<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE and Kerberos only AD in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748188#M488112</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Have you tried to debug during the authentication?  That should give more information around where the error is occuring.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;-Tim</description>
    <pubDate>Fri, 16 Nov 2018 16:06:14 GMT</pubDate>
    <dc:creator>Timothy Abbott</dc:creator>
    <dc:date>2018-11-16T16:06:14Z</dc:date>
    <item>
      <title>ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748136#M488110</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a customer that is trying testing ISE with an AD where he is turning off NTLM, and using only Kerberos.&lt;/P&gt;
&lt;P&gt;He says that when he tests a used from the test function directly, choosing Kerberos, all is fine.&lt;/P&gt;
&lt;P&gt;But when the has the client using dot1x (MSCHAPv2), then he gets a failute from ISE, saying user unknown or wrong password.&lt;/P&gt;
&lt;P&gt;He has checked the Kerberos Checkbox under the advanced capabilities in ISE (even if he is wondering why the setting says plain text password there).&lt;/P&gt;
&lt;P&gt;Can you please help us in understanding if it should work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks a lot&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 15:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748136#M488110</guid>
      <dc:creator>martucci</dc:creator>
      <dc:date>2018-11-16T15:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748188#M488112</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Have you tried to debug during the authentication?  That should give more information around where the error is occuring.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;-Tim</description>
      <pubDate>Fri, 16 Nov 2018 16:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748188#M488112</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-11-16T16:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748201#M488115</link>
      <description>&lt;P&gt;See&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-discussions/smb-445-protocol-for-ad-integration-in-ise/m-p/3452622#263834" target="_blank"&gt;Solved: SMB 445 protocol for AD integration in ... - Cisco Community&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kerberos only can be used for plain-text authentications, such as guest portal logins.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 16:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748201#M488115</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-11-16T16:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748243#M488116</link>
      <description>&lt;P&gt;Hi Hsing,&lt;/P&gt;
&lt;P&gt;thanks.&lt;/P&gt;
&lt;P&gt;so for dot1x, ISE will always speak NTLM to AD, and the protocol cannot be disabled , in order to enable Kerberos only?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 17:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3748243#M488116</guid>
      <dc:creator>martucci</dc:creator>
      <dc:date>2018-11-16T17:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3749193#M488117</link>
      <description>&lt;P&gt;Thanks Hsing,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We will ask the customer to test with GTC hat is a plain text password (they will have to use AnyConnect for that. Should it work as it is plain text?&lt;/P&gt;
&lt;P&gt;Thanks a lot&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 11:57:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/3749193#M488117</guid>
      <dc:creator>martucci</dc:creator>
      <dc:date>2018-11-19T11:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/4994678#M586267</link>
      <description>&lt;P&gt;For a solution posted by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;&amp;nbsp;I am attempting to follow the link from &lt;A href="https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/td-p/3748136" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/td-p/3748136&lt;/A&gt;&amp;nbsp;"&lt;SPAN&gt;See&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-discussions/smb-445-protocol-for-ad-integration-in-ise/m-p/3452622#263834" target="_blank" rel="noopener"&gt;Solved: SMB 445 protocol for AD integration in ... - Cisco Community&lt;/A&gt;" but denied access.&lt;/P&gt;&lt;P&gt;I am trying to access this page &lt;A href="https://community.cisco.com/t5/security-discussions/smb-445-protocol-for-ad-integration-in-ise/m-p/3452622#263834" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-discussions/smb-445-protocol-for-ad-integration-in-ise/m-p/3452622#263834&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 22:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/4994678#M586267</guid>
      <dc:creator>GeorgePerkins0204</dc:creator>
      <dc:date>2024-01-11T22:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/4994701#M586270</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/882713"&gt;@GeorgePerkins0204&lt;/a&gt;&amp;nbsp;That thread is posted in Cisco Security Partners forum.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;ISE can't use AD without port 445. This is required for MS-RPC.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;If your customer fears "Wannacry", please explain that it is an SMB1 exploit. ISE uses SMB2. The customer can disable SMB1 on the DCs, leaving SMB2 up.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;SMB is needed for several things.&amp;nbsp; It is the ONLY protocol that can authenticate PEAP EAP-MSCHAP credentials.&amp;nbsp; So it is usually not an option to disable it…&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Using AD as LDAP, we can't authenticate using EAP-MSCHAPv2, beside we won't be able to take advantages of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://technet.microsoft.com/en-us/library/cc730868(v=ws.11).aspx" rel="nofollow noopener noreferrer" target="_blank"&gt;Active Directory Sites and Services&lt;/A&gt;&amp;nbsp;for HA and all the other benefits that ISE AD connector offers. ...&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;BRKSEC2132 is no longer at CiscoLive site so I attached the PDF file.&lt;/P&gt;
&lt;P&gt;Also take a look at&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/215233-identity-service-engine-ise-and-active.html" target="_self"&gt;Understand Identity Service Engine (ISE) and Active Directory (AD)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 23:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/4994701#M586270</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2024-01-11T23:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/4995371#M586300</link>
