029158#M210933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Tarki and Anim, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anim, thankyou for that information about functional levels, I am still looking into that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Tarki, are you sure it's section 5.2.2 I have looked all over and didn't find anything relevant can you copy and paste the first few lines and I will do a search on the link? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help guys&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 01:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029158#M210933</guid>
      <dc:creator>cuellar52</dc:creator>
      <dc:date>2012-09-19T01:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029159#M210934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Edgardo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly have a look at the below mentioned link. It might be helpful for you in case of issue related to certificates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.1/user/guide/eap_pap_phase.html#wp1030126"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.1/user/guide/eap_pap_phase.html#wp1030126&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Anim Saxena&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;*kindly rate helpful posts"&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 02:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029159#M210934</guid>
      <dc:creator>Anim Saxena</dc:creator>
      <dc:date>2012-09-19T02:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029160#M210935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Edgardo,  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My apologies I posted the wrong link&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a008009256b.shtml#wp39121&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 05:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029160#M210935</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-09-19T05:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029161#M210936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Edgardo Cuellar wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt; is there anyway we can import this template into 2008 R2 server? &lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;W2k8R2 CA refusing to accept the ACS certificate request was something I wasted two hours on yesterday. The final answer to make it work was to use certreq through CMD, supplying the webserver template:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Courier New; font-size: 10pt;"&gt;certreq -attrib "CertificateTemplate:webserver" –submit ssl.req&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Tarik already stated, the webserver template is perfectly Ok. There was just the question of how to retrofit it onto a CSR missing the MS extension to request it in the first place, and the only thing I came up with was the above statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Andre.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2012 18:29:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029161#M210936</guid>
      <dc:creator>abpsoft</dc:creator>
      <dc:date>2012-09-19T18:29:38Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029162#M210937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Guys, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for all the replies the correct link is def what i was after, and the information from abpsoft looks like it will help out alot. My only issue is I am the network engineer and trying to get the server and systems team to help with the certicate is being a pain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll message you privately Andre maybe you could help me out? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 03:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029162#M210937</guid>
      <dc:creator>cuellar52</dc:creator>
      <dc:date>2012-09-20T03:16:40Z</dc:date>
    </item>
    <item>
      <title>ACS 5.1, PEAP (EAP-GTC) Machine Authentication with LDAP</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029163#M210938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tarik;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had that annoying &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"This System Failure occurred: Certificate is associated with a protocol.&amp;nbsp; Hence it cannot be deleted.. Your changes have not been save. Click OK&amp;nbsp; to return to the list page." &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;problem. We are mucking around with installing real certs from GeoTrust and naturally did not get it right the first time, and had to delete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The easy fix was to take the self-signed local cert and add EAP to the proto. That let me delete the experimental GeoTrust cert, which had been configed with only EAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 21:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-1-peap-eap-gtc-machine-authentication-with-ldap/m-p/2029163#M210938</guid>
      <dc:creator>scrye</dc:creator>
      <dc:date>2012-10-17T21:21:08Z</dc:date>
    </item>
  </channel>
</rss>

