<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3344297#M551402</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;have you found a solution how to prevent outlook 365 traffic to be redirected to ISE?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Neil&lt;/P&gt;</description>
    <pubDate>Wed, 07 Mar 2018 18:53:05 GMT</pubDate>
    <dc:creator>konsecioner</dc:creator>
    <dc:date>2018-03-07T18:53:05Z</dc:date>
    <item>
      <title>ISE Dot1x - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213765#M551391</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are integrating Cisco ISE in new environment to use radius AAA Services (dot1x, MAB...).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When we connect a windows domain machine to the network on a dot1x port, an Outlook Security Alert "Untrusted Server Certificate" appears. We have looked at the certificate we found the Self Signed Certificate of the switch on which we are connected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here some screenshots of the certificate error&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 418px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3122iD5C1414CE23AC078/image-dimensions/418x269?v=v2" width="418" height="269" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you&amp;nbsp;help me to know the root cause of this security alert and why the outlook is showing the Self Signed Certificate of the switch ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Anis GHARBI&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213765#M551391</guid>
      <dc:creator>Anis Gharbi</dc:creator>
      <dc:date>2020-02-21T18:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213787#M551392</link>
      <description>&lt;P&gt;This is probably because your endpoint is hitting Guest webauth redirection rule and confusing Outlook. What is the output of the show authentication sessions int &amp;lt;interface&amp;gt; detail when the issue happens? What are your port configs and ISE policies?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2017 10:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213787#M551392</guid>
      <dc:creator>agrissimanis</dc:creator>
      <dc:date>2017-11-09T10:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213791#M551394</link>
      <description>&lt;P&gt;Yes we have&amp;nbsp;&lt;SPAN&gt;webauth redirection configured on the switch port to redirect guests to captive portal as a third auth method.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here the port config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface FastEthernet0/8&lt;BR /&gt; description dot1X/mab test port&lt;BR /&gt; switchport mode access&lt;BR /&gt; authentication event fail action next-method&lt;BR /&gt; authentication host-mode multi-domain&lt;BR /&gt; authentication open&lt;BR /&gt; authentication order dot1x mab webauth&lt;BR /&gt; authentication priority dot1x mab webauth&lt;BR /&gt; authentication port-control auto&lt;BR /&gt; authentication periodic&lt;BR /&gt; authentication timer reauthenticate server&lt;BR /&gt; authentication timer inactivity server&lt;BR /&gt; authentication violation restrict&lt;BR /&gt; mab&lt;BR /&gt; dot1x pae authenticator&lt;BR /&gt; dot1x timeout tx-period 10&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt; spanning-tree bpduguard enable&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2017 10:34:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213791#M551394</guid>
      <dc:creator>Anis Gharbi</dc:creator>
      <dc:date>2017-11-09T10:34:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213798#M551396</link>
      <description>&lt;P&gt;At the phase of 802.1x authentication and authorization the employees are redirected to the web posture portal to check the compliance. I think for that reason the there a redirection of the web traffic from Microsoft outlook to the Exchange server.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2017 10:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213798#M551396</guid>
      <dc:creator>Anis Gharbi</dc:creator>
      <dc:date>2017-11-09T10:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213803#M551399</link>
      <description>&lt;P&gt;Yes, posture redirect could cause the same issue. One way of fixing this would be to modify your redirection ACL to exclude Outlook traffic from being redirected, if acceptable.&lt;/P&gt;
&lt;P&gt;Not related to this issue, but I would suggest not to use local webauth (that third option in "authentication priority dot1x mab webauth" command), that is the old way of doing things. If you can use central webauth.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2017 10:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3213803#M551399</guid>
      <dc:creator>agrissimanis</dc:creator>
      <dc:date>2017-11-09T10:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3315887#M551400</link>
      <description>I'm having the same issue and I'm having difficulty finding a way to exclude Outlook traffic from redirection.  It would be simple if the customer used an internal web server, however, this enterprise uses Microsoft Office 365 which can connect to a variety of online servers.  The list of possible DNS resolution IPs is a mile long and continually changing.  Any ideas?</description>
      <pubDate>Mon, 22 Jan 2018 13:54:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3315887#M551400</guid>
      <dc:creator>brockpete</dc:creator>
      <dc:date>2018-01-22T13:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3344297#M551402</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;have you found a solution how to prevent outlook 365 traffic to be redirected to ISE?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Neil&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 18:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3344297#M551402</guid>
      <dc:creator>konsecioner</dc:creator>
      <dc:date>2018-03-07T18:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3385573#M551405</link>
      <description>&lt;P&gt;HI Dear,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you please let me know how to make changes on posture rule?&lt;/P&gt;
&lt;P&gt;i am having same issue&amp;nbsp; and tried to allow mailserver IP address on posture but still same issue&lt;/P&gt;</description>
      <pubDate>Fri, 18 May 2018 14:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3385573#M551405</guid>
      <dc:creator>apatel2489</dc:creator>
      <dc:date>2018-05-18T14:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3387674#M551406</link>
      <description>&lt;P&gt;Cisco does not have an answer to this particular issue when an organization uses Office 365 since external Microsoft IP addresses and URLs are constantly evolving.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The workaround that was decided on for the enterprise I am working on was to only redirect traffic to the portal when a user attempts to access an internal website.&amp;nbsp; The redirect ACL only includes the internal website address range and the dynamic ACL from ISE blocks external traffic until authenticated.&amp;nbsp; This will prevent the Outlook certificate issue from occurring.&amp;nbsp; This is far from ideal, but Cisco has yet to provide any information on a permanent fix to this issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 May 2018 12:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3387674#M551406</guid>
      <dc:creator>brockpete</dc:creator>
      <dc:date>2018-05-23T12:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3387723#M551407</link>
      <description>&lt;P&gt;Thanks for your reply&lt;/P&gt;
&lt;P&gt;i dont have office 365. i do have exchange server on premises.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 May 2018 14:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3387723#M551407</guid>
      <dc:creator>apatel2489</dc:creator>
      <dc:date>2018-05-23T14:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3387726#M551408</link>
      <description>Then your solution is much more simple.  All you need to do is exclude your exchange server IPs from the redirect ACL and block the IP on the dynamic access list in ISE for the portal.&lt;BR /&gt;</description>
      <pubDate>Wed, 23 May 2018 14:09:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3387726#M551408</guid>
      <dc:creator>brockpete</dc:creator>
      <dc:date>2018-05-23T14:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE dotx1 - Outlook Security Alert(Untrusted Server Certificate)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3387731#M551409</link>
      <description>&lt;P&gt;i do have ISE-Redirect ACL which is deny for bootpc , domain and ISE and allow for www and 443 then deny everything and i did allow exchange server on this list. the dynamic ip access list where i am confused.&lt;/P&gt;</description>
      <pubDate>Wed, 23 May 2018 14:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-dot1x-outlook-security-alert-untrusted-server-certificate/m-p/3387731#M551409</guid>
      <dc:creator>apatel2489</dc:creator>
      <dc:date>2018-05-23T14:13:35Z</dc:date>
    </item>
  </channel>
</rss>

