<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567822#M497096</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Arne,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I already checked and followed Katherine's Post. I already downloaded the CA Cert from CA server to ISE as trusted certificate but from the client side what I did to make the authentication successful is I manually added the default self-signed from the system certificate of ISE to windows 7 and windows 8 clients. Is it the same certificate should I used in order for the AD to push to windows clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arvie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 May 2017 03:54:57 GMT</pubDate>
    <dc:creator>a.burlaos</dc:creator>
    <dc:date>2017-05-09T03:54:57Z</dc:date>
    <item>
      <title>12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567818#M497092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm quite new to the system and i'm currently installing Cisco ISE 2.1. I've tried to connect 1 windows client (added to the domain) to ISE using the default policy. My authentication order from the switch is dot1x then Mab then WebAuth but when the client tried to authenticate using dot1x ISE receive an error (&lt;SPAN style="color: #ff0000; font-family: Arial; font-size: 12px; background-color: #fafafa;"&gt;12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate&lt;/SPAN&gt;). Then the windows client will successfully authenticate as MAB instead of dot1x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion or any missing configurations needed to authenticate windows client using wired 802.1x?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, what is the correct entry for cts sxp commands?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging monitor informational&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;aaa authentication dot1x default group radius&lt;/P&gt;&lt;P&gt;aaa authorization network default group radius &lt;/P&gt;&lt;P&gt;aaa authorization auth-proxy default group CiscoISE &lt;/P&gt;&lt;P&gt;aaa accounting auth-proxy default start-stop group CiscoISE&lt;/P&gt;&lt;P&gt;aaa accounting dot1x default start-stop group radius&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp snooping vlan 51&lt;/P&gt;&lt;P&gt;no ip dhcp snooping information option&lt;/P&gt;&lt;P&gt;ip dhcp snooping&lt;/P&gt;&lt;P&gt;no ip domain-lookup&lt;/P&gt;&lt;P&gt;ip domain-name xu.local&lt;/P&gt;&lt;P&gt;ip device tracking&lt;/P&gt;&lt;P&gt;ip admission name CiscoISE proxy http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;cts sxp enable&lt;/P&gt;&lt;P&gt;cts sxp default source-ip 172.16.1.170 &lt;/P&gt;&lt;P&gt;cts sxp default password 7 09747B441A54044259071C23&lt;/P&gt;&lt;P&gt;cts sxp connection peer 10.200.1.165 password default mode peer listener&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;fallback profile CiscoISE&lt;/P&gt;&lt;P&gt; ip access-group CiscoISE in&lt;/P&gt;&lt;P&gt; ip admission CiscoISE&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 51&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport block unicast&lt;/P&gt;&lt;P&gt; switchport voice vlan 10&lt;/P&gt;&lt;P&gt; ip arp inspection limit rate 60&lt;/P&gt;&lt;P&gt; ip access-group ACL-DEFAULT in&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication open&lt;/P&gt;&lt;P&gt; authentication order dot1x mab webauth&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication timer inactivity 60&lt;/P&gt;&lt;P&gt; authentication violation restrict&lt;/P&gt;&lt;P&gt; authentication fallback Dot1X&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; snmp trap mac-notification change added&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 60&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt; spanning-tree bpduguard enable&lt;/P&gt;&lt;P&gt; ip dhcp snooping limit rate 60&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging origin-id ip&lt;/P&gt;&lt;P&gt;logging source-interface Vlan999&lt;/P&gt;&lt;P&gt;logging host 10.200.1.165 transport udp port 20514&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;snmp-server community cisosnmp RO&lt;/P&gt;&lt;P&gt;snmp-server community public RW&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;/P&gt;&lt;P&gt;snmp-server host 10.200.1.165 mac&amp;nbsp; mac-notification snmp&lt;/P&gt;&lt;P&gt;snmp-server host 10.200.1.165 public &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius-server attribute 6 on-for-login-auth&lt;/P&gt;&lt;P&gt;radius-server attribute 6 support-multiple&lt;/P&gt;&lt;P&gt;radius-server attribute 8 include-in-access-req&lt;/P&gt;&lt;P&gt;radius-server host 10.200.1.165 auth-port 1812 acct-port 1813 key 7 112A484114425A3F57&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arvie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567818#M497092</guid>
      <dc:creator>a.burlaos</dc:creator>
      <dc:date>2020-02-21T18:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567819#M497093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nino-&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f9f9f9; color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;The client machine is not accepting the certificate from Cisco ISE since it cannot validate it.&amp;nbsp; It isn't a best practice to use ISE as the certificate authority.&amp;nbsp; If you have a server that is capable to run CA services, that would be a better scenario.&amp;nbsp; You must have the certificate chain from the CA server (root CA) installed on the client as well as in ISE trusted certificates in order to have PKI function correctly.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f9f9f9; color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f9f9f9; color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f9f9f9; color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;HTH-&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f9f9f9; color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f9f9f9; color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;Vince&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Apr 2017 16:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567819#M497093</guid>
