<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.3 with OCSP - Authentication an Authorization in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3344492#M556278</link>
    <description>&lt;P&gt;That was helpful Octavian.&amp;nbsp;Let me revoke the cert and put my findings here.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RE- Expired cert issue&lt;/P&gt;
&lt;P&gt;I have just checked my ISE is successfully synced with NTP server. Both CLI and GUI time looks good. I will&amp;nbsp;keep troubleshooting.&amp;nbsp;Meanwhile, if you know anything I can check, plz let me know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Mar 2018 23:56:00 GMT</pubDate>
    <dc:creator>paul46</dc:creator>
    <dc:date>2018-03-07T23:56:00Z</dc:date>
    <item>
      <title>ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3342046#M556223</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have successfully authenticated machine using certificate (EAP-TLS) and having an interesting issue. I have configured OCSP server (external CA) and tested same machine with expired certificate. not sure why it's successfully authenticating? Also, I used CERTIFICATE:Is Expired=True authorization condition but it would not trigger. It's bypassing this condition and going further and executes the one which provides full corporate access!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would expect failed authentication if certificate is not valid then why it's even going to the authorization phase?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have ensured that firewall is not an issue between ISE and OCSP server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone got similar experience before? Not sure if it does require any configuration at OCSP server end. I have asked external CA to confirm this. Meanwhile, just thought to put it here for further discussion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3342046#M556223</guid>
      <dc:creator>paul46</dc:creator>
      <dc:date>2020-02-21T18:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3342500#M556230</link>
      <description>&lt;P&gt;Hi Paul,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can easly check what's wrong by just looking at radius live logs. Just click (magnifier glass button I think) on a succesfully authenticated session and you will get some extra info regarding that session. You will see also some OCSP info that will be relevant to your question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;</description>
      <pubDate>Mon, 05 Mar 2018 14:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3342500#M556230</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-03-05T14:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3342800#M556238</link>
      <description>&lt;P&gt;Thanks Octavian&lt;/P&gt;
&lt;P&gt;I had a look into Radius live logs and not sure why the machine with expired certificate is passing the authentication? According to logs, it looks for machine hostname in AD and hence passing the authentication but the certificate is expired!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a look at the log from number&amp;nbsp;22072 onward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco Identity Services Engine &lt;!-- bootstrap DOJO --&gt;&lt;/P&gt;
&lt;TABLE class="cpmLocalTableSpacing" border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD colspan="2" valign="top"&gt;
&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;TABLE class="content_table_steps" border="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;12807&lt;/TD&gt;
&lt;TD&gt;Prepared TLS Certificate message&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12808&lt;/TD&gt;
&lt;TD&gt;Prepared TLS ServerKeyExchange message&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12810&lt;/TD&gt;
&lt;TD&gt;Prepared TLS ServerDone message&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12811&lt;/TD&gt;
&lt;TD&gt;Extracted TLS Certificate message containing client certificate&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12318&lt;/TD&gt;
&lt;TD&gt;Successfully negotiated PEAP version 0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12812&lt;/TD&gt;
&lt;TD&gt;Extracted TLS ClientKeyExchange message&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12813&lt;/TD&gt;
&lt;TD&gt;Extracted TLS CertificateVerify message&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12804&lt;/TD&gt;
&lt;TD&gt;Extracted TLS Finished message&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12801&lt;/TD&gt;
&lt;TD&gt;Prepared TLS ChangeCipherSpec message&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12802&lt;/TD&gt;
&lt;TD&gt;Prepared TLS Finished message&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12816&lt;/TD&gt;
&lt;TD&gt;TLS handshake succeeded&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12310&lt;/TD&gt;
&lt;TD&gt;PEAP full handshake finished successfully&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12313&lt;/TD&gt;
&lt;TD&gt;PEAP inner method started&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11521&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request/Identity for inner EAP method&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11522&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response/Identity for inner EAP method&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11806&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12305&lt;/TD&gt;
&lt;TD&gt;Prepared EAP-Request with another PEAP challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11006&lt;/TD&gt;
&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11001&lt;/TD&gt;
&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11018&lt;/TD&gt;
&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12304&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing PEAP challenge-response&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;11808&lt;/TD&gt;
&lt;TD&gt;Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15041&lt;/TD&gt;
&lt;TD&gt;Evaluating Identity Policy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;15048&lt;/TD&gt;
