<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows 10 (and 7) native supplicant issues in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530247#M517352</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Gregory, I might actual face some of the issues in the first bullet, but while reading your response, I realised that I did not give much to work with when posting my question. So let me fill in some more information in case some more ideas would come out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We use machine authentication only and once that is successful, client has full access (Windows clients)&lt;/LI&gt;&lt;LI&gt;Computer policies are sent through AD and GPO&lt;/LI&gt;&lt;LI&gt;We have standardised environment with 3650 switches running code 3.6.5E&lt;UL&gt;&lt;LI&gt;We are looking to upgrade to 16.x release due to some bugs on the current code which are affecting our environment&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;We use legacy IBNS and not IBNS 2.0&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then the interface configuration is like this&lt;/P&gt;&lt;P&gt; description CLIENT_PORT&lt;/P&gt;&lt;P&gt; switchport access vlan xxx&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport voice vlan yyy&lt;/P&gt;&lt;P&gt; no logging event link-status&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize vlan xxx&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt; authentication event no-response action authorize vlan xxx&lt;/P&gt;&lt;P&gt; authentication event server alive action reinitialize&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication open&lt;/P&gt;&lt;P&gt; authentication order dot1x mab&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; authentication timer restart 0&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; no snmp trap link-status&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 5&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt; service-policy input MARK_TRAFFIC&lt;/P&gt;&lt;P&gt; service-policy output QUEUE&lt;/P&gt;&lt;P&gt; ip dhcp snooping limit rate 30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So based on that we would be hitting on the issue with the flex auth and next-method if I have understood correctly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Apr 2018 05:54:38 GMT</pubDate>
    <dc:creator>pohjaton1</dc:creator>
    <dc:date>2018-04-12T05:54:38Z</dc:date>
    <item>
      <title>Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530245#M517343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are moving our customer environment to low impact mode slowly and have been solving the different endpoint groups to authenticate those correctly before we take the action from open to low-impact mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However we have noticed that even though a Windows machines do authenticate correctly from the beginning, they fail to authenticate later on. We have been trying to search for best practise / working configuration from all around but no one seems to have posted such (or have not been able to find one.) Yes I know ISE is not responsible of the supplicants but for sure people has been struggling with these.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as far as we see there are some scenarios which might be the cause of the problem&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Interface power management. As far as we have understood, interface should never be allowed to be powered off by the OS&lt;/LI&gt;&lt;LI&gt;Sleep - return from sleep. Some articles indicate that Windows would only do user auth and not machine auth. Of course if the above statement is true, then this should not be an issue I guess&lt;/LI&gt;&lt;LI&gt;Hibernate - return from hibernate.&lt;/LI&gt;&lt;LI&gt;Swap between wireless/wired while having both connected&lt;/LI&gt;&lt;LI&gt;Re-authentication forced every 24 hours (for example)&lt;/LI&gt;&lt;LI&gt;Windows timers vs ISE timers&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Has anyone collected some working / best practises around the Windows native supplicant and ISE secure access deployment. Would be great if such common practises would be collected here as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2018 18:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530245#M517343</guid>
      <dc:creator>pohjaton1</dc:creator>
      <dc:date>2018-04-11T18:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530246#M517348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's hard to say for sure if this is a supplicant issue or switch/ISE configuration issue without more detail on the behaviour you're seeing, but there are two possible scenarios you should check.