<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What supplicant are you using in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise/m-p/2962787#M24555</link>
    <description>&lt;P&gt;What supplicant are you using for your PEAP session? Windows Native or Anyconnect? You would have ti uncheck validate server certificate option on both if the ISE is presenting a self-signed cert or a certificate not trusted by the client. If only one client is receiving this message and everyone else works ok, I would check the client certificate store to see if the CA cert of CA issuing the ISE cert is present in the "Trusted Root Certificate Authority" Store.&lt;/P&gt;</description>
    <pubDate>Fri, 06 Jan 2017 12:49:23 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-01-06T12:49:23Z</dc:date>
    <item>
      <title>ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/2962786#M24553</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have deployed ISE version&amp;nbsp;&lt;SPAN&gt;2.0.0.306 nodelist.version.label.patch in which we are receiving one error related to one node as :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;So please suggest what is the way out for it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sudhir&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/2962786#M24553</guid>
      <dc:creator>Sudhir Yadav</dc:creator>
      <dc:date>2019-03-11T07:20:11Z</dc:date>
    </item>
    <item>
      <title>What supplicant are you using</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/2962787#M24555</link>
      <description>&lt;P&gt;What supplicant are you using for your PEAP session? Windows Native or Anyconnect? You would have ti uncheck validate server certificate option on both if the ISE is presenting a self-signed cert or a certificate not trusted by the client. If only one client is receiving this message and everyone else works ok, I would check the client certificate store to see if the CA cert of CA issuing the ISE cert is present in the "Trusted Root Certificate Authority" Store.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2017 12:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/2962787#M24555</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-06T12:49:23Z</dc:date>
    </item>
    <item>
      <title>Rahul first of all Thanks for</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/2962788#M24556</link>
      <description>&lt;P&gt;Rahul first of all Thanks for your comments..&lt;/P&gt;
&lt;P&gt;we are using windows native as we have around 350 windows machines but 3-4 machines are giving this kind of error so let me check the certificates of those nodes.&lt;/P&gt;
&lt;P&gt;But one confusion how will i come to know that ISE cert is present or not.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2017 06:03:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/2962788#M24556</guid>
      <dc:creator>Sudhir Yadav</dc:creator>
      <dc:date>2017-01-10T06:03:18Z</dc:date>
    </item>
    <item>
      <title>Sudhir If you are using IE</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/2962789#M24557</link>
      <description>&lt;P&gt;Sudhir If you are using IE then go to&amp;nbsp; Internet Option-&amp;gt;Content-&amp;gt;Certificates-&amp;gt;Trusted Root Certificate Authority and look for Certificate issued by ISE.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2017 08:06:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/2962789#M24557</guid>
      <dc:creator>Ravi Singh</dc:creator>
      <dc:date>2017-01-10T08:06:23Z</dc:date>
    </item>
    <item>
      <title>You can look for user</title>
      <link>https://community.cisco.com/t5/network-access-control/ise/m-p/2962790#M24558</link>
      <description>&lt;P&gt;You can look for user certificates as Ravi mentioned above. I would also look at the following for local machine certificate store:&lt;/P&gt;
&lt;P&gt;1) Open Run and type "mmc". This will open Microsoft Management Console.&lt;/P&gt;
&lt;P&gt;2) File &amp;gt; Add remove Snap-in.&lt;/P&gt;
&lt;P&gt;3) Choose certificates &amp;gt; Choose local computer account.&lt;/P&gt;
&lt;P&gt;4) Check for ISE EAP cert under trusted root Authorities of computer account.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2017 13:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise/m-p/2962790#M24558</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-10T13:03:46Z</dc:date>
    </item>
  </channel>
</rss>