&lt;TD&gt;Queried PIP - Radius.Called-Station-ID&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FFFF00"&gt;&lt;FONT color="#FF0000"&gt;22072&lt;/FONT&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Selected identity source sequence -&amp;nbsp;Identity_Source_Seq&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;15013&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Selected Identity Source -&amp;nbsp;AD&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FFFF00"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;24431&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Authenticating machine against Active Directory -&amp;nbsp;AD&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;24325&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Resolving identity - host/machine_name@company.com&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;24313&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Search for matching accounts at join point - &lt;SPAN&gt;company.com&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;24319&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Single matching account found in forest -&amp;nbsp;company.com&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;24323&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Identity resolution detected single matching account&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;24343&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;RPC Logon request succeeded - machine_name$@company.com&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;24470&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Machine authentication against Active Directory is successful - AD&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="content_table_steps_highlight"&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;22037&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Authentication Passed&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 05 Mar 2018 23:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3342800#M556238</guid>
      <dc:creator>paul46</dc:creator>
      <dc:date>2018-03-05T23:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3343983#M556252</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your tests were with an expired cert, then OCSP is not related to the issue. Any system can check for expired certs (date/time comparison). If your cert was revoked, then OCSP should be investigated.&lt;/P&gt;
&lt;P&gt;Can you please double check? Maybe your time and date is wrong or you haven't considered the timezone when you ran the test?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 12:00:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3343983#M556252</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-03-07T12:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3344492#M556278</link>
      <description>&lt;P&gt;That was helpful Octavian.&amp;nbsp;Let me revoke the cert and put my findings here.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RE- Expired cert issue&lt;/P&gt;
&lt;P&gt;I have just checked my ISE is successfully synced with NTP server. Both CLI and GUI time looks good. I will&amp;nbsp;keep troubleshooting.&amp;nbsp;Meanwhile, if you know anything I can check, plz let me know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 23:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3344492#M556278</guid>
      <dc:creator>paul46</dc:creator>
      <dc:date>2018-03-07T23:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3344990#M556306</link>
      <description>&lt;P&gt;Looks like the OCSP configuration on ISE is not completed. Take a look on the following link&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://wifidiversity.com/2017/09/04/cisco-ise-ocsp-settings/" target="_blank"&gt;https://wifidiversity.com/2017/09/04/cisco-ise-ocsp-settings/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Mar 2018 17:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3344990#M556306</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2018-03-08T17:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3345241#M556326</link>
      <description>&lt;P&gt;Thanks Abraham&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have verified OSCP client profile config and it looks good. But not sure if I the OCSP profile is applied correctly or not. One thing that confuses me and want to confirm is this&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The root chain is like ROOT CA -&amp;gt; INTERMEDIATE CA -&amp;gt; MACHINE CERT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As per your link, I have bind OCSP client profile to INTERMEDIATE CA. As far as I am aware, I don't need to apply OCSP to ROOT CA or any other individual cert? I am not seeing any OSCP status in RADIUS logs at the moment. So, it looks like the profile is fine but applying to the right place.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Mar 2018 23:48:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3345241#M556326</guid>
      <dc:creator>paul46</dc:creator>
      <dc:date>2018-03-08T23:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3345631#M556341</link>
      <description>&lt;P&gt;Clarification:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The certificate to revoke or expire manually is the INTERMEDIATE one if you want to test the EAP-TLS authentication under that scenario.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The enduser device cert has a chain which contains that Intermediate Cert, so ISE based on OCSP has&amp;nbsp;internally&amp;nbsp;cached the information about the expiration/revoke process on that Intermediate Cert. Therefore, when the enduser device presents the cert, ISE validates it and because the intermediate in the chain is expired/revoked then ISE rejects the EAP-TLS authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How you can check the cert chain??. See next&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the example below, the Intermediate CA in the chain is EntISSUE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mmc.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/8697i371BD5A4BCD183CE/image-size/large?v=v2&amp;amp;px=999" role="button" title="mmc.png" alt="mmc.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Mar 2018 15:38:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3345631#M556341</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2018-03-09T15:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3347242#M556352</link>
