<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Match EAP-TLS as Authentication Condition in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3953983#M493733</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to build a policy that can differnciate between EAP-TLS and PEAP as we migrate from one to another. I am trying to achieve this by configuring and authentication policy that matches based on the same configuration as&amp;nbsp;&lt;SPAN class=""&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/189012" target="_self"&gt;victguti&lt;/A&gt;&amp;nbsp;has in his second image. ( if NetworkAccess&amp;gt;EapAuthentication&amp;gt;Equals&amp;gt;EAP-TLS). However, under network access, EAPAuthentication does not appear as an option and if I create a condition manually to match it, it appears in the list but is greyed out and cant be selected. Any Ideas at all?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Many Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Nov 2019 13:29:58 GMT</pubDate>
    <dc:creator>cs_macker</dc:creator>
    <dc:date>2019-11-06T13:29:58Z</dc:date>
    <item>
      <title>Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704175#M493662</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to create an authentication rule to match EAP-TLS authentication requests but the system (ISE 2.2 Patch 7) doesn't allow me. As you can see on the attached screenshots, I receive a warning when I create the Authentication Compound Condition and I am not able to use it in the Authentication policy.&lt;BR /&gt;If I add the condition manually (Add/Attribute Value) on the authentication rule, I don't receive any warning (also screenshot attached).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to know: &lt;BR /&gt;- Why I cannot use a Library Compound Condition but I can add the condition using Add/Attribute Value in the authentication rule?&lt;BR /&gt;- If I do it using Add/Attribute Value in the authentication rule, will this configuration work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and regards,&lt;/P&gt;
&lt;P&gt;Víctor.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Sep 2018 16:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704175#M493662</guid>
      <dc:creator>victguti</dc:creator>
      <dc:date>2018-09-10T16:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704268#M493663</link>
      <description>&lt;P&gt;Why do you want to call out EAP-TLS specifically in the authentication phase?&amp;nbsp; Just build an Identity Source Sequence that encompasses both your Active Directory domain and your Certificate Authentication Profile (CAP) and you can cover both PEAP and EAP-TLS use cases in your authentication phase.&amp;nbsp; Use the default authentication rule and assign the ISS.&amp;nbsp; The only reason to call out specifics in the authentication phase is if you have different CAPs.&amp;nbsp; With modern certs using SAN fields for almost everything you rarely if ever need a CAP other than pointing at the SAN field for identity information.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Sep 2018 18:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704268#M493663</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-10T18:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704592#M493664</link>
      <description>&lt;P&gt;Hi Paul,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks for your answer. Using an ISS was also my first approach but it is a requirement of the project to split each authentication protocol in an authentication rule.&lt;/P&gt;
&lt;P&gt;As per ISE configuration we should be able to do it as it is allowed to use these attributes as condition in a authentication rule. However, it is quite strange that if we create a Compound Condition with the same condition, it cannot be used in the authentication rule (I know it can be used in a sub-rule but it doesn't fit the case I want to cover). That's&amp;nbsp;why I am wondering if it is a supported configuration that will actually work or it shouldn't be allowed by ISE interface to&amp;nbsp;use EAPAuthentication or EAPTunnel attributes in the first condition of an authentication rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 07:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704592#M493664</guid>
      <dc:creator>victguti</dc:creator>
      <dc:date>2018-09-11T07:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704791#M493665</link>
      <description>&lt;P&gt;I can't remember what condition works in that version of code to split it out at authentication phase.&amp;nbsp; In 2.3+ you can use Network Access:EAP Authentication like you are trying to use.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Honestly, the requirement makes no sense.&amp;nbsp; Part of our job as ISE installers is to educate the customer on how ISE works and steer them to the correct setup.&amp;nbsp; Saying they want to split out EAP-TLS/PEAP in the authentication phase means they don't understand how the ISS works and are making the authentication configuration more complex and less efficient with no security benefit.&amp;nbsp; You will still need to do protocol checks in the authorization phase if you are going to allow more than EAP-TLS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The basic fundamental of ISE that I emphasis with all my customers is the authentication phase only job is to answer the question "Are the credentials provided correct?".&amp;nbsp; Any AD account (and local accounts of if you allow them) and any valid certificate from CAs you trust for client authentication should pass the authentication phase.&amp;nbsp; All the magic of ISE happens in the authorization phase.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 13:02:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704791#M493665</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-11T13:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704858#M493666</link>
