<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x machine vs user authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356755#M432607</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should help:&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://www.cisco.com/application/pdf/en/us/guest/netsol/ns75/c685/ccmigration_09186a0080259020.pdf" target="_blank"&gt;http://www.cisco.com/application/pdf/en/us/guest/netsol/ns75/c685/ccmigration_09186a0080259020.pdf&lt;/A&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Microsoft's supplicant, you see this as "Authenticate as computer when computer information is available"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/8021x_client_configure.asp" target="_blank"&gt;http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/8021x_client_configure.asp&lt;/A&gt;&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Feb 2005 22:55:20 GMT</pubDate>
    <dc:creator>jafrazie</dc:creator>
    <dc:date>2005-02-25T22:55:20Z</dc:date>
    <item>
      <title>802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356754#M432604</link>
      <description>&lt;P&gt;In the process of depolying 802.1x on wired LAN.  What is the difference between machine authentication and user authentication?  Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:02:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356754#M432604</guid>
      <dc:creator>eit-homing</dc:creator>
      <dc:date>2019-03-10T21:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356755#M432607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should help:&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://www.cisco.com/application/pdf/en/us/guest/netsol/ns75/c685/ccmigration_09186a0080259020.pdf" target="_blank"&gt;http://www.cisco.com/application/pdf/en/us/guest/netsol/ns75/c685/ccmigration_09186a0080259020.pdf&lt;/A&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Microsoft's supplicant, you see this as "Authenticate as computer when computer information is available"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/8021x_client_configure.asp" target="_blank"&gt;http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/8021x_client_configure.asp&lt;/A&gt;&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Feb 2005 22:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356755#M432607</guid>
      <dc:creator>jafrazie</dc:creator>
      <dc:date>2005-02-25T22:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356756#M432610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I need to use both user and machine authentication, do I have to use EAP-TLS?  So EAP-PEAP only uses user authenticate?  Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2005 15:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356756#M432610</guid>
      <dc:creator>eit-homing</dc:creator>
      <dc:date>2005-03-01T15:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356757#M432613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming we're talking the Native Supplicant avail in the OS from MSFT, then you can only do EAP-TLS or PEAP for machine-auth. Also, whatever you do for machine-auth, you also need for user-auth.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2005 16:27:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356757#M432613</guid>
      <dc:creator>jafrazie</dc:creator>
      <dc:date>2005-03-01T16:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356758#M432615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.  Yes.  I am using Native Supplicant from MSFT.  So any difference between using TLS or PEAP?  I would like to decide which one should I implement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2005 16:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356758#M432615</guid>
      <dc:creator>eit-homing</dc:creator>
      <dc:date>2005-03-01T16:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356759#M432617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are differences between PEAP and TLS, probably outside of the scope of this post. Want to discuss it here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The msot notable need or difference for TLS is the use of certificates. You'd need one for the machine, and one for every user that logs into your machine. Per PEAP, you should need no client-side certs, assuming network trust is a given.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2005 18:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356759#M432617</guid>
      <dc:creator>jafrazie</dc:creator>
      <dc:date>2005-03-01T18:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356760#M432620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I need to prevent guest users and domain users with their own laptop to get acess to our LAN, I would like to setup so that Domain users can only log on using a known devices.  what would you recommended?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to use both machine and user authentication?  Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2005 15:56:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356760#M432620</guid>
      <dc:creator>eit-homing</dc:creator>
      <dc:date>2005-03-02T15:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356761#M432623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so assuming we're still talking the MSFT supplicant, you have some options:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) USe EAP-TLS and mark any certs deployed to your corporate-owned assets and non-exportable. This solves the issue by brute force. You don't exactly need machine-authentication to do this. You may need machine-auth for other reasons (as I believe we've discussed here).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If PEAP is in use, use the machine-auth and the Machine-Access-Restriction feature in ACS. What this does is a coupling of the notions of machine-auth as a preceeding policy decision for user-auth. Example: It is technically possible that anyone with a valid NT account may be able to 802.1x-authenticate from "any" machine. But with the machine-access-restriction feature, they will only be able to do so if ACS has also authenticated a valid machine-auth session prior to the login attempt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Use a NAR in ACS. A NAR is a Network Access Restriction. If for example, you have a database of all the MAC Addresses you have (or an OID wildcard) you can configure further checking of a MAC address from an otherwise valid 802.1x authentication attempt. This effectively tells ACS to only allow authentication attempts from MAC Addresses it knows about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2005 19:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356761#M432623</guid>
      <dc:creator>jafrazie</dc:creator>
      <dc:date>2005-03-02T19:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x machine vs user authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356762#M432624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are there any limitations in using the&lt;/P&gt;&lt;P&gt;ACS appliance ver4 and remote agent when&lt;/P&gt;&lt;P&gt;trying to use PEAP machine authentication&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2007 15:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-machine-vs-user-authentication/m-p/356762#M432624</guid>
      <dc:creator>mark.cronin</dc:creator>
      <dc:date>2007-02-02T15:39:53Z</dc:date>
    </item>
  </channel>
</rss>

