<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902089#M470803</link>
    <description>Don't compare the certificate manager.  Look at the client's server validation screen in the 802.1x setup first.  See if there is any difference there.  Ideally this should all be GPO controlled so there shouldn't be a difference.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 02 Aug 2019 14:10:59 GMT</pubDate>
    <dc:creator>paul</dc:creator>
    <dc:date>2019-08-02T14:10:59Z</dc:date>
    <item>
      <title>PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902069#M470800</link>
      <description>&lt;P&gt;I am troubleshooting a customer environment where a windows 7 client is refusing to authenticate with their ISE. There's another client where the certificate for the Root CA is functional and it authenticates successfully.&lt;/P&gt;&lt;P&gt;I haven't had the chance myself to learn much about ISE yet which is why I'm hoping for someone with more experience to steer me in the correct direction. Some debugging information collected from the switch authenticator:&lt;/P&gt;&lt;P&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Client MAC-address, Initialising Method dct state to 'Not run'&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Adding method dct to runnable list for session 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Client MAC-address, Initialising Method CTS Reauth Client state to 'Not run'&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Adding method CTS Reauth Client to runnable list for session 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Processing SM CB request for 0xF80000AE: Event: New client notification (151)&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Create attr list, session 0xF80000AE:&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding MAC MAC-address&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding Swidb 0x3860A3A4&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding AAA_ID=D199&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding Audit_sid=AC186AFB0000D1995C090312&lt;BR /&gt;Aug 2 11:50:05.013 UTC: AUTH-FEAT-IPDT-EVENT: [MAC-address, Gi1/0/7] NewClient: No entry for MAC-address. session 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-FEAT-SISF-EVENT: [MAC-address, Gi1/0/7] No IPv6 binding found for MAC-address(0xF80000AE)&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-FEAT-ACCT-EVENT: [MAC-address, Gi1/0/7] [Session 0xF80000AE] New client notification mac MAC-address&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] New client MAC-address - client handle 0x00000001 for SM Accounting Feature&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] New client MAC-address - client handle 0x00000001 for SVM&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [MAC-address, Gi1/0/7] new client domain 1, iif_id 0x0000000000000000 vlan 0&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [MAC-address, Gi1/0/7] no pre_auth_vlan provided by SM, usingvlan 52&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: client struct with id = 0x9D0000AE created for MAC-address&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [Gi1/0/7] Find vlan on port: found vlan 52, user count 1 fwd count 0, client count 0, pending delete 0&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [Gi1/0/7] Find or alloc vlan: Updating vlan 52 New user count 2&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Single release event is posted from UNKNOWN&lt;BR /&gt;Aug 2 11:50:05.014 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [MAC-address, Gi1/0/7] Removed pre_auth_vlan 52 from SM&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-EVENT: [Gi1/0/7] No MACs found&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-EVENT: [Gi1/0/7] Client MAC count: 0, 0 not being deleted&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-EVENT: [Gi1/0/7] No authorized client found in domain [DATA]&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-EVENT: [Gi1/0/7] Domain authorized client count: 0&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-EVENT: [Gi1/0/7] No authorized client found in domain [VOICE]&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-EVENT: [Gi1/0/7] Domain authorized client count: 0&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-EVENT: [Gi1/0/7] No authorized ctx found&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [Gi1/0/7] control enabled 1 cdp bypass enabled 1 static allow 1&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [Gi1/0/7] notify 1 oper allow 1 authorized 0 for DATA&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [Gi1/0/7] notify 0 oper allow 0 authorized 0 for VOICE&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [Gi1/0/7] Is domain valid: Voice vlan is invalid&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] New client MAC-address - client handle 0x9D0000AE for Switch PI&lt;BR /&gt;Aug 2 11:50:05.015 UTC: AUTH-FEAT-FFCP-EVENT: [MAC-address, Gi1/0/7] FFCP new client cb for MAC-address&lt;BR /&gt;Aug 2 11:50:05.016 UTC: AUTH-FEAT-FFCP-EVENT: [MAC-address, Gi1/0/7] IIF ID not set. Invoke FFCP add for MAC-address&lt;BR /&gt;Aug 2 11:50:05.016 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] IIF ID required for 0xF80000AE(MAC-address)&lt;BR /&gt;Aug 2 11:50:05.016 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] New client MAC-address - client handle 0x5E55FFC9 for Session Mgr FFCP Shim&lt;BR /&gt;Aug 2 11:50:05.016 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Added record to DB - hdl 0xF80000AE / MAC-address. 1 session(s) on IDB&lt;BR /&gt;Aug 2 11:50:05.016 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Add record - adding MAC MAC-address&lt;BR /&gt;Aug 2 11:50:05.016 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [MAC-address, Gi1/0/7] attrib-change for id 0x9D0000AE&lt;BR /&gt;Aug 2 11:50:05.016 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Add record - adding SWIDB GigabitEthernet1/0/7&lt;BR /&gt;Aug 2 11:50:05.016 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Add record - adding AAA-ID D199&lt;BR /&gt;Aug 2 11:50:05.017 UTC: AUTH-FEAT-ACCT-EVENT: [MAC-address, Gi1/0/7] [Session 0xF80000AE] SM Notified attribute Add/Update aaa-unique-id 0000D199&lt;BR /&gt;Aug 2 11:50:05.017 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Add record - adding AUDIT-ID AC186AFB0000D1995C090312&lt;BR /&gt;Aug 2 11:50:05.017 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Add record - adding TARGET_SCOPE (Client)&lt;BR /&gt;Aug 2 11:50:05.017 UTC: AUTH-EVENT: Bound session (hdl 0xF80000AE) to policy (tgt 0x9B0100E8)&lt;BR /&gt;Aug 2 11:50:05.017 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] No attr list found&lt;BR /&gt;Aug 2 11:50:05.017 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] No identity attr list found&lt;BR /&gt;Aug 2 11:50:05.017 UTC: AUTH-EVENT: Handling client event RX_IDENTITY_UPDATE (19) for PRE, handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.017 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] IIF ID not set. Events for 0xF80000AE will be queued.&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Block events for MAC-address pending async IIF ID Set for unknown (0).&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Queueing event RX_IDENTITY_UPDATE(19) for 0xF80000AE - process in turn later&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Queued the event RX_IDENTITY_UPDATE for 0xF80000AE &amp;amp; pre crit status 0&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Queueing event SINGLE_ID_UPDATE(18) for 0xF80000AE - process in turn later&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: Handling client event SESSION_STARTED (8) for PRE, handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] IIF ID not set. Events for 0xF80000AE will be queued.&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Block events for MAC-address pending async IIF ID Set for unknown (0).