      <description>&lt;P&gt;Victor, looks to be ISE UI bug. If you can use it as manually (Or&amp;nbsp;AKA 'in-line') condition within the authentication rule then it is certainly supported.&lt;/P&gt;
&lt;P&gt;By the way, if it is just one condition, you could try it with simple condition instead of compound condition if you still want to use library instead of in-line.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 14:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3704858#M493666</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-11T14:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3705678#M493729</link>
      <description>&lt;P&gt;Many thanks howon!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 15:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3705678#M493729</guid>
      <dc:creator>victguti</dc:creator>
      <dc:date>2018-09-12T15:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3710392#M493730</link>
      <description>&lt;P&gt;Hello Hosuk,&lt;/P&gt;
&lt;P&gt;This authentication rule has been configured but it never get matched - even when it should.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once again please – is this really supposed to work? Is this supported by design?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 12:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3710392#M493730</guid>
      <dc:creator>imihajlo</dc:creator>
      <dc:date>2018-09-20T12:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3710681#M493731</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have validated the following setup works with&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;both 2.4p3 and 2.2p10. The setup is a bit convoluted with 2.2 since you have to make a&amp;nbsp;rule with dummy condition that will be true all the time&amp;nbsp;(called ‘Auth1’ in my example below).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ISE 2.4p3:&lt;/SPAN&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-20 at 1.40.46 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19007iBE96360637B47D79/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-20 at 1.40.46 PM.png" alt="Screen Shot 2018-09-20 at 1.40.46 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ISE 2.2p10:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-09-20 at 1.40.24 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/19008iA2D0AE1B807C6D85/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-09-20 at 1.40.24 PM.png" alt="Screen Shot 2018-09-20 at 1.40.24 PM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 19:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3710681#M493731</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2018-09-20T19:14:09Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3953983#M493733</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to build a policy that can differnciate between EAP-TLS and PEAP as we migrate from one to another. I am trying to achieve this by configuring and authentication policy that matches based on the same configuration as&amp;nbsp;&lt;SPAN class=""&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/189012" target="_self"&gt;victguti&lt;/A&gt;&amp;nbsp;has in his second image. ( if NetworkAccess&amp;gt;EapAuthentication&amp;gt;Equals&amp;gt;EAP-TLS). However, under network access, EAPAuthentication does not appear as an option and if I create a condition manually to match it, it appears in the list but is greyed out and cant be selected. Any Ideas at all?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Many Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2019 13:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3953983#M493733</guid>
      <dc:creator>cs_macker</dc:creator>
      <dc:date>2019-11-06T13:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: Match EAP-TLS as Authentication Condition</title>
      <link>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3953994#M493735</link>
      <description>You don't need to break it out in the authentication section.  That is why ISE has identity source sequences. . Our standard setup is:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;1)    Create a certificate authentication profile (CAP) to specify where in the certificate you want ISE to collect the identity from, usually the SAN field.&lt;BR /&gt;&lt;BR /&gt;2)    Create an identity source sequence, we usually call it Cert_Active_Directory, that ties together the CAP and your AD source.&lt;BR /&gt;&lt;BR /&gt;3)    Apply the identity source sequence to the default authentication rule in your policy set.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Then all your work happens in the authorization phase.  You specify PEAP or EAP-TLS in your authorization rules to match the different conditions you want to allow.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Nov 2019 13:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/match-eap-tls-as-authentication-condition/m-p/3953994#M493735</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-11-06T13:41:53Z</dc:date>
    </item>
  </channel>
</rss>

