<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PEAP with Certificate Validation in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/peap-with-certificate-validation/m-p/3007265#M22856</link>
    <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;Good Day!&lt;/P&gt;
&lt;P&gt;Just want to ask this.&lt;/P&gt;
&lt;P&gt;I have 1 ACS1 in client A and 1 ACS2 in client B running via PEAP with certificate validation with different domain. These 2 ACS are independent from each other and they want to extend their authentication from client A to client B and vice versa using a single SSID.&lt;/P&gt;
&lt;P&gt;Now, I want to know in terms of certificate validation process of PEAP, do I need to import the ACS1 certificate to the trusted certificate store of the endpoints of client B and the ACS2 certificate to the trusted certificate store of the endpoints of client A so that they can authenticate from each other?&lt;/P&gt;
&lt;P&gt;ACS1 Server Cert = Trusted Cert of client B&lt;/P&gt;
&lt;P&gt;ACS2 Server Cert = Trusted Cert of client A&lt;/P&gt;
&lt;P&gt;Thanks for the feedback.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 07:42:54 GMT</pubDate>
    <dc:creator>fatalXerror</dc:creator>
    <dc:date>2019-03-11T07:42:54Z</dc:date>
    <item>
      <title>PEAP with Certificate Validation</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-with-certificate-validation/m-p/3007265#M22856</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;Good Day!&lt;/P&gt;
&lt;P&gt;Just want to ask this.&lt;/P&gt;
&lt;P&gt;I have 1 ACS1 in client A and 1 ACS2 in client B running via PEAP with certificate validation with different domain. These 2 ACS are independent from each other and they want to extend their authentication from client A to client B and vice versa using a single SSID.&lt;/P&gt;
&lt;P&gt;Now, I want to know in terms of certificate validation process of PEAP, do I need to import the ACS1 certificate to the trusted certificate store of the endpoints of client B and the ACS2 certificate to the trusted certificate store of the endpoints of client A so that they can authenticate from each other?&lt;/P&gt;
&lt;P&gt;ACS1 Server Cert = Trusted Cert of client B&lt;/P&gt;
&lt;P&gt;ACS2 Server Cert = Trusted Cert of client A&lt;/P&gt;
&lt;P&gt;Thanks for the feedback.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-with-certificate-validation/m-p/3007265#M22856</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-03-11T07:42:54Z</dc:date>
    </item>
    <item>
      <title>With EAP-PEAP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-with-certificate-validation/m-p/3007266#M22858</link>
      <description>&lt;P&gt;With EAP-PEAP authentication method the TLS connection build-up &lt;EM&gt;may&lt;/EM&gt; contain a check on the client side that validates whether the &lt;STRONG&gt;Radius Server&lt;/STRONG&gt; is trusted.&amp;nbsp; Radius server does &lt;STRONG&gt;not care&lt;/STRONG&gt; about the clients that connect to it!!!&lt;/P&gt;
&lt;P&gt;Therefore:&lt;/P&gt;
&lt;P&gt;on your client A you need to install ACS1 and ACS2 Root (and any other intermediary issuing certificate chain).&amp;nbsp; This has to be the entire chain of CA's (from Root, down to the CA that issued the ACS cert)&lt;/P&gt;
&lt;P&gt;on your client&amp;nbsp;B you need to install ACS1 and ACS2 Root (and any other intermediary issuing certificate chain).&amp;nbsp; This has to be the entire chain of CA's (from Root, down to the CA that issued the ACS cert)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NB: you don't install the ACS server cert on the clients - only the CA certs that generated the ACS server cert.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If the clients are Windows, then you would install the CA certificate chain under Trusted Authorities.&lt;/P&gt;
&lt;P&gt;Also, just as a workaround/test you can configure your clients to ignore the Server Validation (under the 802.1x supplicant settings)&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2017 01:37:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-with-certificate-validation/m-p/3007266#M22858</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-05-17T01:37:08Z</dc:date>
    </item>
  </channel>
</rss>

