<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enterprise wireless with OTP authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442998#M526633</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nikhil,&lt;/P&gt;&lt;P&gt;i read many thins these days related to the topic, but i cannot agree with your post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With reference to this community document:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/wireless-mobility-documents/802-11-wlan-roaming-and-fast-secure-roaming-on-cuwn/ta-p/3143488" title="https://supportforums.cisco.com/t5/wireless-mobility-documents/802-11-wlan-roaming-and-fast-secure-roaming-on-cuwn/ta-p/3143488"&gt;802.11 WLAN Roaming and Fast Secure Roa... - Cisco Support Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In summary - it seems that full Authentication is done during normal, supported roaming. If we use fast roaming technologies on the WLC - we can speed up the things. Also if the authentication server has some caching functions - we can save some time. Otherwise - full authentication is done.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 24 Sep 2017 12:12:05 GMT</pubDate>
    <dc:creator>Alexander Vasilev</dc:creator>
    <dc:date>2017-09-24T12:12:05Z</dc:date>
    <item>
      <title>Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442990#M526619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;i spent couple of days researching is it possible enterprise wireless security design with OTP. The idea is to authenticate first the machine and then the user with OTP. If both successful - access to be granted. As far as my research went - i must rely on EAP-FAST and EAP Chaining (EAP-TLS and EAP-GTC as inner methods). But from here the unknown part follows - is it possible, does someone has such implementation and what is the user experience. Because if every time when the user roam to different AP (of course in the same mobility group) the OTP is required - it will be terrible experience. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Sep 2017 06:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442990#M526619</guid>
      <dc:creator>Alexander Vasilev</dc:creator>
      <dc:date>2017-09-18T06:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442991#M526621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could accomplish this with CWA Chaining (802.1X auth followed by CWA auth).&amp;nbsp; CWA supports RSA and RADIUS Token as well as SAML auth options.&amp;nbsp; You could optionally combine the CWA portion with device registration to eliminate continuous CWA reauth, then periodically purge device from registration to force new 1X + OTP auth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Sep 2017 16:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442991#M526621</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-09-18T16:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442992#M526623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Craig,&lt;/P&gt;&lt;P&gt;but i don't find the CWA appropriate...actually currently we are on such solution, but with CWA on WLC. The roaming is terrible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if i use MAC authentication - it is very weak (if used without profiling).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Sep 2017 20:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442992#M526623</guid>
      <dc:creator>Alexander Vasilev</dc:creator>
      <dc:date>2017-09-18T20:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442993#M526625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alexander, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You state that forcing reauth on each roam is considered too secure, but easing restriction based on MAC (post auth) is considered too insecure.&amp;nbsp; You are coming to the obvious conclusion that policy is often a balance between security controls and user experience/productivity!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If EAP Chaining is serving your purpose, then consider appropriate key caching mechanisms based on clients and test.&amp;nbsp; For example, dot1x + adaptive 11r may be suitable, but best to confer with wireless team.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, ISE 2.2+ supports RADIUS Token caching which could help reduce the need to reauth OTP on each reauth.&amp;nbsp; This may be your perfect balance between security and convenience, in addition to reduced reauth for viable key caching methods.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Sep 2017 20:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442993#M526625</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-09-18T20:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442994#M526628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig,&lt;/P&gt;&lt;P&gt;you are absolutely right, this is known "issue" - as something becomes more secure is more hard for use. But this is life &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/happy.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today i tested one part of the whole solution - authentication against the RADIUS Token Server (HID). EAP-FAST+EAP*GTC as inner method and everything works like a charm. No special protocols for fast roaming of the wireless (i know they are specific and most commonly not recommended if we want high compatibility). And even with roaming between APs - no requirement for token code input. BUT there is some session cache on the ISE, which i don't understand...because on each roaming between APs there was no request to the RADIUS token server, nor the client was asked for OTP code. And the RADIUS Token caching feature was not enabled in the RADIUS Token server configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone explain me what is this cache and how can it be controlled?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't finished the EAP-Chaining test, because for some reason the Machine authentication via certificates was not successful. Always fails. If someone can share experience with this i'll be very thankful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Sep 2017 20:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442994#M526628</guid>
      <dc:creator>Alexander Vasilev</dc:creator>
      <dc:date>2017-09-19T20:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442995#M526629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;L2 roaming on secure network typically does not change session ID so would not expect disruption.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Sep 2017 20:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442995#M526629</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-09-19T20:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442996#M526630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, but this session info where is cached and what control of the cache we have (cache time, erasing entry in the cache)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Sep 2017 05:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442996#M526630</guid>
      <dc:creator>Alexander Vasilev</dc:creator>
      <dc:date>2017-09-20T05:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442997#M526631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the client is doing proper roaming in the wireless network, the wireless controller will not do a re-auth of the user. The authentication info of the client is retained in the wireless controller &amp;amp;&amp;nbsp; the controller will not pass any authentication request to ISE. When I say proper roaming, I would mean the client will be moving from AP to another, without being in some areas no coverage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default this is&amp;nbsp; an in-built feature in WPA2+AES and you don't need fast roaming protocols.How long the controller retains the information of client depends on many parameter like session time-out, idle-timeout, bcast key refresh &amp;amp; I would say that will be pure wireless question&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Sep 2017 08:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442997#M526631</guid>
      <dc:creator>nikhilcherian</dc:creator>
      <dc:date>2017-09-20T08:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442998#M526633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nikhil,&lt;/P&gt;&lt;P&gt;i read many thins these days related to the topic, but i cannot agree with your post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With reference to this community document:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/wireless-mobility-documents/802-11-wlan-roaming-and-fast-secure-roaming-on-cuwn/ta-p/3143488" title="https://supportforums.cisco.com/t5/wireless-mobility-documents/802-11-wlan-roaming-and-fast-secure-roaming-on-cuwn/ta-p/3143488"&gt;802.11 WLAN Roaming and Fast Secure Roa... - Cisco Support Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In summary - it seems that full Authentication is done during normal, supported roaming. If we use fast roaming technologies on the WLC - we can speed up the things. Also if the authentication server has some caching functions - we can save some time. Otherwise - full authentication is done.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Sep 2017 12:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442998#M526633</guid>
      <dc:creator>Alexander Vasilev</dc:creator>
      <dc:date>2017-09-24T12:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise wireless with OTP authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442999#M526635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alex, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have replied to the forum topic &lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/wireless-mobility-documents/802-11-wlan-roaming-and-fast-secure-roaming-on-cuwn/ta-p/3143488" title="https://supportforums.cisco.com/t5/wireless-mobility-documents/802-11-wlan-roaming-and-fast-secure-roaming-on-cuwn/ta-p/3143488"&gt;802.11 WLAN Roaming and Fast Secure Roa... - Cisco Support Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Still, I believe this is best to discuss in a wireless forum, than in a ISE forum&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Nikhil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Sep 2017 15:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enterprise-wireless-with-otp-authentication/m-p/3442999#M526635</guid>
      <dc:creator>nikhilcherian</dc:creator>
      <dc:date>2017-09-24T15:38:29Z</dc:date>
    </item>
  </channel>
</rss>

