<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Machine Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772004#M486623</link>
    <description>&lt;P&gt;If you are using winidws 10 or 8 operating system,you should change the registry value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Windows 8/10 Registry Changes for 802.1x Authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Press the Windows logo &lt;STRONG&gt;Key+R&lt;/STRONG&gt; to open the Run box.&lt;/LI&gt;&lt;LI&gt;Type &lt;STRONG&gt;regedit&lt;/STRONG&gt; in the Run box, and then press Enter.&lt;/LI&gt;&lt;LI&gt;Locate and then select the following registry subkey:&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;On the &lt;STRONG&gt;Edit&lt;/STRONG&gt; menu, click New, and then click &lt;STRONG&gt;DWORD (32-bit)&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Type &lt;STRONG&gt;LsaAllowReturningUnencryptedSecrets&lt;/STRONG&gt;, and then press &lt;STRONG&gt;Enter&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Right-click &lt;STRONG&gt;LsaAllowReturningUnencryptedSecrets&lt;/STRONG&gt;, click &lt;STRONG&gt;Modify&lt;/STRONG&gt;…, type &lt;STRONG&gt;1&lt;/STRONG&gt; in the Value data box, and then click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Exit &lt;STRONG&gt;Registry&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE: No registry changes for windows 7&lt;/P&gt;</description>
    <pubDate>Thu, 03 Jan 2019 08:08:36 GMT</pubDate>
    <dc:creator>nithinrs78901</dc:creator>
    <dc:date>2019-01-03T08:08:36Z</dc:date>
    <item>
      <title>ISE Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3771852#M486600</link>
      <description>&lt;P&gt;Hey everyone, Happy New Year!&lt;/P&gt;&lt;P&gt;My question has to do with Windows Machine Authentication.&amp;nbsp; I understand the in's and out's of how 802.1x works but having some confusion about the actual authentication of the machine.&amp;nbsp; My understanding is, when a machine joins AD, an account is created and credentials are stored on the machine.&amp;nbsp; After this, each time machine is rebooted, machine authentication takes place (before user authentication).&amp;nbsp; What if I am using a wireless SSID that authenticates users via 802.1x (PEAP).&amp;nbsp; This means wireless connection won't come up, until a user provides his/her credentials.&amp;nbsp; How does the machine authenticate itself to the domain even if the user is not logged into the computer and no IP address is assigned to that computer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 01:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3771852#M486600</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2019-01-03T01:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3771956#M486612</link>
      <description>&lt;P&gt;Is your SSID configured for dot1x? If yes then wireless NIC setting need to be changed as below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wireless machine auth1.png" style="width: 791px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26948iD8E3549297326EDA/image-size/large?v=v2&amp;amp;px=999" role="button" title="wireless machine auth1.png" alt="wireless machine auth1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wireless machine auth2.png" style="width: 589px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26947i1C711A2CBC7DBED0/image-size/large?v=v2&amp;amp;px=999" role="button" title="wireless machine auth2.png" alt="wireless machine auth2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wireless machine auth3.png" style="width: 939px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26946iF0A49F98B5B14579/image-size/large?v=v2&amp;amp;px=999" role="button" title="wireless machine auth3.png" alt="wireless machine auth3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wireless machine auth4.png" style="width: 834px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26945i691A762722F66767/image-size/large?v=v2&amp;amp;px=999" role="button" title="wireless machine auth4.png" alt="wireless machine auth4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now change the setting for dot1x to user or machine auth.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wireless machine auth5.png" style="width: 650px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26951i34A0309CECA4103B/image-size/large?v=v2&amp;amp;px=999" role="button" title="wireless machine auth5.png" alt="wireless machine auth5.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 07:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3771956#M486612</guid>
      <dc:creator>pan</dc:creator>
      <dc:date>2019-01-03T07:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772004#M486623</link>
