<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why do you have PEAP in your in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745706#M54321</link>
    <description>&lt;P&gt;Why do you have PEAP in your authz rules, if your doing EAP-TLS?, this will never match, you can't do both in the same rule.&lt;/P&gt;&lt;P&gt;Also, don't expect "WasMachineAuthenticated" to work properly, it's not a very stable feature. You should look into Cisco AnyConnect NAM and EAP-Chaining.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WIRED-MACHINE if (Wired_802.1X AND ADTP2:ExternalGroups EQUALS tp2.it/Users/Domain Computers&lt;/P&gt;&lt;DIV&gt;&lt;STRONG&gt;AND Network Access:EapTunnel EQUALS PEAP&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:EapAuthentication EQUALS EAP-TLS )&lt;/DIV&gt;&lt;DIV&gt;then WIRED_AD_ONLY&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;WIRED-USER if (Wired_802.1X AND ADTP2:ExternalGroups EQUALS tp2.it/Users/Domain Users&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;AND Network Access:WasMachineAuthenticated EQUALS True&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;AND Network Access:EapTunnel EQUALS PEAP&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:EapAuthentication EQUALS EAP-TLS )&lt;/DIV&gt;&lt;DIV&gt;then WIRED_PERMIT_ALL&lt;/DIV&gt;</description>
    <pubDate>Fri, 21 Aug 2015 22:32:19 GMT</pubDate>
    <dc:creator>jan.nielsen</dc:creator>
    <dc:date>2015-08-21T22:32:19Z</dc:date>
    <item>
      <title>Cisco ise 1.3 - eap-tls user + machine auth problem</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745704#M54319</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My eap-tls authentication and authorization policy do not work , this my rule:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication:&lt;/P&gt;&lt;P&gt;WIREDDEVICE:&lt;/P&gt;&lt;P&gt;Device Type EQUALS Device Type#All Device Types#Swicth Cisco&lt;/P&gt;&lt;P&gt;AND&lt;BR /&gt;Radius:NAS-Port-Type EQUALS Ethernet&lt;/P&gt;&lt;P&gt;Authorization:&lt;/P&gt;&lt;DIV&gt;WIRED-MACHINE if (Wired_802.1X AND ADTP2:ExternalGroups EQUALS tp2.it/Users/Domain Computers&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:EapTunnel EQUALS PEAP&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:EapAuthentication EQUALS EAP-TLS )&lt;/DIV&gt;&lt;DIV&gt;then WIRED_AD_ONLY&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;WIRED-USER if (Wired_802.1X AND ADTP2:ExternalGroups EQUALS tp2.it/Users/Domain Users&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:WasMachineAuthenticated EQUALS True&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:EapTunnel EQUALS PEAP&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:EapAuthentication EQUALS EAP-TLS )&lt;/DIV&gt;&lt;DIV&gt;then WIRED_PERMIT_ALL&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Default if no matches, then DenyAccess&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;This is my error generated from ISE:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;TABLE border="0" cellpadding="3" class="content_table_steps" style="width: 500px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11017&lt;/TD&gt;&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15049&lt;/TD&gt;&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15008&lt;/TD&gt;&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - DEVICE.Device Type&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Radius.Service-Type&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Radius.NAS-Port-Type&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Network Access.UseCase&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Network Access.UseCase&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15006&lt;/TD&gt;&lt;TD&gt;Matched Default Rule&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11507&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response/Identity&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12500&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request proposing EAP-TLS with challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12625&lt;/TD&gt;&lt;TD&gt;Valid EAP-Key-Name attribute received&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12502&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12800&lt;/TD&gt;&lt;TD&gt;Extracted first TLS record; TLS handshake started&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12805&lt;/TD&gt;&lt;TD&gt;Extracted TLS ClientHello message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12806&lt;/TD&gt;&lt;TD&gt;Prepared TLS ServerHello message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12807&lt;/TD&gt;&lt;TD&gt;Prepared TLS Certificate message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12809&lt;/TD&gt;&lt;TD&gt;Prepared TLS CertificateRequest message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12571&lt;/TD&gt;&lt;TD&gt;ISE will continue to CRL verification if it is configured for specific CA - certificate for Users&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12571&lt;/TD&gt;&lt;TD&gt;ISE will continue to CRL verification if it is configured for specific CA - certificate for tp2-AD2K8-CA&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12811&lt;/TD&gt;&lt;TD&gt;Extracted TLS Certificate message containing client certificate&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12812&lt;/TD&gt;&lt;TD&gt;Extracted TLS ClientKeyExchange message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12813&lt;/TD&gt;&lt;TD&gt;Extracted TLS CertificateVerify message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12804&lt;/TD&gt;&lt;TD&gt;Extracted TLS Finished message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12801&lt;/TD&gt;&lt;TD&gt;Prepared TLS ChangeCipherSpec message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12802&lt;/TD&gt;&lt;TD&gt;Prepared