<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I don't know much about NPS, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877269#M36578</link>
    <description>&lt;P&gt;I don't know much about NPS, but a machine account, is basically also a user account, just for the machine, it has a password and a username just like a user account, so i think your good. The host/ prefix is how windows indicates that the credentials are from a machine, and not a user.&lt;/P&gt;
&lt;P&gt;The switch has no involvement in how your supplicant is authenticating, it just forwards your eap packets via radius to the NPS.&lt;/P&gt;</description>
    <pubDate>Fri, 22 Apr 2016 12:49:49 GMT</pubDate>
    <dc:creator>jan.nielsen</dc:creator>
    <dc:date>2016-04-22T12:49:49Z</dc:date>
    <item>
      <title>Wired 802.1x using EAP-TLS machine certificates and Microsoft NPS</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877268#M36576</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to get this scenario to work, having already used autoenrollment to deploy machine certificates. However, 802.1x fails with NPS event viewer showing the following:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;User:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Security ID: TESTCOMPANY\TESTPC$&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Account Name: host/TESTPC.TESTCOMPANY.local&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Account Domain:&amp;nbsp;TESTCOMPANY&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Fully Qualified Account Name: TESTCOMPANY\TESTPC$&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Client Machine:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Security ID: NULL SID&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Account Name: -&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Fully Qualified Account Name: -&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; OS-Version: -&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Called Station Identifier:&amp;nbsp;&amp;lt;SANITIZED - MAC ADDRESS&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Calling Station Identifier:&amp;nbsp;&amp;lt;SANITIZED - MAC ADDRESS&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;NAS:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; NAS IPv4 Address: &amp;lt;SANITIZED - SWITCH&amp;nbsp;IP ADDRESS&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; NAS IPv6 Address: -&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; NAS Identifier: -&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; NAS Port-Type: Ethernet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; NAS Port: 50118&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;RADIUS Client:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Client Friendly Name: &amp;lt;SANITIZED - SWITCH NAME&amp;gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Client IP Address: &amp;lt;SANITIZED - SWITCH&amp;nbsp;IP ADDRESS&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Authentication Details:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Connection Request Policy Name: DOT1X-TEST-CP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Network Policy Name: DOT1X-TEST-NP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Authentication Provider: Windows&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Authentication Server: DC01.TESTCOMPANY.local&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Authentication Type: EAP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; EAP Type: Microsoft: Smart Card or other certificate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Account Session Identifier: -&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Logging Results: Accounting information was written to the local log file.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Reason Code: 16&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; Reason: Authentication failed due to a user credentials mismatch. Either the user name provided does not map to an existing user account or the password was incorrect.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;If I've stipulated that the NIC uses Computer Authentication, shouldn't that appear under Client Machine instead of User? An AD account definitely exists for &lt;EM&gt;TESTPC.TESTCOMPANY.local. &lt;/EM&gt;Should the &lt;EM&gt;host/&lt;/EM&gt; be appearing under Account Name?&lt;/P&gt;
&lt;P&gt;The authenticating switch is a 2960X running IOS 15.&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877268#M36576</guid>
      <dc:creator>noisey_uk</dc:creator>
      <dc:date>2019-03-11T06:41:39Z</dc:date>
    </item>
    <item>
      <title>I don't know much about NPS,</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877269#M36578</link>
      <description>&lt;P&gt;I don't know much about NPS, but a machine account, is basically also a user account, just for the machine, it has a password and a username just like a user account, so i think your good. The host/ prefix is how windows indicates that the credentials are from a machine, and not a user.&lt;/P&gt;
&lt;P&gt;The switch has no involvement in how your supplicant is authenticating, it just forwards your eap packets via radius to the NPS.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 12:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877269#M36578</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2016-04-22T12:49:49Z</dc:date>
    </item>
    <item>
      <title>Thanks for the confirmation</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877270#M36579</link>
      <description>&lt;P&gt;Thanks for the confirmation re. host/ Jan&lt;/P&gt;</description>
      <pubDate>Sat, 30 Apr 2016 10:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877270#M36579</guid>
      <dc:creator>noisey_uk</dc:creator>
      <dc:date>2016-04-30T10:30:09Z</dc:date>
    </item>
    <item>
      <title>I just tried Windows 10 and</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877271#M36580</link>
      <description>&lt;P&gt;I just tried Windows 10 and it works perfectly. Are there known issues with Windows 7, 802.1x, and NPS?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Apr 2016 10:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877271#M36580</guid>
      <dc:creator>noisey_uk</dc:creator>
      <dc:date>2016-04-30T10:31:33Z</dc:date>
    </item>
    <item>
      <title>I have win7 over EAP-TLS with</title>
      <link>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877272#M36582</link>
      <description>&lt;P&gt;I have win7 over EAP-TLS with NPS. Make sure the security patches are up to date and that the computer has a certificate that is issued by the same CA as your DC.&lt;/P&gt;
&lt;P&gt;Take a look at this:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/128096/configure-wireless-clients-running-windows-7-eap-tls-authentication-nps-radius"&gt;https://supportforums.cisco.com/document/128096/configure-wireless-clients-running-windows-7-eap-tls-authentication-nps-radius&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Apr 2016 11:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wired-802-1x-using-eap-tls-machine-certificates-and-microsoft/m-p/2877272#M36582</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2016-04-30T11:08:00Z</dc:date>
    </item>
  </channel>
</rss>

