<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 12520 EAP-TLS failed SSL/TLS handshake in ISE 2.1 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/12520-eap-tls-failed-ssl-tls-handshake-in-ise-2-1/m-p/3221227#M554351</link>
    <description>&lt;P&gt;Looks like the ISE Certificate for EAP-TLS was not signed by your internal PKI and that's why it is rejected by the enduser device. You should have something like this on ISE primary PAN and PSN's.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CERT.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3805i7BE327AA596F6288/image-size/large?v=v2&amp;amp;px=999" role="button" title="CERT.png" alt="CERT.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Nov 2017 19:56:54 GMT</pubDate>
    <dc:creator>ajc</dc:creator>
    <dc:date>2017-11-22T19:56:54Z</dc:date>
    <item>
      <title>12520 EAP-TLS failed SSL/TLS handshake in ISE 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/12520-eap-tls-failed-ssl-tls-handshake-in-ise-2-1/m-p/3221108#M554345</link>
      <description>&lt;P&gt;We are running ISE 2.1 patch 2 in a 4 node deployment, 2 PANs, 2 PSNs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are trying to get EAP-TLS setup to authenticate our Windows wireless clients to our new wireless network,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ISE servers have our internal root CA and intermediate CA certs installed and trusted and user/machine certs are present on the client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I client tries to connect to our test SSID, it fails, and I see this error in the Radius live log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;12520 EAP-TLS failed SSL/TLS handshake because the client rejected the ISE local-certificate&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We have tried unchecking "validate server cert" on the client's wifi profile, but we get the same result.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Any ideas?? I have seen other posts here about similar problems but with different versions of ISE.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;John&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12520-eap-tls-failed-ssl-tls-handshake-in-ise-2-1/m-p/3221108#M554345</guid>
      <dc:creator>N3t W0rK3r</dc:creator>
      <dc:date>2020-02-21T18:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: 12520 EAP-TLS failed SSL/TLS handshake in ISE 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/12520-eap-tls-failed-ssl-tls-handshake-in-ise-2-1/m-p/3221227#M554351</link>
      <description>&lt;P&gt;Looks like the ISE Certificate for EAP-TLS was not signed by your internal PKI and that's why it is rejected by the enduser device. You should have something like this on ISE primary PAN and PSN's.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CERT.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/3805i7BE327AA596F6288/image-size/large?v=v2&amp;amp;px=999" role="button" title="CERT.png" alt="CERT.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 19:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12520-eap-tls-failed-ssl-tls-handshake-in-ise-2-1/m-p/3221227#M554351</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-11-22T19:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: 12520 EAP-TLS failed SSL/TLS handshake in ISE 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/12520-eap-tls-failed-ssl-tls-handshake-in-ise-2-1/m-p/3221229#M554355</link>
      <description>&lt;P&gt;BTW, EAP-TLS is a 2 WAY CERTIFICATE VALIDATION, so you cannot disable on the enduser device profile the "VALIDATE SERVER CERTIFICATE".&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 19:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12520-eap-tls-failed-ssl-tls-handshake-in-ise-2-1/m-p/3221229#M554355</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-11-22T19:59:02Z</dc:date>
    </item>
  </channel>
</rss>