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;If the Windows machine is first authenticating via 802.1x but subsequent re-authentications are using MAB, you might be running into a caveat with FlexAuth in the legacy IBNS switch configuration. Take a look at the following white paper on FlexAuth and pay particular attention to the caveat with the superscript at the bottom of the document. &lt;A href="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-service/application_note_c27-573287.html" title="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-service/application_note_c27-573287.html"&gt;Flexible Authentication Order, Priority, and Failed Authentication - Cisco&lt;/A&gt; (Some platforms may support the Cisco AVPair attribute termination-action-modifier=1, which instructs the switch to retry only the last authentication method.) To resolve this, you can add this AV pair to the AuthZ Profile used for your 802.1x machines to resolve this issue.&lt;/LI&gt;&lt;LI&gt;If you're using MAR (was machine authenticated) as a matching condition, some of the scenarios you list are direct caveats for that legacy 'feature'. See the following document on the Pros and Cons of MAR. &lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116516-problemsolution-technology-00.html" title="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116516-problemsolution-technology-00.html"&gt;Machine Access Restriction Pros and Cons - Cisco&lt;/A&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Regards&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2018 21:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530246#M517348</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2018-04-11T21:58:19Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530247#M517352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Gregory, I might actual face some of the issues in the first bullet, but while reading your response, I realised that I did not give much to work with when posting my question. So let me fill in some more information in case some more ideas would come out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We use machine authentication only and once that is successful, client has full access (Windows clients)&lt;/LI&gt;&lt;LI&gt;Computer policies are sent through AD and GPO&lt;/LI&gt;&lt;LI&gt;We have standardised environment with 3650 switches running code 3.6.5E&lt;UL&gt;&lt;LI&gt;We are looking to upgrade to 16.x release due to some bugs on the current code which are affecting our environment&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;We use legacy IBNS and not IBNS 2.0&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then the interface configuration is like this&lt;/P&gt;&lt;P&gt; description CLIENT_PORT&lt;/P&gt;&lt;P&gt; switchport access vlan xxx&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; switchport voice vlan yyy&lt;/P&gt;&lt;P&gt; no logging event link-status&lt;/P&gt;&lt;P&gt; authentication event fail action next-method&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize vlan xxx&lt;/P&gt;&lt;P&gt; authentication event server dead action authorize voice&lt;/P&gt;&lt;P&gt; authentication event no-response action authorize vlan xxx&lt;/P&gt;&lt;P&gt; authentication event server alive action reinitialize&lt;/P&gt;&lt;P&gt; authentication host-mode multi-auth&lt;/P&gt;&lt;P&gt; authentication open&lt;/P&gt;&lt;P&gt; authentication order dot1x mab&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt; authentication port-control auto&lt;/P&gt;&lt;P&gt; authentication timer reauthenticate server&lt;/P&gt;&lt;P&gt; authentication timer restart 0&lt;/P&gt;&lt;P&gt; mab&lt;/P&gt;&lt;P&gt; no snmp trap link-status&lt;/P&gt;&lt;P&gt; dot1x pae authenticator&lt;/P&gt;&lt;P&gt; dot1x timeout tx-period 5&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt; service-policy input MARK_TRAFFIC&lt;/P&gt;&lt;P&gt; service-policy output QUEUE&lt;/P&gt;&lt;P&gt; ip dhcp snooping limit rate 30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So based on that we would be hitting on the issue with the flex auth and next-method if I have understood correctly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2018 05:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530247#M517352</guid>
      <dc:creator>pohjaton1</dc:creator>
      <dc:date>2018-04-12T05:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530248#M517356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't sound like you're using MAR, and the FlexAuth caveat I mentioned should only apply if you're using the following switch config:&lt;/P&gt;&lt;P&gt; authentication order mab dot1x&lt;/P&gt;&lt;P&gt; authentication priority dot1x mab&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's tough to say where the problem could lie without knowing more details about the specific symptom.&lt;/P&gt;&lt;P&gt;If you haven't done so already, you might just check the "Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions" chapter in the Reference section of the Admin Guide for your ISE version to see if there's anything you've missed.&lt;/P&gt;&lt;P&gt;Example from ISE 2.2 - &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_0100001.html" title="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_0100001.html"&gt;Cisco Identity Services Engine Administrator Guide, Release 2.2 - Switch and Wireless LAN Controller Configuration Requ…&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can duplicate the problem, you might need to start looking at packet captures, endpoint tracking, debugs (you might need TAC help with this), etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2018 07:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3530248#M517356</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2018-04-12T07:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3946399#M517359</link>