TLS Finished message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12816&lt;/TD&gt;&lt;TD&gt;TLS handshake succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12509&lt;/TD&gt;&lt;TD&gt;EAP-TLS full handshake finished successfully&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15041&lt;/TD&gt;&lt;TD&gt;Evaluating Identity Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15006&lt;/TD&gt;&lt;TD&gt;Matched Default Rule&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;22072&lt;/TD&gt;&lt;TD&gt;Selected identity source sequence - TP2_SEQ&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;22071&lt;/TD&gt;&lt;TD&gt;Identity name is taken from AD account Implicit UPN&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15013&lt;/TD&gt;&lt;TD&gt;Selected Identity Source - All_AD_Join_Points&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24432&lt;/TD&gt;&lt;TD&gt;Looking up user in Active Directory - All_AD_Join_Points&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24325&lt;/TD&gt;&lt;TD&gt;Resolving identity - CN=stefano nicoletti,CN=Users,DC=tp2,DC=it, stefano nicoletti, Users, st.nicoletti@tp2.it&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24313&lt;/TD&gt;&lt;TD&gt;Search for matching accounts at join point - tp2.it&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24362&lt;/TD&gt;&lt;TD&gt;Client certificate matches AD account certificate - st.nicoletti@tp2.it&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24319&lt;/TD&gt;&lt;TD&gt;Single matching account found in forest - tp2.it&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24362&lt;/TD&gt;&lt;TD&gt;Client certificate matches AD account certificate - st.nicoletti@tp2.it&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24315&lt;/TD&gt;&lt;TD&gt;Single matching account found in domain - tp2.it&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24323&lt;/TD&gt;&lt;TD&gt;Identity resolution detected single matching account&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24700&lt;/TD&gt;&lt;TD&gt;Identity resolution by certificate succeeded - All_AD_Join_Points&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;22037&lt;/TD&gt;&lt;TD&gt;Authentication Passed&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12506&lt;/TD&gt;&lt;TD&gt;EAP-TLS authentication succeeded&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;24423&lt;/TD&gt;&lt;TD&gt;ISE has not been able to confirm previous successful machine authentication&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="content_table_steps_highlight"&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15036&lt;/TD&gt;&lt;TD&gt;Evaluating Authorization Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15004&lt;/TD&gt;&lt;TD&gt;Matched rule - Default&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15016&lt;/TD&gt;&lt;TD&gt;Selected Authorization Profile - DenyAccess&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15039&lt;/TD&gt;&lt;TD&gt;Rejected per authorization profile&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11503&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Success&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11003&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Reject&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;------ iF i snff the traffic on pc--- see attach file ----&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;This is the error reported on swicth:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;750x-nac#show authentication sessions interface Gi1/0/10: auth_bend_request -&amp;gt; auth_bend_request&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: dot1x-sm(Gi1/0/10): 0x68000019:auth_bend_request_request_action called&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: dot1x-sm(Gi1/0/10): 0x68000019:auth_bend_request_enter called&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: dot1x-ev(Gi1/0/10): Sending EAPOL packet to 1060.4b4a.29fb&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: dot1x-ev(Gi1/0/10): Role determination not required&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: dot1x-registry:registry:dot1x_ether_macaddr called&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: dot1x-ev(Gi1/0/10): Sending o&lt;BR /&gt;3750x-nac#show authentication sessions interface ut EAPOL packet&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: EAPOL pak dump Tx&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: EAPOL Version: 0x3 &amp;nbsp;type: 0x0 &amp;nbsp;length: 0x0005&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: EAP code: 0x1 &amp;nbsp;id: 0xFF length: 0x0005 type: 0x1&amp;nbsp;&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:00.506: dot1x-packet(Gi1/0/10): EAPOL packet sent to client 0x68000019 (1060.4b4a.29fb)&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.790: dot1x-ev(Gi1/0/10): Received an EAP Timeout&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-sm(Gi1/0/10): Posting EAP_TIMEOUT for 0x68000019&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: &amp;nbsp; &amp;nbsp; dot1x_auth_bend Gi1/0/10: during stat&lt;BR /&gt;3750x-nac#show authentication sessions interface e auth_bend_request, got event 12(eapTimeout)&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: @@@ dot1x_auth_bend Gi1/0/10: auth_bend_request -&amp;gt; auth_bend_timeout&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-sm(Gi1/0/10): 0x68000019:auth_bend_timeout_enter called&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-sm(Gi1/0/10): 0x68000019:auth_bend_request_timeout_action called&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: &amp;nbsp; &amp;nbsp; dot1x_auth_bend Gi1/0/10: idle during state auth_bend_timeout&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: @@@ dot1x_auth_bend Gi1/0/10: auth_bend_timeout -&amp;gt; auth_bend_idle&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:1&lt;BR /&gt;3750x-nac#show authentication sessions interface 0.799: dot1x-sm(Gi1/0/10): 0x68000019:auth_bend_idle_enter called&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-sm(Gi1/0/10): Posting AUTH_TIMEOUT on Client 0x68000019&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: &amp;nbsp; &amp;nbsp; dot1x_auth Gi1/0/10: during state auth_authenticating, got event 14(authTimeout)&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: @@@ dot1x_auth Gi1/0/10: auth_authenticating -&amp;gt; auth_authc_result&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-sm(Gi1/0/10): 0x68000019:auth_authenticating_exit called&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-sm(Gi1/0/10): 0x68000019:auth_authc_result_enter&lt;BR /&gt;3750x-nac#show authentication sessions interface &amp;nbsp;called&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: %DOT1X-5-FAIL: Authentication failed for client (1060.4b4a.29fb) on Interface Gi1/0/10 AuditSessionID&amp;nbsp;&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-ev(Gi1/0/10): Sending event (2) to Auth Mgr for 1060.4b4a.29fb&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: %AUTHMGR-7-RESULT: Authentication result 'timeout' from 'dot1x' for client (1060.4b4a.29fb) on Interface Gi1/0/10 AuditSessionID 0AD2010A000000180090C942&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-ev(Gi1/0/10): Received Authz fail for the client &amp;nbsp;0x68000019 (1060.4b4a.29fb)&lt;/P&gt;&lt;P&gt;3750x-nac#show authentication sessions interface *Mar &amp;nbsp;1 02:39:10.799: dot1x-ev(Gi1/0/10): Deleting client 0x68000019 (1060.4b4a.29fb)&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: %AUTHMGR-7-FAILOVER: Failing over from 'dot1x' for client (1060.4b4a.29fb) on Interface Gi1/0/10 AuditSessionID 0AD2010A000000180090C942&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: %AUTHMGR-5-START: Starting 'mab' for client (1060.4b4a.29fb) on Interface Gi1/0/10 AuditSessionID 0AD2010A000000180090C942&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: dot1x-sm(Gi1/0/10): Posting_AUTHZ_FAIL on Client 0x68000019&lt;BR /&gt;*Mar &amp;nbsp;1 02:39:10.799: &amp;nbsp; &amp;nbsp; dot1x_aut&lt;BR /&gt;3750x-nac#show authentication sessions interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Who can help ?? this is a lab environment and i don't find the solution...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The certificate are on pc for client and machine , AD&amp;nbsp;join work perfectly, &amp;nbsp;i changed junmbo mtu.. but do not workk.....:(&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any help apprecciated....:)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:59:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745704#M54319</guid>
      <dc:creator>Augustgood</dc:creator>
      <dc:date>2019-03-11T05:59:41Z</dc:date>
    </item>
    <item>
      <title>The proble can be the binary</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745705#M54320</link>
      <description>&lt;P&gt;The proble can be the binary comparison, on AD i haven't bind a certificate to host.... ?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2015 19:21:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745705#M54320</guid>
      <dc:creator>Augustgood</dc:creator>
      <dc:date>2015-08-21T19:21:52Z</dc:date>
    </item>
    <item>
      <title>Why do you have PEAP in your</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745706#M54321</link>
      <description>&lt;P&gt;Why do you have PEAP in your authz rules, if your doing EAP-TLS?, this will never match, you can't do both in the same rule.&lt;/P&gt;&lt;P&gt;Also, don't expect "WasMachineAuthenticated" to work properly, it's not a very stable feature. You should look into Cisco AnyConnect NAM and EAP-Chaining.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WIRED-MACHINE if (Wired_802.1X AND ADTP2:ExternalGroups EQUALS tp2.it/Users/Domain Computers&lt;/P&gt;&lt;DIV&gt;&lt;STRONG&gt;AND Network Access:EapTunnel EQUALS PEAP&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:EapAuthentication EQUALS EAP-TLS )&lt;/DIV&gt;&lt;DIV&gt;then WIRED_AD_ONLY&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;WIRED-USER if (Wired_802.1X AND ADTP2:ExternalGroups EQUALS tp2.it/Users/Domain Users&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;AND Network Access:WasMachineAuthenticated EQUALS True&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;AND Network Access:EapTunnel EQUALS PEAP&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;AND Network Access:EapAuthentication EQUALS EAP-TLS )&lt;/DIV&gt;&lt;DIV&gt;then WIRED_PERMIT_ALL&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Aug 2015 22:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745706#M54321</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-08-21T22:32:19Z</dc:date>
    </item>
    <item>
      <title>I think jan is right, choose</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745707#M54322</link>
      <description>&lt;P&gt;I think jan is right, choose EAP-TLS or PEAP, not both.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However your rule is failing on the WasMachineAuthenticated attribute. This is not a very good feature and pretty much fails when using more than one PSN. The problem being machine authc happens with one PSN and gets logged, user authc happens with the other and the machine log authc that is checked does not replicate between PSNs and so fails.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 10:52:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-1-3-eap-tls-user-machine-auth-problem/m-p/2745707#M54322</guid>
      <dc:creator>phosawyer</dc:creator>
      <dc:date>2015-12-03T10:52:07Z</dc:date>
    </item>
  </channel>
</rss>

