<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Machine authentication for IOS routers, switches in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598306#M519470</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;Hi team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;I’m working with a customer who has a requirement to authenticate routers against ISE using digital certificates.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: arial, helvetica, sans-serif; font-size: 15px; font-style: inherit;"&gt;They want to ensure that any network devices such as IOS routers, switches are subjected to machine &lt;/SPAN&gt;&lt;SPAN style="color: #58585b;"&gt;&lt;SPAN style="font-size: 15px; font-style: inherit;"&gt;authentication using identity certificates pre-installed on the device, when these devices are deployed to &lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;their network&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px; font-style: inherit;"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-style: inherit; font-size: 15px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;In essence, the routers and switches in their deployment should authenticate themselves before being granted network access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;This requirement of theirs stems from the fact that the entire solution is being designed for the defense vertical.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;Any insight on how this requirement can be met; ISE or otherwise will be much appreciated !&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Nov 2017 04:03:01 GMT</pubDate>
    <dc:creator>susreeni</dc:creator>
    <dc:date>2017-11-29T04:03:01Z</dc:date>
    <item>
      <title>Machine authentication for IOS routers, switches</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598306#M519470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;Hi team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;I’m working with a customer who has a requirement to authenticate routers against ISE using digital certificates.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: arial, helvetica, sans-serif; font-size: 15px; font-style: inherit;"&gt;They want to ensure that any network devices such as IOS routers, switches are subjected to machine &lt;/SPAN&gt;&lt;SPAN style="color: #58585b;"&gt;&lt;SPAN style="font-size: 15px; font-style: inherit;"&gt;authentication using identity certificates pre-installed on the device, when these devices are deployed to &lt;/SPAN&gt;&lt;SPAN style="font-size: 15px;"&gt;their network&lt;/SPAN&gt;&lt;SPAN style="font-size: 15px; font-style: inherit;"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-style: inherit; font-size: 15px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;In essence, the routers and switches in their deployment should authenticate themselves before being granted network access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;This requirement of theirs stems from the fact that the entire solution is being designed for the defense vertical.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 15px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-family: arial, helvetica, sans-serif;"&gt;Any insight on how this requirement can be met; ISE or otherwise will be much appreciated !&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2017 04:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598306#M519470</guid>
      <dc:creator>susreeni</dc:creator>
      <dc:date>2017-11-29T04:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication for IOS routers, switches</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598307#M519471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont get why the customer want this . This devices are usually add in to ise . In network device list . And for some reason authentication fail it will it will DENY ACCESS. If NAD is in deny access all endpoints will not able to have access. I think this is not recommend .And usually all Radius and Tacacs are included in triple AAA model .&lt;/P&gt;&lt;P&gt;Here in community we have some gurus and they will answer you but as i mention this is not good .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2017 07:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598307#M519471</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-11-29T07:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication for IOS routers, switches</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598308#M519472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you talking about NEAT. Please take a look at this doc.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116681-config-neat-cise-00.html" title="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116681-config-neat-cise-00.html"&gt;NEAT Configuration Example with Cisco Identity Services Engine - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Dec 2017 06:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598308#M519472</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2017-12-01T06:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication for IOS routers, switches</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598309#M519473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Krishnan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NEAT isn't the scenario that the customer is looking at.&lt;/P&gt;&lt;P&gt;From what I understand, NEAT is a 802.1x scenario where both the authenticator (IOS switch) as well as the supplicant mutually authenticate each other rather than only the supplicant being authenticated, which is normally the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The requirement is simply one where IOS routers, IOS switches themselves will be supplicants to the network with certificates being their 802.1x credentials (Perhaps EAP-TLS needs to be the 802.1x method?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Dec 2017 06:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598309#M519473</guid>
      <dc:creator>susreeni</dc:creator>
      <dc:date>2017-12-01T06:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication for IOS routers, switches</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598310#M519474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are talking about NDAC that establishes Trustsec domain boundary.&lt;/P&gt;&lt;P&gt;Here is the doc for that explains nicely all about NDAC&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/how_to_intro_macsec_ndac_guide.pdf" title="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/how_to_intro_macsec_ndac_guide.pdf"&gt;https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/how_to_intro_macsec_ndac_guide.pd…&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Dec 2017 07:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-for-ios-routers-switches/m-p/3598310#M519474</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2017-12-01T07:09:09Z</dc:date>
    </item>
  </channel>
</rss>