      <description>Hello,&lt;BR /&gt;I have the same problem in a wired environment. Dot1x authentication and authorization succeeds. Client gets IP from DHCP server and Switch port gets it's correct Vlan from NPS server. Both switch and host know each other (Arp). Still I'm not able to ping from one to another... I've been searching now for several days, but can't find the answer. Do you have any ideas?&lt;BR /&gt;Thanks!</description>
      <pubDate>Wed, 23 Oct 2019 14:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3946399#M517359</guid>
      <dc:creator>o_mahieu</dc:creator>
      <dc:date>2019-10-23T14:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3946402#M517362</link>
      <description />
      <pubDate>Wed, 23 Oct 2019 14:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3946402#M517362</guid>
      <dc:creator>o_mahieu</dc:creator>
      <dc:date>2019-10-23T14:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3946658#M517365</link>
      <description>&lt;P&gt;There are various reasons you could be seeing the symptom you're describing and there is not enough context or information in the show commands that you've provided to determine the cause.&lt;/P&gt;
&lt;P&gt;If your Authorisation Policy is using a dACL, be aware that legacy switches require an IP ACL applied to the switchport to be able to apply a dACL sent by the RADIUS server to override it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a look at the output from 'show authentication sessions interfaces fa0/3 details' to see if that indicates the dACL is applied.&lt;/P&gt;
&lt;P&gt;Check your configuration against the document at the following link as a guideline. It's quite old, but still relevant for Wired 802.1x deployments using the legacy IBNS framework.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If all else fails, I suggest you open a TAC case to investigate further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Greg&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 20:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3946658#M517365</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2019-10-23T20:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3946665#M517367</link>
      <description>&lt;P&gt;Yes, i found out this was the reason. Thanks for your help anyway!&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2019 20:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/3946665#M517367</guid>
      <dc:creator>o_mahieu</dc:creator>
      <dc:date>2019-10-23T20:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/4002370#M517369</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In using 802.1x -Windows AD - Cisco 2960 switch , everything works fine when using PEAP-MSCHAP.&lt;/P&gt;&lt;P&gt;When using PEAP-TLS , first authentication succeeds. After two minutes, the switch starts reauthenticating, with failure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any idea what can cause this problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2019 19:31:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/4002370#M517369</guid>
      <dc:creator>o_mahieu</dc:creator>
      <dc:date>2019-12-21T19:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/4006747#M517370</link>
      <description>&lt;P&gt;Hi Olivier,&lt;/P&gt;
&lt;P&gt;From the screenshot attached, the switch is reporting a 'timeout' which would mean that the supplicant stopped responding. There are multiple variables that could cause that scenario.&lt;/P&gt;
&lt;P&gt;If you are able to replicate this issue easily, I would suggest opening a TAC case to investigate. TAC will likely need to get packet captures from the client and ISE as well as a number of debugs from the switch to investigate in more depth.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Greg&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 03:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/4006747#M517370</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-01-06T03:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 (and 7) native supplicant issues</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/4080819#M560179</link>
      <description>&lt;P&gt;Community,&lt;/P&gt;&lt;P&gt;I have the same issue.&amp;nbsp; Windows native supplicant runs via "Wired AutoConfig" and for me restarting the service in Windows forces a reauth in ISE and thereby fixes the issue but only for a while.&amp;nbsp; The issue returns sometime later and restarting the service fixes it.&amp;nbsp; I'm trying to find a common denominator here.&amp;nbsp; We too are trying to move towards Low-Impact mode.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Pete&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 21:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-and-7-native-supplicant-issues/m-p/4080819#M560179</guid>
      <dc:creator>pnowikow</dc:creator>
      <dc:date>2020-05-06T21:07:18Z</dc:date>
    </item>
  </channel>
</rss>

