<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Machine authentication and new user in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915140#M466295</link>
    <description>&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;There is this another work-around that I was able to test out, I created a policy for only domain computers, then applied this ACL in the Authorization Profile:&lt;/FONT&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;10 permit tcp any any eq 389&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;30 permit udp any eq bootps any eq bootpc&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;40 permit tcp any any eq domain&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;41 permit ip any host &amp;lt;ISE IP address&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;50 deny ip any any&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT face="batang,apple gothic"&gt;Using which I was successful, letting the new user in and its profile created on the machine.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;I am thinking of pushing this via DACL, but not sure if this is safe enough...&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Aug 2019 07:08:20 GMT</pubDate>
    <dc:creator>dgaikwad</dc:creator>
    <dc:date>2019-08-28T07:08:20Z</dc:date>
    <item>
      <title>Machine authentication and new user</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3914595#M466290</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;We have this use case&lt;BR /&gt;&lt;STRONG&gt;Use case&lt;/STRONG&gt;: Call center&lt;BR /&gt;&lt;STRONG&gt;Requirements&lt;/STRONG&gt;: Any user can use any machine and log in with his credentials&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;: When a user tries to login to a machine where he has not logged in earlier, he get an error message saying its unable to reach the domain&lt;BR /&gt;&lt;STRONG&gt;Configuration&lt;/STRONG&gt;:&lt;BR /&gt;Have enabled user or machine auth in native Windows supplicant&lt;BR /&gt;Configured ISE policy to allow machine&lt;BR /&gt;I can see that the authorization profile get applied when only machine is connected&lt;BR /&gt;When a new user now tries to login, he gets errors of unable to reach domain&lt;BR /&gt;I have added permit ip any to AD servers in DACL and ACL on switch, yet this error persists?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure what I am missing here.. Any pointers?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2019 11:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3914595#M466290</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2019-08-27T11:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication and new user</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915004#M466293</link>
      <description>&lt;P&gt;Ok so the machine auth is working.&amp;nbsp; Are you using certs for the machine auth?&lt;/P&gt;
&lt;P&gt;if yes, then each user who logs into the shared computer will need their own user cert to allow the user auth to work.&amp;nbsp; It won't perform an EAP-PEAP for the user auth, because&amp;nbsp;Windows native supplicant does not support a mix and match of EAP-TLS and EAP-PEAP.&amp;nbsp; It's got to be the same EAP method for both machine and user auth.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Failing that, turn off the user auth on the supplicant.&amp;nbsp; Let the machine boot up and use machine auth to get onto the network. No need to further authenticate every user on the network, especially if the call center is 24/7 and the machine is wired.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2019 21:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915004#M466293</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-08-27T21:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication and new user</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915140#M466295</link>
      <description>&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;There is this another work-around that I was able to test out, I created a policy for only domain computers, then applied this ACL in the Authorization Profile:&lt;/FONT&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;10 permit tcp any any eq 389&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;30 permit udp any eq bootps any eq bootpc&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;40 permit tcp any any eq domain&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;41 permit ip any host &amp;lt;ISE IP address&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;50 deny ip any any&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;FONT face="batang,apple gothic"&gt;Using which I was successful, letting the new user in and its profile created on the machine.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="batang,apple gothic"&gt;I am thinking of pushing this via DACL, but not sure if this is safe enough...&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 07:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915140#M466295</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2019-08-28T07:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication and new user</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915605#M466298</link>
      <description>&lt;P&gt;Just my opinion, but if you are authenticating the machine, then there is no need to authenticate the user also UNLESS there is a requirement to differentiate access based on who the user is.&amp;nbsp; In most cases, machine authentication works great and achieves the intended goal of preventing unauthorized devices from accessing network resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Modify the GPO for the supplicant configuration to only do machine authentication.&amp;nbsp; If the machine authenticates successfully, then give it full access to the network.&amp;nbsp; For the users, let AD do its job of controlling access to the PC and server resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you really have a requirement to authenticate the user with 802.1x and you do not want to give machines full access, then you will need to use a dACL to allow access to AD domain controllers.&amp;nbsp; You would need to allow more than just LDAP (389) and I would definitely try to limit the destinations to the known domain controller IP addresses.&amp;nbsp; Since you never know what DNS will return as the closest domain controller, you would want to add all domain controllers to the dACL.&amp;nbsp; Unless AD Sites and Services is configured properly.&amp;nbsp; Then, you could add the domain controllers for the site that the client PCs are in.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 18:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915605#M466298</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-08-28T18:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication and new user</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915892#M466302</link>
      <description>&lt;P&gt;Thanks for the confirmation!&lt;/P&gt;&lt;P&gt;I was looking not to include the domain controllers in the dACL or ACL, but then seems that if I want to authenticate the users via 802.1x then it will be mandatory to have those AD servers listed there...&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2019 07:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3915892#M466302</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2019-08-29T07:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication and new user</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3916073#M466306</link>
      <description>&lt;P&gt;It isn't mandatory to list the domain controllers in the ACL; however, it is more secure to be specific about what the device can talk to.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2019 13:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-and-new-user/m-p/3916073#M466306</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2019-08-29T13:06:03Z</dc:date>
    </item>
  </channel>
</rss>