&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Queueing event SESSION_STARTED(8) for 0xF80000AE - process in turn later&lt;BR /&gt;Aug 2 11:50:05.018 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Queued the event SESSION_STARTED for 0xF80000AE &amp;amp; pre crit status 0&lt;BR /&gt;Aug 2 11:50:05.023 UTC: AUTH-FEAT-FFCP-EVENT: [MAC-address, Gi1/0/7] auth_mgr FFCP callback called with oper 1 for 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.023 UTC: AUTH-FEAT-SWITCH-CORE-EVENT: [MAC-address, Gi1/0/7] attrib-change for id 0x9D0000AE&lt;BR /&gt;Aug 2 11:50:05.023 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Session method ctx missing for connection handle 21&lt;BR /&gt;Aug 2 11:50:05.024 UTC: AUTH-SYNC: [MAC-address, Gi1/0/7] Delay add/update sync of iif-id for MAC-address / 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.024 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Queued RESUME_PROCESSING event for 0xF80000AE(MAC-address) - IIF ID Set(0)&lt;BR /&gt;Aug 2 11:50:05.024 UTC: AUTH-FEAT-FFCP-EVENT: [MAC-address, Gi1/0/7] FFCP create callback for 0xF80000AE (iifid: 0x106978000000105 ), result 0x0&lt;BR /&gt;Aug 2 11:50:05.024 UTC: AUTH-EVENT: Handling ASYNC RESUME for handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.024 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Dequeueing event(s): block on IIF ID Set(0) / clear on IIF ID Set(0) for MAC-address&lt;BR /&gt;Aug 2 11:50:05.024 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Dequeueing message RX_IDENTITY_UPDATE&lt;BR /&gt;Aug 2 11:50:05.024 UTC: AUTH-EVENT: Handling client event RX_IDENTITY_UPDATE (19) for PRE, handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Policy event will be processed synchronously for 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Processing default action(s) for event RX_IDENTITY_UPDATE for session 0xF80000AE.&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Dequeueing message SINGLE_ID_UPDATE&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Received internal event SINGLE_ID_UPDATE (handle 0xF80000AE)&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-SYNC: [MAC-address, Gi1/0/7] Delay remove sync of vlan-id for MAC-address / 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Dequeueing message SESSION_STARTED&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-EVENT: Handling client event SESSION_STARTED (8) for PRE, handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Create attr list, session 0xF80000AE:&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding MAC MAC-address&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding Swidb 0x3860A3A4&lt;BR /&gt;Aug 2 11:50:05.025 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding AAA_ID=D199&lt;BR /&gt;Aug 2 11:50:05.026 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding Audit_sid=AC186AFB0000D1995C090312&lt;BR /&gt;Aug 2 11:50:05.026 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding IIF ID=0x106978000000105&lt;BR /&gt;Aug 2 11:50:05.026 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Client MAC-address, Initialising Method dot1x state to 'Not run'&lt;BR /&gt;Aug 2 11:50:05.026 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] [UPDATE] Adding method dot1x to runnable list for session 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.026 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Processing SM CB request for 0xF80000AE: Event: Start a method (150)&lt;BR /&gt;Aug 2 11:50:05.026 UTC: dot1x_auth Gi1/0/7: initial state auth_initialize has enter&lt;BR /&gt;Aug 2 11:50:05.026 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID: initialising&lt;BR /&gt;Aug 2 11:50:05.026 UTC: dot1x_auth Gi1/0/7: during state auth_initialize, got event 0(cfg_auto)&lt;BR /&gt;Aug 2 11:50:05.026 UTC: @@@ dot1x_auth Gi1/0/7: auth_initialize -&amp;gt; auth_disconnected&lt;BR /&gt;Aug 2 11:50:05.026 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID: disconnected&lt;BR /&gt;Aug 2 11:50:05.026 UTC: dot1x_auth Gi1/0/7: idle during state auth_disconnected&lt;BR /&gt;Aug 2 11:50:05.026 UTC: @@@ dot1x_auth Gi1/0/7: auth_disconnected -&amp;gt; auth_restart&lt;BR /&gt;Aug 2 11:50:05.026 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID: entering restart&lt;BR /&gt;Aug 2 11:50:05.027 UTC: dot1x-ev:[MAC-address, Gi1/0/7] Sending create new context event to EAP for dot1x-clientID (MAC-address)&lt;BR /&gt;Aug 2 11:50:05.027 UTC: dot1x_auth_bend Gi1/0/7: initial state auth_bend_initialize has enter&lt;BR /&gt;Aug 2 11:50:05.027 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID: entering init state&lt;BR /&gt;Aug 2 11:50:05.027 UTC: dot1x_auth_bend Gi1/0/7: initial state auth_bend_initialize has idle&lt;BR /&gt;Aug 2 11:50:05.027 UTC: dot1x_auth_bend Gi1/0/7: during state auth_bend_initialize, got event 16383(idle)&lt;BR /&gt;Aug 2 11:50:05.027 UTC: @@@ dot1x_auth_bend Gi1/0/7: auth_bend_initialize -&amp;gt; auth_bend_idle&lt;BR /&gt;Aug 2 11:50:05.027 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:entering idle state&lt;BR /&gt;Aug 2 11:50:05.027 UTC: dot1x-ev:[MAC-address, Gi1/0/7] Created a client entry (dot1x-clientID)&lt;BR /&gt;Aug 2 11:50:05.027 UTC: dot1x-ev:[MAC-address, Gi1/0/7] Dot1x authentication started for dot1x-clientID (MAC-address)&lt;BR /&gt;Aug 2 11:50:05.027 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Client MAC-address, Context changing state from 'Idle' to 'Running'&lt;BR /&gt;Aug 2 11:50:05.027 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Client MAC-address, Method dot1x changing state from 'Not run' to 'Running'&lt;BR /&gt;Aug 2 11:50:05.027 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Policy processing started for 0xF80000AE(MAC-address)&lt;BR /&gt;Aug 2 11:50:05.027 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Policy event will be processed synchronously for 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.028 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Authorization profile successfully applied for the event Identity Update&lt;BR /&gt;Aug 2 11:50:05.028 UTC: AUTH-EVENT: Raising ext evt AuthZ Success (21) on session 0xF80000AE, client (unknown) (0), hdl 0x00000000, attr_list 0x00000000&lt;BR /&gt;Aug 2 11:50:05.028 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Processing default action(s) for event SESSION_STARTED for session 0xF80000AE.&lt;BR /&gt;Aug 2 11:50:05.028 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Unblock events for MAC-address.&lt;BR /&gt;Aug 2 11:50:05.028 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Handling external PRE event AuthZ Success for context 0xF80000AE.&lt;BR /&gt;Aug 2 11:50:05.028 UTC: dot1x-sm:[MAC-address, Gi1/0/7] Posting !EAP_RESTART on Client dot1x-clientID&lt;BR /&gt;Aug 2 11:50:05.028 UTC: dot1x_auth Gi1/0/7: during state auth_restart, got event 6(no_eapRestart)&lt;BR /&gt;Aug 2 11:50:05.028 UTC: @@@ dot1x_auth Gi1/0/7: auth_restart -&amp;gt; auth_connecting&lt;BR /&gt;Aug 2 11:50:05.028 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:enter connecting state&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID: restart connecting&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-sm:[MAC-address, Gi1/0/7] Posting RX_REQ on Client dot1x-clientID&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x_auth Gi1/0/7: during state auth_connecting, got event 10(eapReq_no_reAuthMax)&lt;BR /&gt;Aug 2 11:50:05.029 UTC: @@@ dot1x_auth Gi1/0/7: auth_connecting -&amp;gt; auth_authenticating&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID: authenticating state entered&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:connecting authenticating action&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-sm:[MAC-address, Gi1/0/7] Posting AUTH_START for dot1x-clientID&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x_auth_bend Gi1/0/7: during state auth_bend_idle, got event 4(eapReq_authStart)&lt;BR /&gt;Aug 2 11:50:05.029 UTC: @@@ dot1x_auth_bend Gi1/0/7: auth_bend_idle -&amp;gt; auth_bend_request&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:entering request state&lt;BR /&gt;Aug 2 11:50:05.029 UTC: AUTH-FEAT-MDA-EVENT: [Gi1/0/7] Is enabled: No&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-ev:[Gi1/0/7] Sending EAPOL packet to group PAE address&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;Aug 2 11:50:05.029 UTC: dot1x-ev:[Gi1/0/7] Sending out EAPOL packet&lt;BR /&gt;Aug 2 11:50:05.030 UTC: dot1x-packet:EAPOL pak Tx - Ver: 0x3 type: 0x0&lt;BR /&gt;Aug 2 11:50:05.030 UTC: dot1x-packet: length: 0x0005&lt;BR /&gt;Aug 2 11:50:05.030 UTC: dot1x-packet:EAP code: 0x1 id: 0x1 length: 0x0005&lt;BR /&gt;Aug 2 11:50:05.030 