      <description>&lt;P&gt;I cannot find documentation or blogs or tips where I turn off NTLM authentication in ISE. Like the original&amp;nbsp;@&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/13857" target="_self"&gt;&lt;SPAN class=""&gt;martucci&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp; post, we are a customer that needs to turn off NTLM on all domain devices and users. Audit of NTLM group policy settings are enabled to find all sources of NTLM authentication in the domain. I see ISE continuously using NTLM for user and device lookup in AD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I use ISE Administration &amp;gt;&amp;nbsp;Identity Management &amp;gt; External Identity Sources &amp;gt; Connection &amp;gt; select ISE node &amp;gt; Test User&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;There are three Authentication Type options in the Test User dialog: Kerberos, Lookup, MS-RPC. When I test each type they all work, returning expected results. Only the MS-RPC authentication type logs an NTLM audit record. The question then becomes, how do I disable MS-RPC lookups in ISE and require ISE to use only Kerberos?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISEtestuser.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/207152iA2C0ED1E898F3FB5/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISEtestuser.jpg" alt="ISEtestuser.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Log Name: Microsoft-Windows-NTLM/Operational&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Source: Microsoft-Windows-Security-Netlogon&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Date: 1/12/2024 10:01:59 AM&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Event ID: 8004&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Task Category: Auditing NTLM&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Level: Information&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Keywords: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;User: SYSTEM&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Computer: GHCDC003.corp.blur.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Description:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Secure Channel name: ONSNS3615ISE&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;User name: gperkins@corp.blur.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Domain name: NULL&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Workstation name: \\ONSNS3615ISE&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Secure Channel type: 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Audit NTLM authentication requests within the domain NULL that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to any of the Deny options.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;If you want to allow NTLM authentication requests in the domain NULL, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;If you want to allow NTLM authentication requests to specific servers in the domain NULL, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in the domain NULL to which clients are allowed to use NTLM authentication.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;Event Xml:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Event xmlns=&lt;A href="http://schemas.microsoft.com/win/2004/08/events/event" target="_blank" rel="noopener"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;System&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Provider Name="Microsoft-Windows-Security-Netlogon" Guid="{e5ba83f6-07d0-46b1-8bc7-7e669a1d31dc}" /&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;EventID&amp;gt;8004&amp;lt;/EventID&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Version&amp;gt;0&amp;lt;/Version&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Level&amp;gt;4&amp;lt;/Level&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Task&amp;gt;2&amp;lt;/Task&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Keywords&amp;gt;0x8000000000000000&amp;lt;/Keywords&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;TimeCreated SystemTime="2024-01-12T16:01:59.8876250Z" /&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;EventRecordID&amp;gt;8663101&amp;lt;/EventRecordID&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Correlation ActivityID="{91cb7c06-3883-0001-a87c-cb918338da01}" /&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Execution ProcessID="768" ThreadID="1440" /&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Channel&amp;gt;Microsoft-Windows-NTLM/Operational&amp;lt;/Channel&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Computer&amp;gt;GHCDC003.corp.blur.com&amp;lt;/Computer&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Security UserID="S-1-5-18" /&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;/System&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;EventData&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Data Name="SChannelName"&amp;gt;ONSNS3615ISE&amp;lt;/Data&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Data Name="UserName"&amp;gt;gperkins@corp.blur.com&amp;lt;/Data&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Data Name="DomainName"&amp;gt;NULL&amp;lt;/Data&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Data Name="WorkstationName"&amp;gt;\\ONSNS3615ISE&amp;lt;/Data&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;Data Name="SChannelType"&amp;gt;2&amp;lt;/Data&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;/EventData&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="1 2 3 4 5 6 7"&gt;&amp;lt;/Event&amp;gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Fri, 12 Jan 2024 16:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/4995371#M586300</guid>
      <dc:creator>GeorgePerkins0204</dc:creator>
      <dc:date>2024-01-12T16:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and Kerberos only AD</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/4995741#M586305</link>
      <description>&lt;P&gt;I have started a new topic since the above reply is to an old, closed thread. Please see:&amp;nbsp;&lt;A title="turn-off-ntlm-in-ise-use-kerberos-instead" href="https://community.cisco.com/t5/network-access-control/turn-off-ntlm-in-ise-use-kerberos-instead/m-p/4995740#M586304" target="_self"&gt;turn-off-ntlm-in-ise-use-kerberos-instead&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 19:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-kerberos-only-ad/m-p/4995741#M586305</guid>
      <dc:creator>GeorgePerkins0204</dc:creator>
      <dc:date>2024-01-12T19:49:08Z</dc:date>
    </item>
  </channel>
</rss>

