<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474462#M308268</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Jon,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;CAC authentication will be done via EAP-TLS on the ACS.&amp;nbsp; Here is a configuration example and the EAP-TLS configuration guide for ACS:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a008068d45a.shtml"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a008068d45a.shtml&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/user/guide/SCAuth.html#wp325971"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/user/guide/SCAuth.html#wp325971&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;STRONG&gt;How do I use a CAC&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;Certificates are stored on the chip embedded in the Common Access Card (CAC). The chip also contains a processor, which responds to two protocols, PKCS#11 and Microsoft CAPI. To use a CAC, the workstation must have a smart card reader installed and must have&amp;nbsp; software installed that enables the interaction between the application and the CAC, called middleware. The installation of smart card readers and middleware is the responsibility of&lt;BR /&gt;the command that controls the workstation configuration. Once the reader and middleware have been installed, some applications, including Microsoft&lt;BR /&gt;Outlook and Microsoft Internet Explorer, require configuration to install the certificates from the smart card into the application. The private keys never leave the card, but the configuration step tells the application that the private key associated with the certificate can be found on the CAC. This configuration is also the responsibility of the command that controls the workstation configuration, but requires that the card be present in the card reader to perform the configuration. After the workstation is configured, using the CAC involves putting the card in the reader prior to use, and using the user interface provided by the PK-Enabled client application to sign, decrypt, or identify yourself to PK-Enabled information systems. The CAC must be unlocked prior to use by entering the PIN when requested. If the PIN is entered incorrectly four times in a row, the CAC will lock and require a visit to a RAPIDS terminal or a CAC&lt;BR /&gt;PIN Reset station for unlocking.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Regds,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful posts-&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 May 2010 21:20:44 GMT</pubDate>
    <dc:creator>Jatin Katyal</dc:creator>
    <dc:date>2010-05-14T21:20:44Z</dc:date>
    <item>
      <title>802.1x Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474458#M308264</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Just looking for some more information on wired 802.1x authentication.&amp;nbsp; I currently run ACS 4.1, and I know that it can be integrated with AD for authentication purposes.&amp;nbsp; Does anyone have information on whether or not you can take it a step further &amp;amp; use CAC / smartcard authentication?&amp;nbsp; There's not much information that I can find about this topic, so anything posted is helpful!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474458#M308264</guid>
      <dc:creator>Jkloza_2</dc:creator>
      <dc:date>2019-03-11T00:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474459#M308265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ACS supports RSA among other things. What solution are you running?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 18:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474459#M308265</guid>
      <dc:creator>Kent Heide</dc:creator>
      <dc:date>2010-05-14T18:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474460#M308266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're currently using CAC authentication (Common Access Cards).&amp;nbsp; I did see that RSA is supported, but we don't use&lt;/P&gt;&lt;P&gt;RSA tokens right now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 18:48:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474460#M308266</guid>
      <dc:creator>Jkloza_2</dc:creator>
      <dc:date>2010-05-14T18:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474461#M308267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the CAC cards, don't you end up pointing to an LDAP to verify the certificate?&amp;nbsp; I would assume that all you'd need to do is make sure you have the&lt;/P&gt;&lt;P&gt;root and subordinate certs trusted in ACS then point to an LDAP as the external directory (instead of AD) where you can verify the certs.&lt;/P&gt;&lt;P&gt;HOWEVER, my experience with 802.1x and ACS (limited as it may be) has been that you still need a supplicant on the client side to handle the certificate auth communication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 20:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474461#M308267</guid>
      <dc:creator>sjbdallas</dc:creator>
      <dc:date>2010-05-14T20:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474462#M308268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Jon,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;CAC authentication will be done via EAP-TLS on the ACS.&amp;nbsp; Here is a configuration example and the EAP-TLS configuration guide for ACS:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a008068d45a.shtml"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a008068d45a.shtml&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/user/guide/SCAuth.html#wp325971"&gt;http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/user/guide/SCAuth.html#wp325971&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;STRONG&gt;How do I use a CAC&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;Certificates are stored on the chip embedded in the Common Access Card (CAC). The chip also contains a processor, which responds to two protocols, PKCS#11 and Microsoft CAPI. To use a CAC, the workstation must have a smart card reader installed and must have&amp;nbsp; software installed that enables the interaction between the application and the CAC, called middleware. The installation of smart card readers and middleware is the responsibility of&lt;BR /&gt;the command that controls the workstation configuration. Once the reader and middleware have been installed, some applications, including Microsoft&lt;BR /&gt;Outlook and Microsoft Internet Explorer, require configuration to install the certificates from the smart card into the application. The private keys never leave the card, but the configuration step tells the application that the private key associated with the certificate can be found on the CAC. This configuration is also the responsibility of the command that controls the workstation configuration, but requires that the card be present in the card reader to perform the configuration. After the workstation is configured, using the CAC involves putting the card in the reader prior to use, and using the user interface provided by the PK-Enabled client application to sign, decrypt, or identify yourself to PK-Enabled information systems. The CAC must be unlocked prior to use by entering the PIN when requested. If the PIN is entered incorrectly four times in a row, the CAC will lock and require a visit to a RAPIDS terminal or a CAC&lt;BR /&gt;PIN Reset station for unlocking.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Regds,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;JK&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #800000;"&gt;Do rate helpful posts-&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 21:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication/m-p/1474462#M308268</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2010-05-14T21:20:44Z</dc:date>
    </item>
  </channel>
</rss>