UTC: dot1x-packet: type: 0x1&lt;BR /&gt;Aug 2 11:50:05.030 UTC: dot1x-packet:[MAC-address, Gi1/0/7] EAPOL packet sent to client dot1x-clientID&lt;BR /&gt;Aug 2 11:50:05.030 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:idle request action&lt;BR /&gt;Aug 2 11:50:05.034 UTC: dot1x-packet:[MAC-address, Gi1/0/7] Queuing an EAPOL pkt on Authenticator Q&lt;BR /&gt;Aug 2 11:50:05.034 UTC: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Aug 2 11:50:05.034 UTC: dot1x-packet: length: 0x000F&lt;BR /&gt;Aug 2 11:50:05.035 UTC: dot1x-ev:[Gi1/0/7] Dequeued pkt: Int Gi1/0/7 CODE= 2,TYPE= 1,LEN= 15&lt;/P&gt;&lt;P&gt;Aug 2 11:50:05.035 UTC: dot1x-ev:[Gi1/0/7] Received pkt saddr =MAC-address , daddr = dest.mac, pae-ether-type = pae-ether&lt;BR /&gt;Aug 2 11:50:05.035 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Method dot1x is already in ctx method list.&lt;BR /&gt;Aug 2 11:50:05.035 UTC: dot1x-packet:EAPOL pak rx - Ver: 0x1 type: 0x0&lt;BR /&gt;Aug 2 11:50:05.035 UTC: dot1x-packet: length: 0x000F&lt;BR /&gt;Aug 2 11:50:05.035 UTC: AUTH-EVENT: Handling client event RX_METHOD_AGENT_FOUND (2) for PRE, handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.035 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] Create attr list, session 0xF80000AE:&lt;BR /&gt;Aug 2 11:50:05.035 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding MAC MAC-address&lt;BR /&gt;Aug 2 11:50:05.035 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding Swidb 0x3860A3A4&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding AAA_ID=D199&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding Audit_sid=AC186AFB0000D1995C090312&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-DETAIL: [MAC-address, Gi1/0/7] - adding IIF ID=0x106978000000105&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Method dot1x is already in ctx method list.&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Ignoring start request for dot1x, as method is already running&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Policy event will be processed synchronously for 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Authorization profile successfully applied for the event Remote AuthC Failure&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-EVENT: Raising ext evt AuthZ Success (21) on session 0xF80000AE, client (unknown) (0), hdl 0x00000000, attr_list 0x00000000&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Processing default action(s) for event RX_METHOD_AGENT_FOUND for session 0xF80000AE.&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-DETAIL: No default action(s) for event RX_METHOD_AGENT_FOUND.&lt;BR /&gt;Aug 2 11:50:05.036 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Handling external PRE event AuthZ Success for context 0xF80000AE.&lt;BR /&gt;Aug 2 11:50:05.037 UTC: dot1x-sm:[MAC-address, Gi1/0/7] Posting EAPOL_EAP for dot1x-clientID&lt;BR /&gt;Aug 2 11:50:05.037 UTC: dot1x_auth_bend Gi1/0/7: during state auth_bend_request, got event 6(eapolEap)&lt;BR /&gt;Aug 2 11:50:05.037 UTC: @@@ dot1x_auth_bend Gi1/0/7: auth_bend_request -&amp;gt; auth_bend_response&lt;BR /&gt;Aug 2 11:50:05.037 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:entering response state&lt;BR /&gt;Aug 2 11:50:05.037 UTC: dot1x-ev:[MAC-address, Gi1/0/7] Response sent to the server from dot1x-clientID&lt;BR /&gt;Aug 2 11:50:05.037 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:request response action&lt;BR /&gt;Aug 2 11:50:05.038 UTC: AUTH-FEAT-SWITCH-PM-EVENT: [MAC-address, Gi1/0/7] mac addr process not notifying SM vlan 52&lt;BR /&gt;Aug 2 11:50:05.038 UTC: RADIUS/ENCODE(00000000):Orig. component type = Invalid&lt;BR /&gt;Aug 2 11:50:05.038 UTC: RADIUS(00000000): Config NAS IP: 0.0.0.0&lt;BR /&gt;Aug 2 11:50:05.038 UTC: RADIUS(00000000): Config NAS IPv6: ::&lt;BR /&gt;Aug 2 11:50:05.038 UTC: RADIUS(00000000): sending&lt;BR /&gt;Aug 2 11:50:05.038 UTC: AUTH-FEAT-SWITCH-PM-EVENT: [MAC-address, Gi1/0/7] Psecure datapkt: MacMAC-address:52 is not added by dot1x or is added as ask notifying dot1x&lt;BR /&gt;Aug 2 11:50:05.039 UTC: AUTH-FEAT-SWITCH-PM-EVENT: [MAC-address, Gi1/0/7] mac addr process not