<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It kind of looks like a in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/2983397#M38243</link>
    <description>&lt;P&gt;It kind of looks like a machine authentication attempt.&lt;/P&gt;
&lt;P&gt;Is it possible that your NAM profile indicates that machine authentication should be attempted (but your ISE policy doesn't require it)?&lt;/P&gt;</description>
    <pubDate>Mon, 26 Sep 2016 21:09:49 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2016-09-26T21:09:49Z</dc:date>
    <item>
      <title>odd workstation login behavior on wireless</title>
      <link>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/2983396#M38242</link>
      <description>&lt;P&gt;edit: new details below&lt;/P&gt;
&lt;P&gt;has anyone else noticed some odd behavior for windows 10 workstations using machine auth for PEAP on wireless? i cannot confirm if this Win10 only yet as i don't have access to a test workstation running 7 or 8 that are attached to this domain.&lt;/P&gt;
&lt;P&gt;we keep seeing in our ISE 2.1 auth logs workstations attempting to authenticate with Domain\WorkstationName$ and of course it gets dropped but we're not sure if it's related to our test workstations connecting pre-user login and then disconnecting just after the user logs in. the user then manually has to reconnect and usually things are fine.&lt;/P&gt;
&lt;P&gt;here's a snapshot of what the auth log looks like:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/weird_auth_log.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;the user has to manually select the SSID mutliple times over the login process as&amp;nbsp;the client keeps disconnecting and i don't understand why.&lt;/P&gt;
&lt;P&gt;here's a screenshot of that odd entry's details:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/details_of_odd_entry.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;The SSID i'm using for this is configured like all of our others so i don't think it's that. thoughts?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;EDIT: found the following bug: ISE rejects access-request does not contain the username attribute&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCva20683/?referring_site=bugquickviewclick" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCva20683/?referring_site=bugquickviewclick&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;this sounds an awful lot like what i'm seeing. but the bug says "No release planned to fix this bug" which is outstanding...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;open a case? devices won't automatically connect thanks to this stupid bug.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/2983396#M38242</guid>
      <dc:creator>ben.posner</dc:creator>
      <dc:date>2019-03-11T07:05:49Z</dc:date>
    </item>
    <item>
      <title>It kind of looks like a</title>
      <link>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/2983397#M38243</link>
      <description>&lt;P&gt;It kind of looks like a machine authentication attempt.&lt;/P&gt;
&lt;P&gt;Is it possible that your NAM profile indicates that machine authentication should be attempted (but your ISE policy doesn't require it)?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2016 21:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/2983397#M38243</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-09-26T21:09:49Z</dc:date>
    </item>
    <item>
      <title>Marvin, thanks for responding</title>
      <link>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/2983398#M38245</link>
      <description>&lt;P&gt;Marvin, thanks for responding.&lt;/P&gt;
&lt;P&gt;i agree it does look like a machine auth but it's crafted oddly. and we do require the machine auth as well as user auth so we can do MAR checks.&lt;/P&gt;
&lt;P&gt;i worked around the issue by adding another identity rewrite rule to allow for the oddly formed machine auth as shown below.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/identity-rewrite.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;this seems to be working. it doesn't explain why these workstations started sending this style of auth attempt all of a sudden, but that's probably a windows issue and out of my purview.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 16:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/2983398#M38245</guid>
      <dc:creator>ben.posner</dc:creator>
      <dc:date>2016-11-09T16:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: odd workstation login behavior on wireless</title>
      <link>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/4514753#M571512</link>
      <description>&lt;P&gt;I am seeing the same issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are requiring both wireless machine and user authentication. We are proving that the user is connecting through a corporate machine by checking that the user login contains the "Other Attribute AD-Host-Join-Point contains addomain.com".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The authentication/authorization process works correctly with the machine authenticating with "host/660-000958LT.addomain.com". This is followed shortly with an authentication that looks as thought it's a user authentication with the machine name as the user "ADDOMAIN\660-000958LT$". This fails with "Username attribute is not present in the authentication request". This is before the user actually logs into the laptop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the user logs into the laptop the user authentication/authorization is successful "ADDOMAIN\username". However the successful user connection shown on Live Logs is followed by two unsuccessful attempts with "11038 RADIUS Accounting-Request header contains invalid Authenticator field". Even after these failures, the user is on the wireless network and can operate without issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The architecture is machine: Windows 10 native supplicant set to machine and user authentication using PEAP/EAP-MSChapv2, ISE: v2.7 patch 4, wireless: Meraki MR45&lt;/P&gt;</description>
      <pubDate>Tue, 07 Dec 2021 19:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/4514753#M571512</guid>
      <dc:creator>gschmitt.ngit</dc:creator>
      <dc:date>2021-12-07T19:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: odd workstation login behavior on wireless</title>
      <link>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/4516434#M571591</link>
      <description>&lt;P&gt;Consider using TEAP for machine+user authentication without the need for MAR in Windows 10 20H1 and later.&lt;/P&gt;
&lt;P&gt;&lt;LI-MESSAGE title="TEAP for Windows 10 using Group Policy and ISE TEAP Configuration" uid="4134289" url="https://community.cisco.com/t5/security-documents/teap-for-windows-10-using-group-policy-and-ise-teap/m-p/4134289#U4134289"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 05:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/odd-workstation-login-behavior-on-wireless/m-p/4516434#M571591</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-12-10T05:27:33Z</dc:date>
    </item>
  </channel>
</rss>

