<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Syed in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046654#M22921</link>
    <description>&lt;P&gt;Hi Syed&lt;/P&gt;
&lt;P&gt;From my experience I would advice about two potential issues:&lt;/P&gt;
&lt;P&gt;1-&amp;nbsp;Machine Authentication failure for Windows 10:&lt;/P&gt;
&lt;DIV&gt;The Local Security Authority (LSA)&amp;nbsp; in Windows 10 provides clients like Cisco Network Access Manager with the Machine password encrypted which is an increased default security settings in Windows 8 or 10 / Server 2012. however this does fail Cisco Network Access Manager to use the machine Credential for Authentication and the entire machine authentication would fail.&lt;BR /&gt;This doesn't happen only if you are using machine credential for Authentication (like via PEAP(MSCHAPv2), EAP-FAST (MSCHAPv2)) but this would not happen if Machine authentication using Machine certificate&amp;nbsp; (EAP-TLS or EAP-FAST (EAP-TLS))&lt;/DIV&gt;
&lt;DIV&gt;The registry fix described in Microsoft KB 2743127 should be is applied to the client desktop. This fix includes adding a DWORD value LsaAllowReturningUnencryptedSecrets to the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa registry key and setting this value to 1. This change permits Local Security Authority (LSA) to provide clients like Cisco Network Access Manager with the Machine password&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;here is also the Cisco Bug ID for this&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuw01496/?referring_site=bugquickviewclic&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;2- Take care if your are upgrading Windows 7 to Windows 10 (and not fresh installation) and you are using the Machine authentication via Machine Certificates (EAP-TLS) that sometimes the default imaging used by SCCM vendors to take a snapshot of a reference Machine and then apply the upgrade the machine certificates after the upgrade won't be valid for authentication.&lt;/DIV&gt;
&lt;DIV&gt;This mostly happen due to missing or corrupted private keys that failed to be migrated as part of the Windows upgrade.&lt;/DIV&gt;
&lt;DIV&gt;The solution is to delete the machine certificates (manually or via Script) before the Windows upgrade process starts and then once it joins the AD after the upgrade the certificates would be pushed successfully from the CA with Valid certificate keys (private + Public)&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 12 May 2017 08:38:27 GMT</pubDate>
    <dc:creator>Mohamed Abd Elnaser Mohamed Mohamed Ali</dc:creator>
    <dc:date>2017-05-12T08:38:27Z</dc:date>
    <item>
      <title>Cisco ISE1.4 802.1x EAP-TLS authentication with Windows 7, 10, Apple MAC OS</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046651#M22918</link>
      <description>&lt;P&gt;Dear folks,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I need help for the list of useful hotfixes useful for EAP-TLS authentication using native supplicant&lt;/P&gt;
&lt;P&gt;- Windows 10&lt;/P&gt;
&lt;P&gt;- Apple MAC&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If something like hotfix exists for Apple MAC OS!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have found hotfixes required for Windows 7 @below.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/11916581/cisco-ise-8021x-eap-tls-list-applicable-hot-fixes" target="_blank"&gt;https://supportforums.cisco.com/discussion/11916581/cisco-ise-8021x-eap-tls-list-applicable-hot-fixes&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If this list requires update, please help!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046651#M22918</guid>
      <dc:creator>Syed Yasir Imam</dc:creator>
      <dc:date>2019-03-11T07:42:00Z</dc:date>
    </item>
    <item>
      <title>Hi Syed</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046652#M22919</link>
      <description>&lt;P&gt;Hi Syed&lt;/P&gt;
&lt;P&gt;Can you elaborate if you have a problem Authenticating these Windows 10 machines to 802.1X network, I have customers deployed Windows 10 with Cisco ISE 1.4 using EAP-TLS as an inner method inside EAP-FAST as an outer method with EAP-Chaining enabled and it works fine with no problem taken into an account that the customer have a robust PKI infrastructure.&lt;/P&gt;</description>
      <pubDate>Sun, 07 May 2017 20:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046652#M22919</guid>
      <dc:creator>Mohamed Abd Elnaser Mohamed Mohamed Ali</dc:creator>
      <dc:date>2017-05-07T20:55:38Z</dc:date>
    </item>
    <item>
      <title>Currently i am not facing any</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046653#M22920</link>
      <description>&lt;P&gt;Currently i am not facing any problem.....but experiencing with Windows 7.... installing patches and hotfixes resolves many issues...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Not yet experienced Apple MAC....not sure if something like that is good to install there as well!&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 20:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046653#M22920</guid>
      <dc:creator>Syed Yasir Imam</dc:creator>
      <dc:date>2017-05-10T20:40:39Z</dc:date>
    </item>
    <item>
      <title>Hi Syed</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046654#M22921</link>
      <description>&lt;P&gt;Hi Syed&lt;/P&gt;
&lt;P&gt;From my experience I would advice about two potential issues:&lt;/P&gt;
&lt;P&gt;1-&amp;nbsp;Machine Authentication failure for Windows 10:&lt;/P&gt;
&lt;DIV&gt;The Local Security Authority (LSA)&amp;nbsp; in Windows 10 provides clients like Cisco Network Access Manager with the Machine password encrypted which is an increased default security settings in Windows 8 or 10 / Server 2012. however this does fail Cisco Network Access Manager to use the machine Credential for Authentication and the entire machine authentication would fail.&lt;BR /&gt;This doesn't happen only if you are using machine credential for Authentication (like via PEAP(MSCHAPv2), EAP-FAST (MSCHAPv2)) but this would not happen if Machine authentication using Machine certificate&amp;nbsp; (EAP-TLS or EAP-FAST (EAP-TLS))&lt;/DIV&gt;
&lt;DIV&gt;The registry fix described in Microsoft KB 2743127 should be is applied to the client desktop. This fix includes adding a DWORD value LsaAllowReturningUnencryptedSecrets to the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa registry key and setting this value to 1. This change permits Local Security Authority (LSA) to provide clients like Cisco Network Access Manager with the Machine password&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;here is also the Cisco Bug ID for this&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuw01496/?referring_site=bugquickviewclic&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;2- Take care if your are upgrading Windows 7 to Windows 10 (and not fresh installation) and you are using the Machine authentication via Machine Certificates (EAP-TLS) that sometimes the default imaging used by SCCM vendors to take a snapshot of a reference Machine and then apply the upgrade the machine certificates after the upgrade won't be valid for authentication.&lt;/DIV&gt;
&lt;DIV&gt;This mostly happen due to missing or corrupted private keys that failed to be migrated as part of the Windows upgrade.&lt;/DIV&gt;
&lt;DIV&gt;The solution is to delete the machine certificates (manually or via Script) before the Windows upgrade process starts and then once it joins the AD after the upgrade the certificates would be pushed successfully from the CA with Valid certificate keys (private + Public)&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 12 May 2017 08:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046654#M22921</guid>
      <dc:creator>Mohamed Abd Elnaser Mohamed Mohamed Ali</dc:creator>
      <dc:date>2017-05-12T08:38:27Z</dc:date>
    </item>
    <item>
      <title>Dear,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046655#M22922</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the response.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1- Seems like issue is when NAM is used. I am using Native...so doesnt bother me.&lt;/P&gt;
&lt;P&gt;2- I will take care of upgrade, though not the issue yet.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2017 14:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise1-4-802-1x-eap-tls-authentication-with-windows-7-10/m-p/3046655#M22922</guid>
      <dc:creator>Syed Yasir Imam</dc:creator>
      <dc:date>2017-06-12T14:47:29Z</dc:date>
    </item>
  </channel>
</rss>

