<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Machine authentication using certificates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964091#M404394</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a bug on the eap chaining which is not working at the moment, but instead of using eap chaining go ahead and use the anyconnect to set the credential for machine using certs and user using peap credentials and see if this resolves your issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct and your use case is very simple can you post a screenshot of your authorization policies so I can take a look?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 15 Sep 2012 05:42:45 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2012-09-15T05:42:45Z</dc:date>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964068#M404356</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am facing this error while machine authenticates agaist AD for wireless users. My requirement is users with corporate laptop get privileged vlan and BYOD should get normal vlan.I am using Cisco ISE 1.1.1 and configured authentication policies to diffrenciate clients based on corp asset and BYOD. Authentication policy result is identity sequnce which uses certificate profile and AD. All corp laptops should be authenticated using certificates and then followed by AD user and pass. when I configure XP users to validate server certificate this error comes in ISE log "Authentication failed : 11514 Unexpectedly received empty TLS message; treating as a rejection by the client" and if I disable validate sewrver certificate then this error "Authentication failed : 22049 Binary comparison of certificates failed".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964068#M404356</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2019-03-11T02:24:31Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964069#M404357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does ISE have a signed certificate from the same internal CA as the laptops? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when the binary comparison of certificates failed message appears, this usually points to an internal issue where the machine certificates arent being published to the AD user account for these computer objects. There should be a tab that will show the certificate issued to the computer account:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an article that covers the steps on deploying computer certificates and having them pushed to AD - &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/cc731242%28v=ws.10%29.aspx"&gt;http://technet.microsoft.com/en-us/library/cc731242%28v=ws.10%29.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 17:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964069#M404357</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-10T17:36:18Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964070#M404358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes,ISE have a sigend certificate from the same internal CA in ISE certificate store. I will ask AD authority to follow the process mentioned in the link and update you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Aug 2012 13:35:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964070#M404358</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-11T13:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964071#M404359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just out of curiosity, did you set the certificate to the eap interface? I am trying to understand why the client is unable to verify the ise's cert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Aug 2012 10:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964071#M404359</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-12T10:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964072#M404360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;I have two CA server certificates installed in ISE. One is Public CA and the other is internal MS CA. I want corp assets to use MS CA and BYOD to use public CA. I have enabled EAP for public CA. So when I enable "Verify server certificate" check on client machine it rejects ISE and EAP does not establish but it works for BYOD. As I can only specify one CA for EAP , I have to disable server verification. Its understood that machine is supplying local MS CA certificate while ISE sends Public CA server certificate and EAP-TLS fails. But after disabling server verification , it gives error for bianry comparison failed. Is it possible to use two different CA for two different authentication rules? other thing is public cer for ISE is assigned by intermediate CA so I have installed intermediate cert chain certificate in ISE certificate store. Do I need to also install public Root CA cert in ISE certificate store? How should the chain be installed?any sequence of uploading CA certs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 09:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964072#M404360</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-13T09:27:58Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964073#M404361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can not assign to interfaces for eap mangement, however why would you use the public CA for eap authentication? Are your external users using dot1x to authenticate to the network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 16:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964073#M404361</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-13T16:24:59Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964074#M404362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the requirement: 1:corp asset + AD user/pass=full access ,2: BYOD + AD user/pass= partial access.both using EAP and same ssid. I have configured authentication policy based on this requirement using identity source sequence which has certificate profile (which checks certificate agianst AD) and AD external database for username and pass verification. AD guys have made changes according to microsoft doc but still same error.am I missing something somewhere???