<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE-Peap in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048326#M229625</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;I will most likey go with 3rd party cert, go daddy is supported by IOS (given the link you provided).&lt;/P&gt;&lt;P&gt;I will only need one cert for the primary fqdn node right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Aug 2012 19:51:13 GMT</pubDate>
    <dc:creator>edondurguti</dc:creator>
    <dc:date>2012-08-23T19:51:13Z</dc:date>
    <item>
      <title>ISE-Peap</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048322#M229276</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I'm rolling out! &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I have seen couple of people with win7 cannot authenticate to ISE:&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;12520 EAP-TLS failed SSL/TLS handshake because the client rejected the ISE local-certificate&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've thought of this: Maybe get a 3rd party cert (go daddy) and have that installed in ISE.&lt;/P&gt;&lt;P&gt;I know i do have to make a CSR Cert.Sign.Request that matches cn=primary.ise.mydomain, would I also need a cert for secondary?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I use LEAP as a preferred protocol then it doesn't ask for cert and users are authenticated successfully.&lt;/P&gt;&lt;P&gt;I know they have to say do not validate cert and all that but sometimes it doesn't popupt to them they just can't get on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again maybe going wtih 3rd party certs will make it easier while benefiting from using PEAP?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:27:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048322#M229276</guid>
      <dc:creator>edondurguti</dc:creator>
      <dc:date>2019-03-11T02:27:13Z</dc:date>
    </item>
    <item>
      <title>ISE-Peap</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048323#M229298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the clients are your domain users, i would suggest using autoenrollment or a GPO to push out your internal root CA if you have a PKI environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont have one it is pretty simple and forward to setup. There are plenty of technet documentation that will walk you through it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 05:05:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048323#M229298</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-23T05:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-Peap</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048324#M229362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont have one and the situation is where i cant get one. Would Leap be a problem. Would 3rd party certs solve the problem. Cuz my company doesnt want a ca server and i will not try to convince them lol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 05:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048324#M229362</guid>
      <dc:creator>edondurguti</dc:creator>
      <dc:date>2012-08-23T05:15:18Z</dc:date>
    </item>
    <item>
      <title>ISE-Peap</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048325#M229507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leap will not support machine authentication if you decide to go that route. It would be best to use a 3rd party cert, if you plan on using BYOD then use the IOS release notes from apple to see which root CA comes pre installed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.apple.com/kb/HT5012"&gt;http://support.apple.com/kb/HT5012&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048325#M229507</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-23T17:58:21Z</dc:date>
    </item>
    <item>
      <title>ISE-Peap</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048326#M229625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;I will most likey go with 3rd party cert, go daddy is supported by IOS (given the link you provided).&lt;/P&gt;&lt;P&gt;I will only need one cert for the primary fqdn node right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 19:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048326#M229625</guid>
      <dc:creator>edondurguti</dc:creator>
      <dc:date>2012-08-23T19:51:13Z</dc:date>
    </item>
    <item>
      <title>ISE-Peap</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048327#M229734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a bug in ISE that doesnt allow you to use the same certificate for the eap interface (since you can designate which cert you want for either https or eap). You should be able to present the same cert for eap purposes across your radius servers. In the end you will need a cert for each of your policy service nodes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tried to find the bug (but the toolkit isnt working for me).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 21:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-peap/m-p/2048327#M229734</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-23T21:41:14Z</dc:date>
    </item>
  </channel>
</rss>

