<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EAP_TLS issue. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545375#M530515</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think they use JAMF to push settings. One thing I'm looking at is the keychain. The cert uses our old CA's, and ISE uses the new CA's. I've added the new CA's to the Mac, but noticed it says they are trusted for the user, not for all users. I'm wondering if it's not trusting ISE and ignoring the conversation. Issue is i'm not sure how to get the cert trusted for all users.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Mar 2017 15:07:19 GMT</pubDate>
    <dc:creator>Dustin Anderson</dc:creator>
    <dc:date>2017-03-28T15:07:19Z</dc:date>
    <item>
      <title>EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545371#M530511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am having an issue with getting a Mac to authenticate into ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see it connecting, but with the following error.&lt;/P&gt;&lt;P&gt;12521 EAP-TLS failed SSL/TLS handshake after a client alert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check whether the proper server certificate is installed and configured for EAP in the Local Certificates page ( Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Local Certificates ). Also ensure that the certificate authority that signed this server certificate is correctly installed in client's supplicant. Check the previous steps in the log for this EAP-TLS conversation for a message indicating why the handshake failed. Check the OpenSSLErrorMessage and OpenSSLErrorStack for more information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the root and subca's installed on the mac, and ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;OpenSSLErrorMessage&lt;/TD&gt;&lt;TD&gt;SSL alert: code=0x100=256 ; source=remote ; type=warning ; message="close notify"&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not very familiar with a Mac, does anyone know where/how to see errors on them as it seems to be closing the connection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Mar 2017 18:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545371#M530511</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2017-03-27T18:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545372#M530512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The diagnostic of a Mac is described in this article. &lt;A href="https://support.apple.com/en-gb/HT202663" title="https://support.apple.com/en-gb/HT202663"&gt;https://support.apple.com/en-gb/HT202663&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you would have a trust issue, the mac will normally prompt you with a decision if you want to trust the EAP Certificate. Did the mac maybe has a wrong setting for the Authentication of the SSID?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 06:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545372#M530512</guid>
      <dc:creator>Oliver Laue</dc:creator>
      <dc:date>2017-03-28T06:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545373#M530513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is actually a wired Mac. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use 802.1x with PC's and this all works fine. For a Mac, they made a user cert to use on them and it uses EAP-TLS. The PC's use EAP-PEAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems like the client is not responding to the RADIUS access challenge.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE height="1214" style="width: 402px; height: 1083px;" width="400"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD colspan="1"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;12500&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD colspan="1"&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Prepared EAP-Request proposing EAP-TLS with challenge&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12625&lt;/TD&gt;&lt;TD&gt;Valid EAP-Key-Name attribute received&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12502&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12800&lt;/TD&gt;&lt;TD&gt;Extracted first TLS record; TLS handshake started&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12805&lt;/TD&gt;&lt;TD&gt;Extracted TLS ClientHello message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12806&lt;/TD&gt;&lt;TD&gt;Prepared TLS ServerHello message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12807&lt;/TD&gt;&lt;TD&gt;Prepared TLS Certificate message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12808&lt;/TD&gt;&lt;TD&gt;Prepared TLS ServerKeyExchange message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12809&lt;/TD&gt;&lt;TD&gt;Prepared TLS CertificateRequest message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12815&lt;/TD&gt;&lt;TD&gt;Extracted TLS Alert message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12521&lt;/TD&gt;&lt;TD&gt;EAP-TLS failed SSL/TLS handshake after a client alert&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;12507&lt;/TD&gt;&lt;TD&gt;EAP-TLS authentication failed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11504&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Failure&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;11003&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;5434&lt;/TD&gt;&lt;TD&gt;Endpoint conducted several failed authentications of the same scenario&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 14:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545373#M530513</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2017-03-28T14:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545374#M530514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;was this setting deployed with a MDM or any other tool to the mac?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 14:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545374#M530514</guid>
      <dc:creator>Oliver Laue</dc:creator>
      <dc:date>2017-03-28T14:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545375#M530515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think they use JAMF to push settings. One thing I'm looking at is the keychain. The cert uses our old CA's, and ISE uses the new CA's. I've added the new CA's to the Mac, but noticed it says they are trusted for the user, not for all users. I'm wondering if it's not trusting ISE and ignoring the conversation. Issue is i'm not sure how to get the cert trusted for all users.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 15:07:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545375#M530515</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2017-03-28T15:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545376#M530516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the trust can be set with the configuration profile which deploys the eap settings to the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're using a public cert on the ise you can just publish the subject name of the EAP Certificate from ise.&lt;/P&gt;&lt;P&gt;If you're using a private cert there are options in a MDM/EMM for macOS to import trusted certificates and set them as trusted for the EAP Authentications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;described in &lt;A href="http://training.apple.com/pdf/WP_8021X_Authentication.pdf"&gt;http://training.apple.com/pdf/WP_8021X_Authentication.pdf&lt;/A&gt; page 21&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 15:15:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545376#M530516</guid>