      <dc:creator>vrostowsky</dc:creator>
      <dc:date>2017-04-26T16:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567820#M497094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vince,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the response. Do you have any recommendations or best approach if I have this kind of setup?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. AD Server&lt;/P&gt;&lt;P&gt;2. CA Server (not the AD server)&lt;/P&gt;&lt;P&gt;3. Cisco ISE Server&lt;/P&gt;&lt;P&gt;4. Domain PC&lt;/P&gt;&lt;P&gt;5. Non Domain PC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arvie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 May 2017 02:55:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567820#M497094</guid>
      <dc:creator>a.burlaos</dc:creator>
      <dc:date>2017-05-09T02:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567821#M497095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have a look at the very good and extensive blog from Katherine&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/migration-blogpost/8170"&gt;ISE - Adding Certificates to ISE and Creating Certificate Profiles&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For EAP-PEAP you could also try to configure your client to ignore server certificate checking and then it won't validate the ISE server certificate.&amp;nbsp; But that is just a quick and dirty workaround.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also written a blog article on using OpenSSL as a Certificate Authority in case you cannot get your hands on a Windows CA - you can of course also use ISE as your CA.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/migration-blogpost/8901"&gt;Rapid prototyping ISE Policies without any real networking hardware (part 3)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The answer is always 'it depends...'.&amp;nbsp; But in my experience, when doing EAP-TLS you're best off using an enterprise CA such as Windows Server because it integrates well with AD, and also provides certificate revocation services (CRL/OCSP). It is also well understood in most IT Enterprises.&amp;nbsp; For lab purposes you can get away with openssl.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 May 2017 03:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567821#M497095</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-05-09T03:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567822#M497096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Arne,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I already checked and followed Katherine's Post. I already downloaded the CA Cert from CA server to ISE as trusted certificate but from the client side what I did to make the authentication successful is I manually added the default self-signed from the system certificate of ISE to windows 7 and windows 8 clients. Is it the same certificate should I used in order for the AD to push to windows clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arvie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 May 2017 03:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567822#M497096</guid>
      <dc:creator>a.burlaos</dc:creator>
      <dc:date>2017-05-09T03:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567823#M497097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Installing the ISE self-signed certificate in clients will certainly work - but the self signed certs will expire pretty soon (I think out of the box they are valid for 1 year only). Self signed certs are mostly useful for getting you started - but you should rather consider creating an externally signed certificate for your ISE servers.&amp;nbsp; You can create longer lasting certificates on external CA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of the immediate benefits of using your corporate CA's, is that if your clients already have your corporate CA chain in their trust store, then they will automatically trust ISE because it was signed by that CA hierarchy.&amp;nbsp; No need to push the ISE self signed cert to all Windows clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e. your organisation 'MegaCorp' could have a PKI hierarchy as follows&lt;/P&gt;&lt;P&gt;Mega-Root-CA&lt;/P&gt;&lt;P&gt;&amp;nbsp; Mega-Issuing-CA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You push this CA chain to all of your corporate workstations as Trusted Certificates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ISE you will create a certificate signing request on your PAN for 'EAP Authentication' for the PSN's that you require (use the SAN feature so that you can make one certificate for all of your PAN's - if you like).&amp;nbsp; Hand the CSR to your PKI and get back the certificate which you then bind to the PSN(s).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When your windows clients perform an EAP-PEAP auth they will then honour the ISE server cert (as long as it's still valid and not revoked) because the ISE cert was signed by the Mega-Issuing-CA, which is a windows trusted CA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 May 2017 04:35:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3567823#M497097</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2017-05-09T04:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3674842#M497098</link>
      <description>Is your windows supplicant trusting the ISE certificate? Under the windows supplicant configuration you either have to explicitly trust ISE certificate (best with well known certificate installed on your ISE or you have to manually install ISE self signed certificate on the client itself) or remove the requirement for trust&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Jul 2018 22:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12321-peap-failed-ssl-tls-handshake-because-the-client-rejected/m-p/3674842#M497098</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-07-25T22:12:16Z</dc:date>
    </item>
  </channel>
</rss>

