<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD Machine Authentication with Cisco ISE problem in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308856#M234504</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would say that this is for wireless rather than wired bit it shouldn't really make any difference.&lt;/P&gt;&lt;P&gt;I haven't actually tried using CN for User and SAN for machine by using an Identity Store Sequence that picks up 2 certificate profiles. I'll try that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you need to change anything on the user and machine auth elements of the AnyConnect profile.&lt;/P&gt;&lt;P&gt;I recall there is an unprotected identity set to anonymous and a protected identity that is set to something like [username].&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 13 Dec 2013 14:41:22 GMT</pubDate>
    <dc:creator>Roger Alderman</dc:creator>
    <dc:date>2013-12-13T14:41:22Z</dc:date>
    <item>
      <title>AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308848#M234386</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new with ISE, I have configured ISE &amp;amp; Domain computers for PEAP authentication. initially machine gets authenticated and then starts going MAB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authentication policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allowed protocol = PEAP &amp;amp; TLS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authorization Policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Condition for computer to be checked in external identity store (AD) = Permit access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Condition for users to be checked in external identity store (AD) plus WasMachineAuthenticated = permit access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of the above policies do match and download the ACL from ISE but computer starts to mab authentication again...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switchport configuration:&lt;/P&gt;&lt;P&gt;===============================================&lt;/P&gt;&lt;P&gt;ip access-list extended ACL-DEFAULT &lt;/P&gt;&lt;P&gt;remark Allow DHCP &lt;/P&gt;&lt;P&gt;permit udp any eq bootpc any eq bootps&lt;/P&gt;&lt;P&gt;remark Allow DNS &lt;/P&gt;&lt;P&gt;permit udp any any eq domain &lt;/P&gt;&lt;P&gt;permit ip any host (AD)&lt;/P&gt;&lt;P&gt;permit icmp any any &lt;/P&gt;&lt;P&gt;permit ip any host (ISE-1)&lt;/P&gt;&lt;P&gt;permit ip any host&amp;nbsp; (ISE-2)&lt;/P&gt;&lt;P&gt;permit udp any host (CUCM-1) eq tftp&lt;/P&gt;&lt;P&gt;permit udp any host (CUCM-2)eq tftp&lt;/P&gt;&lt;P&gt;deny ip any any &lt;/P&gt;&lt;P&gt;===============================================&lt;/P&gt;&lt;P&gt;switchport config&lt;/P&gt;&lt;P&gt;===============================================&lt;/P&gt;&lt;P&gt;Switchport Access vlan 10&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport voice vlan 20&lt;/P&gt;&lt;P&gt;ip access-group ACL-DEFAULT in&lt;/P&gt;&lt;P&gt;authentication open&lt;/P&gt;&lt;P&gt;authentication event fail action next-method &lt;/P&gt;&lt;P&gt;authentication event server dead action authorize vlan 1&lt;/P&gt;&lt;P&gt;authentication event server alive action reinitialize &lt;/P&gt;&lt;P&gt;authentication host-mode multi-domain &lt;/P&gt;&lt;P&gt;authentication order dot1x mab &lt;/P&gt;&lt;P&gt;authentication priority dot1x mab &lt;/P&gt;&lt;P&gt;authentication port-control auto &lt;/P&gt;&lt;P&gt;authentication periodic &lt;/P&gt;&lt;P&gt;authentication timer reauthenticate server &lt;/P&gt;&lt;P&gt;authentication timer inactivity 180 &lt;/P&gt;&lt;P&gt;authentication violation restrict&lt;/P&gt;&lt;P&gt;mab &lt;/P&gt;&lt;P&gt;dot1x pae authenticator &lt;/P&gt;&lt;P&gt;dot1x timeout tx-period 100 &lt;/P&gt;&lt;P&gt;====================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more problem about the "authentication open" and default ACL. Once the authentication succeeds and per user is ACL pushed though ISE to the switch. The default ACL still blocks communication on this switchprort.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help will highly appreciated.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308848#M234386</guid>
      <dc:creator>contactabbas</dc:creator>
      <dc:date>2019-03-11T03:53:54Z</dc:date>
    </item>
    <item>
      <title>AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308849#M234389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;anyone please...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Sep 2013 19:08:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308849#M234389</guid>
      <dc:creator>contactabbas</dc:creator>
      <dc:date>2013-09-14T19:08:42Z</dc:date>
    </item>
    <item>
      <title>AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308850#M234392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why do you think that it starts MAB?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can turn on &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;debug radius&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;on the switch then connect the PC. Please copy here the debug and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show authen session int Fa0/x&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Sep 2013 20:18:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308850#M234392</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2013-09-15T20:18:46Z</dc:date>
    </item>
    <item>
      <title>AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308851#M234406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HEllo Mudasir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please send us the debug logs, so that we can verify it and resolve your issue as soon as possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Sep 2013 01:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308851#M234406</guid>
      <dc:creator>harvisin</dc:creator>
      <dc:date>2013-09-22T01:00:30Z</dc:date>
    </item>
    <item>
      <title>AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308852#M234419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mudasir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please share detailed authentication failure logs for extensive troubleshooting and to find out where its getting stuck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2013 03:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308852#M234419</guid>
      <dc:creator>sahseth</dc:creator>
      <dc:date>2013-09-25T03:15:35Z</dc:date>
    </item>
    <item>
