<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Machine Authentication and 802.1x in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-802-1x/m-p/672895#M2593</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You rock Andrew.  I've been sweating bullets on this one for a while, thanks a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 31 Oct 2006 14:24:37 GMT</pubDate>
    <dc:creator>MITCH JOHNSON</dc:creator>
    <dc:date>2006-10-31T14:24:37Z</dc:date>
    <item>
      <title>Machine Authentication and 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-802-1x/m-p/672893#M2591</link>
      <description>&lt;P&gt;I'm trying to get the machines to authenticate aginst active directory using 802.1x.  This works great when I use PEAP and CHAP authentication.  Works like a dream, no problems at all.  But I need to verify that the machine is a part of the domain, the user will have to logon later anyway.  It's important that our machines are verified as being a part of Active Directory and then authenticate the port to pass traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've followed all the documentation to get this working, what I'm looking for is something undocumented that made this work for others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mitch&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:17:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-802-1x/m-p/672893#M2591</guid>
      <dc:creator>MITCH JOHNSON</dc:creator>
      <dc:date>2020-02-21T18:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: Machine Authentication and 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-802-1x/m-p/672894#M2592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you have set up AD to automatically enroll the Machines for Certificates and the machines each have a Machine Certificate?&lt;/P&gt;&lt;P&gt;Have you enabled remote access for the machines (AD Users &amp;amp; Computers, enable dial-in or use Remote Access Policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other than that I didn't have any problems setting this up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to enable computer-only authentication then you must edit the registry (or push the changes down through Group Policy):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[quote]&lt;/P&gt;&lt;P&gt;Enabling Computer-only Authentication Using the Registry&lt;/P&gt;&lt;P&gt;To configure computer-only authentication through the registry, all the Windows-based wireless clients must have the following registry value set:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\EAPOL\Parameters\General\Global\AuthMode=2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the AuthMode setting set to 2, only computer authentication is attempted. User authentication is never attempted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To add this registry setting on all of your computers running Windows, you can use the following tools:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;? Regini.exe from the Windows 2000 Server Resource Kit Tools &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;? Reg.exe from the Windows Server 2003 Resource Kit Tools&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In both cases, you create a script file that is read by the tool to add a registry setting. The tool has to be run in the security context of a local administrator account. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternately, you can use network management software to change registry settings on managed computers.[/quote]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/ed80211.mspx" target="_blank"&gt;http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/ed80211.mspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Oct 2006 15:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-802-1x/m-p/672894#M2592</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2006-10-29T15:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Machine Authentication and 802.1x</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-802-1x/m-p/672895#M2593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You rock Andrew.  I've been sweating bullets on this one for a while, thanks a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Oct 2006 14:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-802-1x/m-p/672895#M2593</guid>
      <dc:creator>MITCH JOHNSON</dc:creator>
      <dc:date>2006-10-31T14:24:37Z</dc:date>
    </item>
  </channel>
</rss>

