<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Authentication Methods in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758890#M487594</link>
    <description>I’ll give it a shot, but I see this to be a shortcoming for ISE not being able to see what specific method was used with out opening the full authentication report.&lt;BR /&gt;</description>
    <pubDate>Thu, 06 Dec 2018 11:37:29 GMT</pubDate>
    <dc:creator>Admin Eastland</dc:creator>
    <dc:date>2018-12-06T11:37:29Z</dc:date>
    <item>
      <title>Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758818#M487444</link>
      <description>&lt;P&gt;I have a five year old deployment running 2.4 patch 4. When I built ISE I originally wanted domain computers to authenticate using EAP-TLS. For reasons I can't remember I could not get that working and I settled for MAB for machine authentication and PEAP-MSCHAPv2 for user authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yesterday I started to work with EAP-TLS authentication again and I got a wired authentication working for EAP-TLS. The problem is that I had several machines drop their sessions and try to use EAP-TLS. This totally locked their authentication and I was forced to turn of my EAP-TLS rule. The problem was that I created a whole new rule for EAP-TLS, but I made the mistake of putting the rule above my PEEP rule. I have since moved the EAP-TLS below PEAP, but my test machine stops at the PEAP rule with the error saying that I had a computer using a rule for authentication using username and password, but the machine is configured for certificate authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need some assistance with an authentication rule that will allow both EAP methods to live together without interference of each other. I'm wondering if under the PEAP and EAP-TLS authentication rules if I need to set the advanced options i.e. "if authentication failes" set it to "continue" rather than "reject" or something like that. Since I am making headway on EAP-TLS I would like to continue to get this working for wireless so I can have it complete to where all I have to do is set the GPO to pull the machine/user certificate and go live. Any assistance would be great. Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 09:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758818#M487444</guid>
      <dc:creator>Admin Eastland</dc:creator>
      <dc:date>2018-12-06T09:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758825#M487446</link>
      <description>Can you send us the screenshot of the authentication policies you have configured and also the screenshots of identity source sequences you have used in respective authentication policies?&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 09:55:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758825#M487446</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-06T09:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758839#M487448</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="All Auth rules" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/25408i15382D290F7AA045/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-12-06 at 5.09.25 AM.png" alt="All Auth rules" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;All Auth rules&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PEAP" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/25409i0D3CC8C663655B96/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-12-06 at 5.10.06 AM.png" alt="PEAP" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;PEAP&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EAP-TLS" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/25410iAB002B693DE919BC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-12-06 at 5.10.41 AM.png" alt="EAP-TLS" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;EAP-TLS&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 10:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758839#M487448</guid>
      <dc:creator>Admin Eastland</dc:creator>
      <dc:date>2018-12-06T10:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758842#M487449</link>
      <description>&lt;P&gt;Hi Eastland,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you screen the rules unless private information there to see how you put the rules?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;B&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 10:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758842#M487449</guid>
      <dc:creator>Beacon Bits</dc:creator>
      <dc:date>2018-12-06T10:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758847#M487533</link>
      <description>&lt;P&gt;Just did that.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 10:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758847#M487533</guid>
      <dc:creator>Admin Eastland</dc:creator>
      <dc:date>2018-12-06T10:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758859#M487534</link>
      <description>Use All_User_ID_Stores and make sure you choose Default Network Access as the allowed protocols which usually has all the protocols enabled including EAP-TLS and PEAP-MsCHAPv2.&lt;BR /&gt;&lt;BR /&gt;This should do.&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 10:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758859#M487534</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-06T10:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758861#M487587</link>
      <description>&lt;P&gt;The way I do this is to create &lt;STRONG&gt;one Policy Set&lt;/STRONG&gt; called Wireless 802.1X&amp;nbsp; (or Wired 802.1X) and then in the allowed protocols you select PEAP and EAP-TLS only.&lt;/P&gt;
&lt;P&gt;In the Authentication Rules you have one Rule for EAP-TLS where you specify your certificate profile, and for EAP-PEAP you can use whatever Identity Source Sequence that applies to you (e.g. AD Join Points etc.)&lt;/P&gt;