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 16:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964074#M404362</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-13T16:40:41Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964075#M404363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See if publishing a new certificate for the endpoint then publishes the certificate in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 16:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964075#M404363</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-13T16:53:06Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964076#M404364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried that as well but not working.Surely looks some prob with AD config. But if the certificate profile pass then will it check username and password against AD? Thanks for your support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 17:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964076#M404364</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-13T17:31:38Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964077#M404365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does a binary comparison of the certifcate that is presented from the client with the certificate that is issued to the same user in AD in order to verify that the cert is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 17:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964077#M404365</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-13T17:36:48Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964078#M404366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that means machine and user authentication is not dome at the same time. ??? it will check only machine name instead of username in AD database for certificate verification.then how user authentication can be achieved after machine authentication??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 17:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964078#M404366</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-13T17:46:04Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964079#M404368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are two seperate process when it comes to machine and user authentication. If you are using the default windows supplicant, the authenticate attempt for machine authentication is usually attempted, at boot up, or when you log off, or when you log on to the device. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User authentication occurs after you provide the credentials to login to the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The supplicant has to send the machine credential and user credential for this to work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 17:51:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964079#M404368</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-13T17:51:54Z</dc:date>
    </item>
    <item>
      <title>Re:Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964080#M404370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will both work with MS XP default supplicant? any document ... Thanks again for your support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 19:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964080#M404370</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-13T19:48:08Z</dc:date>
    </item>
    <item>
      <title>Re:Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964081#M404373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the documentation for windows xp sp 3:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/929847"&gt;http://support.microsoft.com/kb/929847&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please dont forget to rate helpful posts and also mark this thread as resolved when you get a chance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 19:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964081#M404373</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-13T19:53:27Z</dc:date>
    </item>
    <item>
      <title>Re:Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964082#M404375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik, Certificate check is working now. But as I suspected earlier, machine AND user authentication is not working. If i set XP supplicant authmode to use machine only authentication then machine gets authenticated agianst certificate profile and ISE assigns authorisation profile without checking username and password.which is not desirable. If I set XP authmode to " Always perform user authentication when user logs on" then I can see machine authenticates in ISE but after login with AD username and password , connection doesnt come up and XP pops up with" windows cant find user cert" error. How to make user and machine authentication work at the same time? one more thiing I noticed that after machine authentication, EAP is not challenging for username and password. I have enabled MAR in ISE. Am I missing something. Thanks in advance and I will surely rate your posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 14:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964082#M404375</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-14T14:40:07Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964083#M404377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a limitation on the native supplicant, when you enable smart card or certificate authentication for the network connection, then it tries to use this for both machine and user authentication. It does not allow you to use certificate authentication for machine auth, and password authenticaiton for user authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use anyconnect network access manager (which is free if you have a cisco wireless network) and not only does it allow you to set which type of authentication you want (certificate for machine and password for user) but it has a new feature out which is called eap chaining. Eap chaining is a powerful option because you can choose the order (machine first then user) when the client connects to the network. No longer do you have to stress about the machine authentication timers and wondering what is the best fit when it comes to users logging in and out of their machines in order to update the machine authentication cache in ISE. However eap chaining uses eap-fast, which is a pac-based authentication framework.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the latest release note about this feature (currently in beta):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html#wp998871"&gt;http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/release/notes/anyconnect31rn.html#wp998871&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 15:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964083#M404377</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-14T15:19:21Z</dc:date>
    </item>
    <item>
      <title>Re:Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964084#M404379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik, thanks for your support. I will try Anyconnect and hope We can achive machine and user authentication same time before ISE applies authorisation profile/rules.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2012 20:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964084#M404379</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-15T20:21:16Z</dc:date>
    </item>
    <item>