      <description>&lt;P&gt;Hi Abraham,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I thought the expired or revoke cert would be an individual machine cert. I have just revoked a machine certificate (Not Intermediate) and still not seeing anything related to OCSP. It is still passing the authentcation phase.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will test Intermediate cert with expired and revoke but just some questions&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1). If an individual machine is comprised from security perspective, doesn't it make more sense to disable machine (individual) cert?&lt;/P&gt;
&lt;P&gt;2). Intermediate cert is part of root chain who is published by Root CA and usually managed by External CA. Just to test OCSP, if they revoke or expire intermediate Cert, won't it break the root chain for all the machines? or if I install a root chain with expired/ revoked intermediate on a machine to test OCSP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks you and all who are assisting me to get deep understanding on this. In next post, I will post my result with expired and revoked Intermediate cert and see if I can see any OCSP related logs in ISE RADIUS&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 03:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3347242#M556352</guid>
      <dc:creator>paul46</dc:creator>
      <dc:date>2018-03-13T03:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3347337#M556361</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My understanding is the same. You don't have to revoke the intermediate CA cert to test EAP-TLS OCSP services. The point in having OCSP applied to an intermediate or root cert is to check the status of the client cert.&lt;/P&gt;
&lt;P&gt;So, if a laptop is stolen/lost, one should revoke the machine cert so that ISE would check online its status. So it makes sense not to revoce the intermediate cert but the machine/user cert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried a telnet on OCSP port? Or to check if OCSP url is correct? (compare it with the one inside the cert?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 08:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3347337#M556361</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-03-13T08:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3347843#M556371</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Important to clarify that I am not suggesting to revoke in production the intermediate cert because that would affect all the devices with a cert signed by that intermediate CA. I was referring to a lab environment so you can test revoking intermediate LAB CA and check ISE Logs. In addition to that, I agree with Octavian, you should revoke enduser machine cert in the lab to simulate an stolen or lost device and see how the logs on ISE looks like as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On my case, we have CRL instead of OCSP and that is the one we use to revoke machine certs. I see your OCSP failed and enduser machine cert "revoked" is still valid. Let's investigate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 18:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3347843#M556371</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2018-03-13T18:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3348763#M556380</link>
      <description>From the logs you posted, your client is not running EAP-TLS, it is clearly using PEAP-MSCHAP see id 11808, which uses username/password to authenticate not certificates, the TLS it mentions is the tunnel that is built using a trusted cert on ISE, not a cert on the client. Either your windows supplicant is incorrectly configured, or you didn't configure it at all. Once that is correctly configured, you should also check that your authentication policy allows EAP-TLS.

Jan</description>
      <pubDate>Wed, 14 Mar 2018 21:19:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3348763#M556380</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2018-03-14T21:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3348809#M556387</link>
      <description>&lt;P&gt;Thanks jan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like we have spotted the issue. We are not using EAP-Chaining so no supplicant is configured on client machine such as&amp;nbsp;Cisco AnyConnect. I guess machine uses default in-built supplicant.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, this now explains why a machine with expired client certificate is passing the authentication. It uses PEAP-MSCHAPv2 and finds&amp;nbsp;domain user in the Active Directory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, to fix this, I have unchecked "Allow EAP-MS-CHAPv2" (see below) and checked EAP-TLS&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="allowed protocols.png" style="width: 750px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/8934i7F17E4D536547A8D/image-size/large?v=v2&amp;amp;px=999" role="button" title="allowed protocols.png" alt="allowed protocols.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems the inbuilt windows supplicant demands for MSCHAP protocol. From below, can we deduce that client supplicant need to change to EAP-TLS or something wrong at ISE end?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="client asks for MSCHAP.png" style="width: 770px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/8935iAF78F96B0AA81346/image-size/large?v=v2&amp;amp;px=999" role="button" title="client asks for MSCHAP.png" alt="client asks for MSCHAP.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For certificate authentication profile it&amp;nbsp;uses SUBJECT ALTERNATIVE NAME as certificate atrribute to match from Active Directory&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As per your suggestion, I have put below authentication condition for EAP-TLS but it fails as client is asking for MSCHAP, not EAP-TLS.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="EAP-TLS condition.png" style="width: 746px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/8936iF39A9F7B33FC3567/image-size/large?v=v2&amp;amp;px=999" role="button" title="EAP-TLS condition.png" alt="EAP-TLS condition.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like your and other's thoughts on this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Update - I can see OCSP in logs now. Please check my lastest update on this thread below.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 01:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3348809#M556387</guid>