      <dc:creator>Oliver Laue</dc:creator>
      <dc:date>2017-03-28T15:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545377#M530517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I'll look into that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 17:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545377#M530517</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2017-03-28T17:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545378#M530518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does ISE trust the old CAs as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 17:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545378#M530518</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-03-28T17:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545379#M530519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did add the old CA's into ISE, so should be OK there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Mar 2017 19:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545379#M530519</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2017-03-28T19:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545380#M530521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;12521&lt;/TD&gt;&lt;TD&gt;EAP-TLS failed SSL/TLS handshake after a client alert&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;would be probably better sorted by looking at the client side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Previously, macOS 10.6 ~ 10.8 may use the following. It might also work for later macOS releases.&lt;/P&gt;&lt;P style="margin-top: 1.5em; margin-right: 1.5em; color: #000000; font-family: Verdana, sans-serif; font-size: 14px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial, helvetica, sans-serif;"&gt;To turn on verbose logging:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE style="margin-top: 1.5em; margin-right: 1.5em; padding-top: 1em; padding-right: 1em; padding-bottom: 1em; border-left-width: 1px; background-color: #fafafa; color: #000000; font-size: 14px;"&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;​sudo defaults write /Library/Preferences/SystemConfiguration/com.apple.eapolclient LogFlags -int 255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;==&amp;gt; Setting to 255 seems to be most verbose; to 1 already logs some info.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Log file: /var/log/eapolclient.en&lt;STRONG&gt;N&lt;/STRONG&gt;.log&lt;/SPAN&gt;&lt;/P&gt;
&lt;/PRE&gt;&lt;P style="margin-top: 1.5em; margin-right: 1.5em; color: #000000; font-family: Verdana, sans-serif; font-size: 14px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Also watch /var/log/system.log and /var/log/wifi.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 1.5em; margin-right: 1.5em; color: #000000; font-family: Verdana, sans-serif; font-size: 14px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;To turn off verbose logging:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE style="margin-top: 1.5em; margin-right: 1.5em; padding-top: 1em; padding-right: 1em; padding-bottom: 1em; border-left-width: 1px; background-color: #fafafa; color: #000000; font-size: 14px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;​sudo defaults write /Library/Preferences/SystemConfiguration/com.apple.eapolclient LogFlags -int 0&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P style="color: #000000; font-family: Verdana, sans-serif; font-size: 14px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Verdana, sans-serif; font-size: 14px;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="https://www.afp548.com/2012/11/20/802-1x-eaptls-machine-auth-mtlion-adcerts/"&gt;AFP548 – Covering Apple IT – 802.1x EAP-TLS Machine Authentication in Mt. Lion with AD Certificates&lt;/A&gt;&lt;SPAN style="color: #575757; font-family: arial, helvetica, sans-serif;"&gt; shows an example error logging:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 14px; color: #838383; font-family: Arial, Helvetica, sans-serif; font-size: 13px;"&gt;... eapolclient was logging the following error:&lt;/P&gt;&lt;PRE class="prettyprint prettyprinted" style="font-family: monospace, monospace; font-size: 13px; padding: 2px; border-left-width: 1px; border-top-color: #cccccc; border-right-color: #cccccc; border-bottom-color: #cccccc; color: #838383;"&gt;&lt;SPAN class="pln" style="color: #000000;"&gt;eaptls_handshake&lt;/SPAN&gt;&lt;SPAN class="pun" style="color: #666600;"&gt;:&lt;/SPAN&gt;&lt;SPAN class="pln" style="color: #000000;"&gt; &lt;/SPAN&gt;&lt;SPAN class="typ" style="color: #660066;"&gt;SSLHandshake&lt;/SPAN&gt;&lt;SPAN class="pln" style="color: #000000;"&gt; failed&lt;/SPAN&gt;&lt;SPAN class="pun" style="color: #666600;"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln" style="color: #000000;"&gt; errSSLPeerAccessDenied&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P style="color: #000000; font-family: Verdana, sans-serif; font-size: 14px;"&gt;&lt;SPAN style="color: #575757; font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #000000; font-family: Verdana, sans-serif; font-size: 14px;"&gt;&lt;SPAN style="color: #575757; font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Apr 2017 16:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/3545380#M530521</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-04-20T16:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/4529583#M572132</link>
      <description>&lt;P&gt;I had the same issue and this resolved. Thanks for this guys!&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 16:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/4529583#M572132</guid>
      <dc:creator>shockocisco</dc:creator>
      <dc:date>2022-01-11T16:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: EAP_TLS issue.</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/4798047#M580635</link>
      <description>&lt;P&gt;Looks like the article is not available anymore.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 17:50:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-issue/m-p/4798047#M580635</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2023-03-20T17:50:07Z</dc:date>
    </item>
  </channel>
</rss>