      <title>AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308853#M234438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; You need to watch the switch during an authentication, see if the machine is passing authentication and the user may be failing authentication causing the switch to fail to mab.&amp;nbsp; If your switch configuration is on auth failure continue to next method, then this makes sense.&amp;nbsp; The question is why is the user failing auth but the machine is passing, could be something in the policy.&amp;nbsp; Make sure your AD setup has machine authentciation checked or it may not tie the machine and user auth together and the user may be failing because ISE can't make that relationship so the machinewasauth=true is not beeing matched.&amp;nbsp; Easy way to check is remove that rule from your policy and see if the same thing happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also seen this happen when clients want to use EAP-TLS on the wired, machines passes auth, then the user logs into a machine for the first time.&amp;nbsp; The user auth kicks off before the user gets a cert and fails auth with a null certificate, since this is a auth failure the switchport kicks over to MAB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think wasmachineauth=true is that great, I prefer to use EAP-FASTv2 using Cisco Anyconnect NAM with eap-chaining.&amp;nbsp; This is great because you can do two part authentication.&amp;nbsp; EAP-FAST outer with EAP-TLS inner for the machine auth, and MSCHAPv2 for the inner of the user auth. You get your EAP-TLS auth for the machine and don't have to worry about a user logging into a machine for the first time and switching to MAB because the user doesn't have a cert yet.&amp;nbsp; I also do my rule to say if machine pass and user fail, then workstaion policy, if machine and user pass then corp policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Sep 2013 13:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308853#M234438</guid>
      <dc:creator>chris_day</dc:creator>
      <dc:date>2013-09-26T13:46:31Z</dc:date>
    </item>
    <item>
      <title>AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308854#M234456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried using EAP-FASTv2 with EAP-TLS inner for the machine auth and EAP-TLS inner for the user auth?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can get EAP-FASTv2 withEAP-TLS inner for the machine auth and MSCHAPv2 inner for the user auth but we really want to use both machine and user certs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any advice on the AnyConnect NAM setup and certificate profile requirements in ISE to achieve this? We've tried using CN and SAN Other but just can't get it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Dec 2013 08:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308854#M234456</guid>
      <dc:creator>Roger Alderman</dc:creator>
      <dc:date>2013-12-13T08:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308855#M234485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I have got EAP-TLS inner for both user and machine auth.&amp;nbsp; You should see if the issue is authentication failure or policy not matched.&amp;nbsp; If your policy is checking against AD groups then you may need to use common name field in the cert.&amp;nbsp; I have found that when using SAN I have problems getting the AD user attributes, but when using common name I can see the group memberships of the user.&amp;nbsp; Make sure you test both user and machine cert separately so you can identify that both will work when using common name.&amp;nbsp; In your Authentication policy you can match on wired 802.1x and use two cert stores, one that checks common name (user should pass this) and another that uses SAN (machine can use this) by making the common name the first one checked your users will always use that one, machines may fail to the one that uses SAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Main thing is test certs by themselves to see if they work alone, then you can look at EAP Chaining your certs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Dec 2013 09:37:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308855#M234485</guid>
      <dc:creator>chris_day</dc:creator>
      <dc:date>2013-12-13T09:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308856#M234504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would say that this is for wireless rather than wired bit it shouldn't really make any difference.&lt;/P&gt;&lt;P&gt;I haven't actually tried using CN for User and SAN for machine by using an Identity Store Sequence that picks up 2 certificate profiles. I'll try that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you need to change anything on the user and machine auth elements of the AnyConnect profile.&lt;/P&gt;&lt;P&gt;I recall there is an unprotected identity set to anonymous and a protected identity that is set to something like [username].&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Dec 2013 14:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308856#M234504</guid>
      <dc:creator>Roger Alderman</dc:creator>
      <dc:date>2013-12-13T14:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: AD Machine Authentication with Cisco ISE problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308857#M234549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't remember but I may have set both the unprotected and protocted to [username] so that I didn't get anonymous logs in ISE. I have a fairly nice ISE lab and a laptop that is a member of the test domain with NAM and NAC, next time i'm in the office I can test this all out.&amp;nbsp; I've always used two part authentication with EAP-FASTv2 as I explain to customers it's extra protection.&amp;nbsp; If your Certs become compramised the the machine can't authenticate and your profile for full access should require both machine and user to pass.&amp;nbsp; If you read the TrustSec 2.1 guide their examples are with machine and user certificates, not two part like I do.&amp;nbsp; The document is pretty good and tells you how the NAM should be configured and also how your ISE policy should or could look.&amp;nbsp; The thing I love about ISE is how creative you can get with it to make this stuff shine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_80_eapchaining_deployment.pdf"&gt;http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_80_eapchaining_deployment.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 14 Dec 2013 12:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ad-machine-authentication-with-cisco-ise-problem/m-p/2308857#M234549</guid>
      <dc:creator>chris_day</dc:creator>
      <dc:date>2013-12-14T12:15:26Z</dc:date>
    </item>
  </channel>
</rss>