      <title>Re:Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964085#M404381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried using Cisco Anyconnect NAM on Wondows XP for machine and user authentication but EAP-chaining feature is not working as expected. I am facing few challenges. I have configured NAM to use eap-fast for machine and user authentication and ISE is configured with required authorisation rule and profiles/results. when machine boots up it sends machine certificate and gets authenticated against AD and ISE matches the authorisation rule and assigns authZ profile without waiting for user credentials. Now when a user logs on using AD user/pass, authentication fails as the VLAN assigned in AuthZ profile does not have access to AD. ISE should actually check with their external database but Its not. Interestingly, if I login with an AD user which is local to the machine its gets authenticated and gets correct AuthZ profile/access level. If I logoff and login with different user, Windows adapter gets IP address and ISE shows successful authentication /authz profile but NAM agent prompts limited connectivity. Any help??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 15:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964085#M404381</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-28T15:49:29Z</dc:date>
    </item>
    <item>
      <title>Re:Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964086#M404384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Hi [answers are inline]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; have tried using Cisco Anyconnect NAM on Wondows XP for machine and&amp;nbsp; user authentication but EAP-chaining feature is not working as expected.&amp;nbsp; I am facing few challenges. I have configured NAM to use eap-fast for&amp;nbsp; machine and user authentication and ISE is configured with required&amp;nbsp; authorisation rule and profiles/results. when machine boots up it sends&amp;nbsp; machine certificate and gets authenticated against AD and ISE matches&amp;nbsp; the authorisation rule and assigns authZ profile without waiting for&amp;nbsp; user credentials. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is expected for machine authentication, since the client hasnt logged in machine authentication will succeed so the computer has connectivity to the domain.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when a user logs on using AD user/pass,&amp;nbsp; authentication fails as the VLAN assigned in AuthZ profile does not have&amp;nbsp; access to AD. ISE should actually check with their external database&amp;nbsp; but Its not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Do you see the authentication report in ISE? Keep in mind that you are authenticating with a client that has never logged into the workstation before. I am sure you are looking for the feature which starts the NAM process before the user logs in. Try checking this option here:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/administration/guide/ac04namconfig.html#wp1074333"&gt;http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/administration/guide/ac04namconfig.html#wp1074333&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="text-decoration: underline; "&gt;&lt;STRONG&gt;Note the section below:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="text-decoration: underline; "&gt; &lt;STRONG&gt;–&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="17" /&gt;Before&amp;nbsp; User Logon—Connect to the network before the user logs on. The user&amp;nbsp; logon types that are supported include user account (Kerberos)&amp;nbsp; authentication, loading of user GPOs, and GPO-based logon script&amp;nbsp; execution. &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;EM style="text-decoration: underline; "&gt;&lt;STRONG&gt; &lt;A name="wp1195735"&gt;&lt;/A&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;P&gt;&lt;EM style="text-decoration: underline; "&gt;&lt;STRONG&gt; If you choose Before User Logon, you also get to set Time to Wait Before Allowing a User to Logon: &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;EM style="text-decoration: underline; "&gt;&lt;STRONG&gt; &lt;A name="wp1140977"&gt;&lt;/A&gt;&lt;A name="wpmkr1174559"&gt;&lt;/A&gt; &lt;/STRONG&gt;&lt;/EM&gt;&lt;P&gt;&lt;EM style="text-decoration: underline; "&gt;&lt;STRONG&gt; Time to Wait Before Allowing User to Logon—Specifies the maximum (worst&amp;nbsp; case) number of seconds to wait for the Network Access Manager to make a&amp;nbsp; complete network connection. If a network connection cannot be&amp;nbsp; established within this time, the Windows logon process continues with&amp;nbsp; user log on. The default is 5 seconds. &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="text-decoration: underline; "&gt;&lt;IMG src="http://www.cisco.com/en/US/i/templates/note.gif" /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;EM style="text-decoration: underline; "&gt; &lt;A name="wp1172420"&gt;&lt;/A&gt; &lt;/EM&gt;&lt;P&gt;&lt;EM style="text-decoration: underline; "&gt; &lt;STRONG&gt;Note &lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="6" /&gt;If the Network Access Manager is configured to manage wireless connections, set Time to wait before allowing user to logon to 30 seconds or more because of the additional time it may take to&amp;nbsp; establish a wireless connection. You must also account for the time&amp;nbsp; required to obtain an IP address via DHCP. If two or more network&amp;nbsp; profiles are configured, you may want to increase the value to cover two&amp;nbsp; or more connection attempts. &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;BR /&gt;&lt;P&gt;&lt;STRONG&gt;You will have to enable this setting to allow the supplicant to connect to the network using the credentials you provide, the reason for this is you are trying to authenticate a user that has never logged into this workstation before. Please make changes to the configuration.xml file, and then select the repair option on the anyconnect client and test again.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interestingly, if I login with an AD user which is local to&amp;nbsp; the machine its gets authenticated and gets correct AuthZ&amp;nbsp; profile/access level. If I logoff and login with different user, Windows&amp;nbsp; adapter gets IP address and ISE shows successful authentication /authz&amp;nbsp; profile but NAM agent prompts limited connectivity. Any help??&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Please make the changes above and see if the error message goes away.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 16:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964086#M404384</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2012-08-28T16:17:33Z</dc:date>
    </item>
    <item>
      <title>Machine authentication using certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964087#M404386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your help Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have changed the NAM profile as you suggested but still only one user can login successfully. When I login with diffrent user it still not working. However, ISE authentication logs shows successfull with correct Authz profile. NAM still throws same error "limited connectivity".&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 16:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-using-certificates/m-p/1964087#M404386</guid>
      <dc:creator>hardiklodhia</dc:creator>
      <dc:date>2012-08-28T16:59:06Z</dc:date>
    </item>
  </channel>
</rss>