notifying SM vlan 52&lt;BR /&gt;Aug 2 11:50:05.039 UTC: AUTH-FEAT-WIRED-TUNNEL-ERROR: Client MAC-address doest not exist&lt;BR /&gt;Aug 2 11:50:05.039 UTC: RADIUS/ENCODE: Best Local IP-Address NASIP for Radius-Server IP-source&lt;BR /&gt;Aug 2 11:50:05.039 UTC: RADIUS(00000000): Send Access-Request to IP-source:1812 id 1645/123, len 255&lt;BR /&gt;Aug 2 11:50:05.039 UTC: RADIUS: authenticator AD HASH&lt;BR /&gt;Aug 2 11:50:05.039 UTC: RADIUS: User-Name [1] 12 "host/xxxx"&lt;BR /&gt;Aug 2 11:50:05.039 UTC: RADIUS: Service-Type [6] 6 Framed [2]&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Vendor, Cisco [26] 27&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Cisco AVpair [1] 21 "service-type=Framed"&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Framed-MTU [12] 6 1500&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Called-Station-Id [30] 19 "Authenticator MAC"&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Calling-Station-Id [31] 19 "Client-MAC"&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: EAP-Message [79] 17&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: HASH [ host/OSN93]&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Message-Authenticato[80] 18&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: HASH [ Ha'&amp;amp;@c]&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: EAP-Key-Name [102] 2 *&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Vendor, Cisco [26] 49&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Cisco AVpair [1] 43 "audit-session-id=AC186AFB0000D1995C090312"&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Vendor, Cisco [26] 20&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: Cisco AVpair [1] 14 "method=dot1x"&lt;BR /&gt;Aug 2 11:50:05.040 UTC: RADIUS: NAS-IP-Address [4] 6 NASIP&lt;BR /&gt;Aug 2 11:50:05.041 UTC: RADIUS: NAS-Port-Id [87] 22 "GigabitEthernet1/0/7"&lt;BR /&gt;Aug 2 11:50:05.041 UTC: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]&lt;BR /&gt;Aug 2 11:50:05.041 UTC: RADIUS: NAS-Port [5] 6 NAS-PORT&lt;BR /&gt;Aug 2 11:50:05.041 UTC: RADIUS(00000000): Sending a IPv4 Radius Packet&lt;BR /&gt;Aug 2 11:50:05.041 UTC: RADIUS(00000000): Started 5 sec timeout&lt;BR /&gt;Aug 2 11:50:05.044 UTC: RADIUS: Received from id 1645/123 IP-source:1812, Access-Reject, len 38&lt;BR /&gt;Aug 2 11:50:05.044 UTC: RADIUS: authenticator HASH&lt;BR /&gt;Aug 2 11:50:05.044 UTC: RADIUS: Message-Authenticato[80] 18&lt;BR /&gt;Aug 2 11:50:05.045 UTC: RADIUS: HASH [ +gL']&lt;BR /&gt;Aug 2 11:50:05.045 UTC: RADIUS(00000000): Received from id 1645/123&lt;BR /&gt;Aug 2 11:50:05.045 UTC: dot1x-ev:[MAC-address, Gi1/0/7] Received an EAP Fail&lt;BR /&gt;Aug 2 11:50:05.045 UTC: dot1x-sm:[MAC-address, Gi1/0/7] Posting EAP_FAIL for dot1x-clientID&lt;BR /&gt;Aug 2 11:50:05.045 UTC: dot1x_auth_bend Gi1/0/7: during state auth_bend_response, got event 10(eapFail)&lt;BR /&gt;Aug 2 11:50:05.045 UTC: @@@ dot1x_auth_bend Gi1/0/7: auth_bend_response -&amp;gt; auth_bend_fail&lt;BR /&gt;Aug 2 11:50:05.045 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:exiting response state&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:entering fail state&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:response fail action&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x_auth_bend Gi1/0/7: idle during state auth_bend_fail&lt;BR /&gt;Aug 2 11:50:05.046 UTC: @@@ dot1x_auth_bend Gi1/0/7: auth_bend_fail -&amp;gt; auth_bend_idle&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:entering idle state&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x-sm:[MAC-address, Gi1/0/7] Posting AUTH_FAIL on Client dot1x-clientID&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x_auth Gi1/0/7: during state auth_authenticating, got event 15(authFail)&lt;BR /&gt;Aug 2 11:50:05.046 UTC: @@@ dot1x_auth Gi1/0/7: auth_authenticating -&amp;gt; auth_authc_result&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:exiting authenticating state&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x-sm:[MAC-address, Gi1/0/7] dot1x-clientID:entering authc result state&lt;BR /&gt;Aug 2 11:50:05.046 UTC: %DOT1X-5-FAIL: Authentication failed for