      <description>&lt;P&gt;If you are using winidws 10 or 8 operating system,you should change the registry value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Windows 8/10 Registry Changes for 802.1x Authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Press the Windows logo &lt;STRONG&gt;Key+R&lt;/STRONG&gt; to open the Run box.&lt;/LI&gt;&lt;LI&gt;Type &lt;STRONG&gt;regedit&lt;/STRONG&gt; in the Run box, and then press Enter.&lt;/LI&gt;&lt;LI&gt;Locate and then select the following registry subkey:&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;On the &lt;STRONG&gt;Edit&lt;/STRONG&gt; menu, click New, and then click &lt;STRONG&gt;DWORD (32-bit)&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Type &lt;STRONG&gt;LsaAllowReturningUnencryptedSecrets&lt;/STRONG&gt;, and then press &lt;STRONG&gt;Enter&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Right-click &lt;STRONG&gt;LsaAllowReturningUnencryptedSecrets&lt;/STRONG&gt;, click &lt;STRONG&gt;Modify&lt;/STRONG&gt;…, type &lt;STRONG&gt;1&lt;/STRONG&gt; in the Value data box, and then click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Exit &lt;STRONG&gt;Registry&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE: No registry changes for windows 7&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 08:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772004#M486623</guid>
      <dc:creator>nithinrs78901</dc:creator>
      <dc:date>2019-01-03T08:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772012#M486631</link>
      <description>Client IP address isn't required for PEAP authentication whether its wired&lt;BR /&gt;or wireless.&lt;BR /&gt;&lt;BR /&gt;* Outer channel of EAP is established as part of SSID handshake similar to&lt;BR /&gt;wired connection.&lt;BR /&gt;* Next username/password for user authentication or machine-name/password&lt;BR /&gt;for machine authentication is encapsulated in EAP messages (inner channel)&lt;BR /&gt;* The credentials are exchanged with AP using EAP message, AP encapsulate&lt;BR /&gt;the messages over CAPWAP and sends them to WLC (this is using AP and WLC IP&lt;BR /&gt;addresses)&lt;BR /&gt;* Finally WLC decap CAPWAP messages and forward the EAP messages to ISE&lt;BR /&gt;using WLC/ISE IPs. ISE will decapsulate the messages to obtain name and&lt;BR /&gt;password for user or machine.&lt;BR /&gt;&lt;BR /&gt;This is the same concept in wire. You can see that for entire handshake,&lt;BR /&gt;client IP isn't required. For WiFi, EAP handshake is part of joining SSID&lt;BR /&gt;and if it fails, SSID joining will fail.&lt;BR /&gt;&lt;BR /&gt;Hope its clear.&lt;BR /&gt;&lt;BR /&gt;**** Please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Thu, 03 Jan 2019 08:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772012#M486631</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-01-03T08:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772218#M486636</link>
      <description>&lt;P&gt;You would almost never want to do PEAP computer or user authentication as shown using the Windows Native supplicant.&amp;nbsp; As mentioned if you set the supplicant for computer only you are ensuring the device is domain joined and thus a company asset.&amp;nbsp; If you allow the supplicant to transition to user authentication using PEAP you are losing the fact that the user is on a company asset.&amp;nbsp; You can use profiling/MAR cache to help determine the user is still on a company asset but each of those have their own pit falls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 13:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772218#M486636</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-01-03T13:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772237#M486641</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;how about passive-id and which you recommand would be more beneficial&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. profiling with AD, DNS, DHCP, HTTP, RADIUS&lt;/P&gt;&lt;P&gt;2. passive-id&lt;/P&gt;&lt;P&gt;3. if using posture, than HTTP and DHCP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 14:29:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772237#M486641</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-03T14:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772431#M486645</link>
      <description>&lt;P&gt;Big thanks to everyone who responded but Mohammed hit the nail right on the head for this one.&amp;nbsp; Thank you!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 18:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772431#M486645</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2019-01-03T18:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772438#M486650</link>
      <description>&lt;P&gt;Might this help you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116516-problemsolution-technology-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116516-problemsolution-technology-00.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 18:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication/m-p/3772438#M486650</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-03T18:34:46Z</dc:date>
    </item>
  </channel>
</rss>

