<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Machine/computer Authentication in ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-computer-authentication-in-ise/m-p/3863737#M472633</link>
    <description>&lt;P&gt;If a PC isn't a "Domain Computer" it won't get access, according to your policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Typically you'll need a rule at the top of your policy to allow PCs to connect based on MAB, or you could use PEAP to allow a "Domain User" to authenticate so you can do the domain join on the PC. Once that bit is done the PC will authenticate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Take care if you use PEAP though as you could be allowing any domain user to connect any device to the network if you use the "Domain Users" AD group. I would create a specific security group in AD for this purpose and use that group in a rule, so only a specific user (or group of users) can perform this task.&lt;/P&gt;</description>
    <pubDate>Tue, 28 May 2019 10:21:28 GMT</pubDate>
    <dc:creator>craig.beck</dc:creator>
    <dc:date>2019-05-28T10:21:28Z</dc:date>
    <item>
      <title>Machine/computer Authentication in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-computer-authentication-in-ise/m-p/3863361#M472630</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm new to ISE and we've setup machine+user authentication. While going through the machine authentication, in one of the blogs, described as :&amp;nbsp;&lt;SPAN&gt;When a Windows desktop machine joins Active Directory, there is a computer account that gets created and a unique password is negotiated between the machine and AD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So,this computer account can now be used to identify the machine, even when no user is logged in, which can be used to provide the machine access to the network and machine authorization policies are enforced.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;So, we've setup the policies as below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Rule no 1:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ise.local:ExternalGroups==Domain&amp;nbsp; Computers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; With the 1st rule, machine will get authorized access when it boots up (&amp;nbsp;&amp;nbsp; Before user enters his credentials)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Rule no 2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Network Access:WasMachineAuthenticated ==True&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AND&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ise.local:ExternalGroups==Domain Users&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now in 2nd rule user will enter credentials and he will get authorized&amp;nbsp;&amp;nbsp; access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since we've MAR (Network Access:WasMachineAuthenticated ==True) in place, only machine which was authenticated earlier will be allowed, right...My Query is what if PC (new one) that has never joined before AD will be authenticated and granted access..? Please assist.&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2019 13:31:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-computer-authentication-in-ise/m-p/3863361#M472630</guid>
      <dc:creator>Srinivasan Nagarajan</dc:creator>
      <dc:date>2019-05-27T13:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: Machine/computer Authentication in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-computer-authentication-in-ise/m-p/3863640#M472631</link>
      <description>Hello,&lt;BR /&gt;why it is authenticated if never joined to AD? It not authenticated because isn't consists on Domain Computers group.</description>
      <pubDate>Tue, 28 May 2019 06:12:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-computer-authentication-in-ise/m-p/3863640#M472631</guid>
      <dc:creator>aivanin</dc:creator>
      <dc:date>2019-05-28T06:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Machine/computer Authentication in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-computer-authentication-in-ise/m-p/3863737#M472633</link>
      <description>&lt;P&gt;If a PC isn't a "Domain Computer" it won't get access, according to your policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Typically you'll need a rule at the top of your policy to allow PCs to connect based on MAB, or you could use PEAP to allow a "Domain User" to authenticate so you can do the domain join on the PC. Once that bit is done the PC will authenticate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Take care if you use PEAP though as you could be allowing any domain user to connect any device to the network if you use the "Domain Users" AD group. I would create a specific security group in AD for this purpose and use that group in a rule, so only a specific user (or group of users) can perform this task.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 10:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-computer-authentication-in-ise/m-p/3863737#M472633</guid>
      <dc:creator>craig.beck</dc:creator>
      <dc:date>2019-05-28T10:21:28Z</dc:date>
    </item>
  </channel>
</rss>