client (MAC-address) on Interface Gi1/0/7 AuditSessionID AC186AFB0000D1995C090312&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x-packet:[MAC-address, Gi1/0/7] Added username in dot1x&lt;BR /&gt;Aug 2 11:50:05.046 UTC: dot1x-packet:[MAC-address, Gi1/0/7] Dot1x did not receive any key data&lt;BR /&gt;Aug 2 11:50:05.047 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Authc failure from Dot1X (1), status Cred Fail (1) / event fail (1)&lt;BR /&gt;Aug 2 11:50:05.047 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Highest prio method: INVALID, Authz method: INVALID, Conn hdl: dot1x&lt;BR /&gt;Aug 2 11:50:05.047 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Client MAC-address, Method dot1x changing state from 'Running' to 'Authc Failed'&lt;BR /&gt;Aug 2 11:50:05.047 UTC: AUTH-EVENT: Raised event RX_METHOD_AUTHC_FAIL (6) on handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.047 UTC: AUTH-EVENT: Raised event REMOVE_USER_PROFILE (16) on handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.047 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Queued AUTHC FAIL (Cred Fail) from Dot1X for session 0xF80000AE (MAC-address)&lt;BR /&gt;Aug 2 11:50:05.047 UTC: AUTH-EVENT: Handling client event RX_METHOD_AUTHC_FAIL (6) for PRE, handle 0xF80000AE&lt;BR /&gt;Aug 2 11:50:05.047 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Client MAC-address, Context changing state from 'Running' to 'Authc Failed'&lt;BR /&gt;SWITCH-name#&lt;BR /&gt;Aug 2 11:50:05.052 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Processing default action(s) for event RX_IDENTITY_UPDATE for session 0xF80000AE.&lt;BR /&gt;Aug 2 11:50:05.052 UTC: AUTH-EVENT: [MAC-address, Gi1/0/7] Handling external PRE event AuthZ Success for context 0xF80000AE.&lt;BR /&gt;Aug 2 11:50:05.052 UTC: dot1x-ev:[MAC-address, Gi1/0/7] Delete auth client (dot1x-clientID) message&lt;BR /&gt;Aug 2 11:50:05.052 UTC: dot1x-ev:Auth client ctx destroyed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Any ideas of what the problem might be?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 13:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902069#M470800</guid>
      <dc:creator>washingday</dc:creator>
      <dc:date>2019-08-02T13:45:55Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902077#M470801</link>
      <description>&lt;P&gt;The problem is almost always on the client side. You need to look at the client authentication setup and validate how the server validation section is configured.&amp;nbsp; Is the server validation appears to be setup correct then ensure the root cert referenced in the server validation is the same as the root cert used to issue the ISE EAP Authentication cert.&amp;nbsp; It's all client side troubleshooting.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 13:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902077#M470801</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-08-02T13:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902085#M470802</link>
      <description>&lt;P&gt;Yes the problem seems to be on the client side. However, comparing the settings in the certificate manager on an authenticated&amp;nbsp;station, there's really no difference between them from what I can see.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 14:01:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902085#M470802</guid>
      <dc:creator>washingday</dc:creator>
      <dc:date>2019-08-02T14:01:16Z</dc:date>
    </item>
    <item>
      <title>Re: PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902089#M470803</link>
      <description>Don't compare the certificate manager.  Look at the client's server validation screen in the 802.1x setup first.  See if there is any difference there.  Ideally this should all be GPO controlled so there shouldn't be a difference.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Aug 2019 14:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/peap-failed-ssl-tls-handshake-because-the-client-rejected-the/m-p/3902089#M470803</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-08-02T14:10:59Z</dc:date>
    </item>
  </channel>
</rss>

