<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EAP TLS in closed mode, solutions for first time log in in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549610#M530370</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul, yes we are using windows native supplicants. What you mentioned regarding the single sign on and the delay, is a good idea, I will give it a try,&amp;nbsp; I think this can fix half of my problems (at least the biggest one) for user cert. I will still need to find a way to put machine cert the very first time, but at least for users I think this can be good solution. Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Apr 2017 14:26:51 GMT</pubDate>
    <dc:creator>esuarez</dc:creator>
    <dc:date>2017-04-05T14:26:51Z</dc:date>
    <item>
      <title>EAP TLS in closed mode, solutions for first time log in</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549607#M530367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;Hi group,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;I’m working on a new ISE deploy using EAP TLS for user authentication, all is working as expected. We are trying to look at migrating to Closed Mode phase, but we are coming to a type of chicken and the eggs issues for Closed Mode for when new windows computers will be &lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;deployed that they don’t have yet user certificate. We are looking at some possible solutions and I wonder if I’m missing other ways to get the user certificate on a brand new computer.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;Here is the options we are thinking:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0 0 0 48px; text-indent: -0.25in;"&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-stretch: normal; color: #000000; font: 7pt 'Times New Roman'; font-size-adjust: none; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;Create an authorization rule that will allow temporary network access if endpoint MAC address is member of specific Endpoint Identity group. Create a RBAC that will &lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;allow the team that build new windows computer to access ISE so they can map endpoint MAC address to that group and once the machine is finished (added to domain and with user cert) they can remove the mapping from ISE. (Will works but need manual intervention)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0 0 0 48px; text-indent: -0.25in;"&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-stretch: normal; color: #000000; font: 7pt 'Times New Roman'; font-size-adjust: none; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;Create an authorization rule that all windows computers doing MAB will get an authorization profile that will allow some access like DHCP, DNS, AD so they can get certificate via GPO. (will work but will open too much network access to all failed computers)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0 0 0 48px; text-indent: -0.25in;"&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-stretch: normal; color: #000000; font: 7pt 'Times New Roman'; font-size-adjust: none; margin: 0px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;Disable NAC on specific port where the new computers will be deployed. (This will work providing security will be OK with it)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0 0 11px 48px;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;Have you come to this problem in the past? What solution you used?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;Thanks in advance&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: 12pt;"&gt;Eduardo&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Apr 2017 20:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549607#M530367</guid>
      <dc:creator>esuarez</dc:creator>
      <dc:date>2017-04-04T20:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: EAP TLS in closed mode, solutions for first time log in</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549608#M530368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you can control the environment enough to not need option 2 then maybe consider option 4.  Use the API to add and remove the endpoint (or reassign it after provisioned):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/api_ref_guide/api_ref_book/ise_api_ref_ers2.html#pgfId-1115364&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;https://communities.cisco.com/docs/DOC-66297&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Apr 2017 21:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549608#M530368</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-04-04T21:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: EAP TLS in closed mode, solutions for first time log in</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549609#M530369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep this is a known issue for sure.&amp;nbsp; Are you using Native supplicants?&amp;nbsp; The Windows single sign-on settings in the native supplicant are supposed to handle this by delaying the transition to user mode, but I haven't played around with it much.&amp;nbsp; I just had a client using AnyConnect NAM that had this issue and I asked them and their security department do they have a driving need to transition to user mode.&amp;nbsp; The security department like many of my installs said no we just want to know the asset is ours which the computer certificate shows.&amp;nbsp; So we just chose to stay at computer auth only.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most of my installs are computer auth only.&amp;nbsp; Of course with all the peripheral products tying into ISE with pxGrid wanting user information this will be changing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Apr 2017 04:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549609#M530369</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-04-05T04:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: EAP TLS in closed mode, solutions for first time log in</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549610#M530370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul, yes we are using windows native supplicants. What you mentioned regarding the single sign on and the delay, is a good idea, I will give it a try,&amp;nbsp; I think this can fix half of my problems (at least the biggest one) for user cert. I will still need to find a way to put machine cert the very first time, but at least for users I think this can be good solution. Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Apr 2017 14:26:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549610#M530370</guid>
      <dc:creator>esuarez</dc:creator>
      <dc:date>2017-04-05T14:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: EAP TLS in closed mode, solutions for first time log in</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549611#M530371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The computer cert should be put on during the build/rebuild process.  As long as you have an option to handle the build process you really shouldn’t run into issues with the computer cert.  As soon as the system is joined to the domain during build they should autoenroll for a computer cert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul Haferman&lt;/P&gt;&lt;P&gt;Office- 920.996.3011&lt;/P&gt;&lt;P&gt;Cell- 920.284.9250&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Apr 2017 14:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-in-closed-mode-solutions-for-first-time-log-in/m-p/3549611#M530371</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-04-05T14:56:46Z</dc:date>
    </item>
  </channel>
</rss>