      <dc:creator>paul46</dc:creator>
      <dc:date>2018-03-15T01:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3348870#M556392</link>
      <description>&lt;P&gt;I can now see OCSP in logs but issue is not resolved.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jan was right. The supplicant on windows machine used PEAP (MSCHAPv2) as default. I changed it to use certificate and also updated authentication policy for EAP-TLS (see below)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="EAP-TLS condition.png" style="width: 746px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/8981iCDB1C53F61C3F74F/image-size/large?v=v2&amp;amp;px=999" role="button" title="EAP-TLS condition.png" alt="EAP-TLS condition.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE successfully authenticates machine using PEAP (EAP-TLS) now and got below logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RADIUS Logs&amp;nbsp;&lt;BR /&gt;&lt;!-- bootstrap DOJO --&gt;&lt;/P&gt;
&lt;TABLE class="cpmLocalTableSpacing" border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD colspan="2" valign="top"&gt;
&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;TABLE class="content_table_steps" border="0" cellpadding="3"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;12568&lt;/TD&gt;
&lt;TD&gt;Lookup user certificate status in OCSP cache - certificate for &lt;SPAN&gt;&amp;lt;machinename&amp;gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12569&lt;/TD&gt;
&lt;TD&gt;User certificate status was not found in OCSP cache - certificate for &lt;SPAN&gt;&amp;lt;machinename&amp;gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12988&lt;/TD&gt;
&lt;TD&gt;Take OCSP servers list from OCSP service configuration - certificate for &lt;SPAN&gt;&amp;lt;machinename&amp;gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12550&lt;/TD&gt;
&lt;TD&gt;Sent an OCSP request to the primary OCSP server for the CA - External OCSP Server&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;12561&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;Connection to OCSP server failed - certificate for &lt;SPAN&gt;&amp;lt;machinename&amp;gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12552&lt;/TD&gt;
&lt;TD&gt;Conversation with OCSP server ended with failure - certificate for &lt;SPAN&gt;&amp;lt;machinename&amp;gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="content_table_steps_highlight"&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;12572&lt;/TD&gt;
&lt;TD&gt;OCSP response not cached - certificate for&amp;nbsp;&amp;lt;machinename&amp;gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As shown above, not sure why connection to OCSP fails. I have verified again and again that there is no firewall issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The next thing&lt;/P&gt;
&lt;P&gt;1. I am checking with CA is to make sure that OCSP services are running or not.&lt;/P&gt;
&lt;P&gt;2. Any idea why logs indicates "user" certificate. I think it should be "machine?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have any idea from the logs, plz let me know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Investigation continues &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will keep posting you all. Appreciate your time guys.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 02:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3348870#M556392</guid>
      <dc:creator>paul46</dc:creator>
      <dc:date>2018-03-15T02:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3349242#M556394</link>
      <description>&lt;P&gt;Even though the following link is related to ACS, check if that helps you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/aaa-identity-and-nac/acs-5-4-ocsp-debug/td-p/2163279" target="_blank"&gt;https://supportforums.cisco.com/t5/aaa-identity-and-nac/acs-5-4-ocsp-debug/td-p/2163279&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;INCLUDING THE FOLLOWING PART:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my case it turned out that the OCSP responder URL was incorrect. In fact I was missing the /ocsp suffix.&lt;/P&gt;
&lt;P&gt;ACS logs can be somewhat ambiguous, so best try to query the OSCP responder with openssl and look for any hints in the response:&lt;BR /&gt;openssl ocsp -issuer "path to issuing ca certificate" -cert "path to certificate you want to verify" -url "OSCP responder URL"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hoping that helps&lt;/P&gt;</description>
      <pubDate>Thu, 15 Mar 2018 14:23:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3349242#M556394</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2018-03-15T14:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.3 with OCSP and CRL - Authentication an Authorization</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3351283#M556396</link>
      <description>&lt;P&gt;Final update: there is no issue at ISE end. OCSP is not working as there is some issue on OCSP server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As an alternate workaround, I tried CRL but ISE was not downloading CRL with cisco ISE 2.3 patch 1. After troubleshooting, I found that it is due to a bug (see below link). Cisco has release 2.3 patch 2 on 25th Jan 2018. After installing the patch, CRL is working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/cisco-bug-discussions/cscvc17726-ise-2-1-could-not-download-certificate-revocation/m-p/3351281#M6839" target="_blank"&gt;https://supportforums.cisco.com/t5/cisco-bug-discussions/cscvc17726-ise-2-1-could-not-download-certificate-revocation/m-p/3351281#M6839&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks all for your time. Appreciate it.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Mar 2018 00:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-3-with-ocsp-authentication-an-authorization/m-p/3351283#M556396</guid>
      <dc:creator>paul46</dc:creator>
      <dc:date>2018-03-20T00:02:17Z</dc:date>
    </item>
  </channel>
</rss>