&lt;P&gt;In Authorization you can perform all the necessary checks - again have one Rule per EAP Method.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758861#M487587</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-12-06T11:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758866#M487588</link>
      <description>My concern with this is that when I look at the source sequence for All_User_ID_Stores the certificate authentication profile is not listed. How will it know to use that when it sees and EAP-TLS session?&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758866#M487588</guid>
      <dc:creator>Admin Eastland</dc:creator>
      <dc:date>2018-12-06T11:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758868#M487589</link>
      <description>That will not fly if you want both of them to be in the same rule and that is the reason why you see the error that ISE is configured to use cert based authentication only.&lt;BR /&gt;&lt;BR /&gt;If you do it the way I have mentioned, you can have clients use whatever protocol they would like to and ISE will accept whatever protocol client prefers.&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758868#M487589</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-06T11:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758872#M487590</link>
      <description>When I created my authorization rules I never really set authentication method as part of the rule since I knew that I was using pretty much the default authentication method of PEAP-MSCHAPv2. It sounds like what I would need to do is explicitly name EAP methods for each rule in my policies for this to work, correct?&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:17:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758872#M487590</guid>
      <dc:creator>Admin Eastland</dc:creator>
      <dc:date>2018-12-06T11:17:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758885#M487591</link>
      <description>I would really like to see the authentication method used in the live logs. This is why I asked if I could just change “REJECT” under “if with fails to “CONTINUE” for PEAP ? My thought is that it would continue to the next rule. I would then set EAP-TLS to “CONTINUE” as well so that if an PEAP session fails the first time it would loop rather than hard stop at EAP-TLS if a supplicant is the problem. I would rather send a building tech to fix a misconfigured supplicant than to have it hard stop on the wrong rule. Will this work?&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758885#M487591</guid>
      <dc:creator>Admin Eastland</dc:creator>
      <dc:date>2018-12-06T11:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758887#M487592</link>
      <description>From the screenshot that was sent, It seems like you have explicitly configure separate rules for each protocol. What I am suggesting is to use one rule for all types of EAP methods.&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758887#M487592</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-06T11:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758888#M487593</link>
      <description>Continue option does not work for EAP or PEAP&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758888#M487593</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-06T11:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758890#M487594</link>
      <description>I’ll give it a shot, but I see this to be a shortcoming for ISE not being able to see what specific method was used with out opening the full authentication report.&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Dec 2018 11:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758890#M487594</guid>
      <dc:creator>Admin Eastland</dc:creator>
      <dc:date>2018-12-06T11:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758920#M487595</link>
      <description>&lt;P&gt;That's appears to have worked, but I will probably take this up with TAC. I would really like to see the individual authentication methods used in the live logs rather than having to expand the authentication detail. At any rate, thanks for your input.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 12:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758920#M487595</guid>
      <dc:creator>Admin Eastland</dc:creator>
      <dc:date>2018-12-06T12:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758923#M487596</link>
      <description>&lt;P&gt;You can do that without expanding the Authentication details. PFA the screenshot.&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screen Shot 2018-12-06 at 6.18.02 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/25420i13F864F2AD76243A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-12-06 at 6.18.02 PM.png" alt="Screen Shot 2018-12-06 at 6.18.02 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just check those check boxes and drag them up or down to place the column where you want and this will help you check the auth method/protocol without opening live logs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 12:50:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3758923#M487596</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-06T12:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Authentication Methods</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3759215#M487598</link>
      <description>&lt;P&gt;The authentication protocol is listed in the live logs Authentication Protocol column.&amp;nbsp; Also if you have a good naming convention on your authorization profiles you should know exactly what happened:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Wired_Dot1x_EAP-TLS_Domain_Computer&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have no questions when I see that in my logs.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 19:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-authentication-methods/m-p/3759215#M487598</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-12-06T19:49:03Z</dc:date>
    </item>
  </channel>
</rss>

