<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE - Machine Authentication vs Machine Access Restrictions in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832455#M555051</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Based on my understanding with your statement, if I configured my Windows supplicant into a computer-only authentication, I can transfer connection (wired to wireless) without rebooting the machine, am I correct?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 04 Apr 2019 16:58:33 GMT</pubDate>
    <dc:creator>fatalXerror</dc:creator>
    <dc:date>2019-04-04T16:58:33Z</dc:date>
    <item>
      <title>ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174009#M555038</link>
      <description>&lt;P&gt;Hello all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My organisation has recently implemented Cisco ISE and we have come up against an issue.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The issue relates to the Machine Access Restrictions option within Advanced Authentication Settings, whereby users must reboot their machines in order to gain access to the network when they switch from Wired to Wireless. From&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116516-problemsolution-technology-00.html" target="_self"&gt;this Cisco article&lt;/A&gt;&amp;nbsp;I can see that with MAR enabled there is no way around this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is, what is the difference between Machine Authentication and MAR, is Machine Authentication (via certificate on client machine) still required even if MAR is turned off, or is MAR a requirement for client certificate authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apologies if this has been answered before, if it has please point me in the direction of any documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Daryl&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174009#M555038</guid>
      <dc:creator>DarylBrooks</dc:creator>
      <dc:date>2020-02-21T18:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174067#M555044</link>
      <description>&lt;P&gt;Hi Daryl,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MAR = machine authenticated and user authenticated. As in both must succeed in order to be permitted access. There are a number of cons to this, which the article you referenced describes. MAR is basically restricting an authenticated user to connect only if the machine was authenticated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Machine Authentication on it's own, is independent from a user authentication. 1 does not necessarily have to succeed for the other to succeed. You can configure windows to only use computer authentication or only user authentication. Though you may want to do both in order to process machine and user AD group policies. If you do want to do both, then these will be seperate authentications.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No, MAR is not a requirement for client certificate authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you use AnyConnect NAM as the supplicant instead of the windows native supplicant you can do EAP Chaining which combines both machine and user authenticaton, but also resolves some of the issues around MAR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 16:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174067#M555044</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2017-08-22T16:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174444#M555047</link>
      <description>Thank you for your response, forgive me if I am asking a silly question, but is it possible to force BOTH user and machine authentication without using MAR?&lt;BR /&gt;&lt;BR /&gt;In theory, it might be overkill as client machines with the certificate installed will only be accessible by domain users, but if this is possible it would be nice to have the extra layer of&lt;BR /&gt;network security on top of domain security.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Daryl</description>
      <pubDate>Wed, 23 Aug 2017 09:07:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174444#M555047</guid>
      <dc:creator>DarylBrooks</dc:creator>
      <dc:date>2017-08-23T09:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174602#M555049</link>
      <description>&lt;P&gt;Hi Daryl,&lt;/P&gt;&lt;P&gt;Yes, I assume you will use windows group policies to push down the configuration to the computers? If so, then under Computer Configuration &amp;gt; Windows Settings &amp;gt; Security Settings &amp;gt; Wired Network (IEEE 802.3) Policies - specify Authentication Mode as "User or computer authentication". This will therefore authenticate the user and computer.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 12:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174602#M555049</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2017-08-23T12:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174861#M555050</link>
      <description>&lt;P&gt;the following video applies to 1.4 or 2.x ISE version if you want machine and user authentication NO MAR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=bjH99xKepLY" target="_blank"&gt;https://www.youtube.com/watch?v=bjH99xKepLY&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 19:40:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3174861#M555050</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-08-23T19:40:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832455#M555051</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Based on my understanding with your statement, if I configured my Windows supplicant into a computer-only authentication, I can transfer connection (wired to wireless) without rebooting the machine, am I correct?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 16:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832455#M555051</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-04-04T16:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832538#M555052</link>
      <description>Hi,&lt;BR /&gt;Correct. Rebooting of the computer would only be required if using MAR (computer and user authentication), as the computer authentication would be tied to the mac address of either the wired or wireless nic. So moving from wired to wireless or vice versa would cause an issue with MAR.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 04 Apr 2019 19:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832538#M555052</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-04T19:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832845#M555053</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the clarification.&lt;/P&gt;&lt;P&gt;If I only use machine authentication, can I still see who is the user who logs into that authenticated machine if I dig down the RADIUS Live Logs?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2019 10:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832845#M555053</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-04-05T10:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832854#M555054</link>
      <description>No, if you are only performing machine authentication, only the machine account will be in the logs.</description>
      <pubDate>Fri, 05 Apr 2019 10:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3832854#M555054</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-05T10:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3833501#M555055</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;, just to clarify about the reboot matter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reboot or logging-off the machine will be no need if I am just using machine authentication setting my windows supplicant to "computer only" as its authentication method, am I correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 14:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3833501#M555055</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-04-06T14:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3833502#M555056</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just to clarify about the reboot matter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reboot or logging-off the machine will be no need if I am just using machine authentication setting my windows supplicant to "computer only" as its authentication method, am I correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 14:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3833502#M555056</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-04-06T14:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE - Machine Authentication vs Machine Access Restrictions</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3833519#M555057</link>
      <description>Correct</description>
      <pubDate>Sat, 06 Apr 2019 16:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-machine-authentication-vs-machine-access-restrictions/m-p/3833519#M555057</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-06T16:20:29Z</dc:date>
    </item>
  </channel>
</rss>

