<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Network adapter shows as, Unauthenticated in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4124691#M561901</link>
    <description>&lt;P&gt;Thanks for the comprehensive Windows supplicant screenshots. You are doing EAP-TLS User Authentication. It means that when the PC boots up and gets to the Windows Login screen, there will be no 802.1X sent to the switch. This explains the MAB. If the MAB causes an access-reject from ISE, then the switchport won't be in a good state and the PC might not have an IP address. Once the user logs into Windows, the supplicant will kick in - but by this time it's too late because the Cisco switch already has a session - and there was no Layer1 link down/up to cause the switch to restart the NAC. So, your solution to bounce the port is just that - Link Down/Up to cause the NAC process on the switch port. And then hey ....! User auth from Windows kicks in and the EAP-TLS does its job.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your machines are domain joined, then change your supplicant to use Machine Authentication. This will ensure that the PC gets the NAC out of the way while PC is booting up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is another mode called User/Machine auth - this does both. But it means that you will get a NAC event during boot up to auth the machine, and then a NAC event when the user logs on. If you don't need to NAC every time the user logs on, the just do machine auth.&lt;/P&gt;
&lt;P&gt;I will caution though ... what happens if the laptop goes to sleep after you've logged in and working for a while? Then come back from sleep and log into windows ... network will not work. Because the login event didn't trigger NAC event.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is one reason to do both user/machine auth together, as long as you have a machine cert (always the case for domain joined machines) as well as user certs (pushed by Group Policy).&lt;/P&gt;
&lt;P&gt;There are further complications if the user switches between wired and wireless, and mixes EAP methods (like EAP-TLS for machine auth and EAP-PEAP for user auth) - in those cases you will need Cisco AnyConnect client software.&lt;/P&gt;
&lt;P&gt;OR ... the future ... ISE2.7 and Windows 10 (May 2020 release) using TEAP. The solution to all of the above.&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jul 2020 00:50:18 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2020-07-24T00:50:18Z</dc:date>
    <item>
      <title>Network adapter shows as, Unauthenticated</title>
      <link>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4117421#M561662</link>
      <description>&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Hi Experts,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Setup&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;ISE 2.6 (standalone)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;Switch 2960 running IOS&amp;nbsp;15.2(2)E7&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;Use cases is of dot1x and posture, all the client have AnyConnect installed.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;The issue that we are seeing is as follows, when for the first time of the day when a client boots up, the dot1x authentication does not happen. And the network card shows as unauthenticated and endpoint use MAB instead.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;To make this work, we have to manually disable and enable the network card. and then it works with dot1x and posture happens and then as per the compliance policy is assigned the right VLAN.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;Once the adapter has been disabled and enabled, then for the entire day no matter how many times the machine connects or disconnects, issue is not seen and not replicated.&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;The desktop is running Windows 10 with the latest updates&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;The network adapter drivers have also been updated to the latest&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Not sure what could be missing from the configuration, any pointers?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;Or are there any specific timers that are needed to be enabled on switch configuration?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 05:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4117421#M561662</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2020-07-13T05:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: Network adapter shows as, Unauthenticated</title>
      <link>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4120913#M561771</link>
      <description>&lt;P&gt;Can you share the relevant parts of the IOS (interface) config?&lt;/P&gt;
&lt;P&gt;And also show us how the Windows supplicant is configured?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2020 23:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4120913#M561771</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-07-17T23:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: Network adapter shows as, Unauthenticated</title>
      <link>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4121371#M561785</link>
      <description>&lt;P&gt;Can you share your switch radius configuration!&lt;/P&gt;&lt;P&gt;Or&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please check below command you applied in Global config mode in switch or not?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;dot1x system-auth-control&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;BR /&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Muhammad Zunaid Bhuiyan&lt;/P&gt;&lt;P&gt;Or you can directly contact with me. I will try to troubleshoot your issue remotely.&lt;/P&gt;&lt;P&gt;Mobile+Whatsapp+Viber+IMO: +8801962400050&lt;/P&gt;&lt;P&gt;Email: zunaid.cse@gmail.com&lt;/P&gt;&lt;P&gt;Skype: mzunaidbhuiyan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2020 16:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4121371#M561785</guid>
      <dc:creator>zunaid.cse</dc:creator>
      <dc:date>2020-07-19T16:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: Network adapter shows as, Unauthenticated</title>
      <link>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4124116#M561867</link>
      <description>&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;&lt;STRONG&gt;This is the configuration that I have on the switch:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa new-model&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa group server radius ISE&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;server name DC-ISE-01&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa authentication login ISE-TACACS group tacacs+ local&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa authentication dot1x default group radius&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa authorization config-commands&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa authorization exec default group tacacs+ if-authenticated &lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa authorization commands 1 ISE-TACACS group tacacs+ local &lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa authorization commands 15 ISE-TACACS group tacacs+ local &lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa authorization network default group radius &lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa accounting update newinfo periodic 2880&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa accounting dot1x default start-stop group radius&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa server radius dynamic-author&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;client &amp;lt;ISE Server&amp;gt; server-key 7 03270A180500701E1D5D4C&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;aaa session-id common&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;no ip domain-lookup&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip domain-name prasac.com.kh&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip device tracking probe auto-source&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip device tracking probe delay 10&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;interface GigabitEthernet1/0/1&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;switchport access vlan 115&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;switchport mode access&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;switchport voice vlan 125&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication event server dead action reinitialize vlan 115&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication event server alive action reinitialize &lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication host-mode multi-domain&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication open&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication order mab dot1x&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication priority dot1x mab&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication port-control auto&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication periodic&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication timer reauthenticate server&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;authentication timer inactivity server&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;mab&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;dot1x pae authenticator&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;spanning-tree portfast edge&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip http server&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip http authentication local&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip http secure-server&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip ssh time-out 60&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip ssh authentication-retries 2&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip ssh version 2&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip tacacs source-interface Vlan105&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;ip access-list extended simple&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny udp any any eq domain&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny udp any eq bootps any eq bootpc&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny udp any eq bootpc any eq bootps&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;deny ip any host &amp;lt;ISE Server&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;permit tcp any any eq www&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;permit tcp any any eq 443&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;radius server ISE&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;address ipv4 &amp;lt;ISE Server&amp;gt; auth-port 1812 acct-port 1813&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;key 7 072C705F4D06485744465E&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;dot1x system-auth-control&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;radius-server vsa send accounting&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;radius-server vsa send authentication&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;Network card config attached&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 09:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4124116#M561867</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2020-07-23T09:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Network adapter shows as, Unauthenticated</title>
      <link>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4124118#M561868</link>
      <description>&lt;P&gt;&lt;FONT face="georgia,palatino"&gt;Yes, those commands are already applied on the switch, its that if you disable and enable the network adapter, then the dot1x works.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="georgia,palatino"&gt;But, when the next day same PC starts up, it will again be needed to disable and enable the network card to have the dot1x working.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 09:33:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4124118#M561868</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2020-07-23T09:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: Network adapter shows as, Unauthenticated</title>
      <link>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4124691#M561901</link>
      <description>&lt;P&gt;Thanks for the comprehensive Windows supplicant screenshots. You are doing EAP-TLS User Authentication. It means that when the PC boots up and gets to the Windows Login screen, there will be no 802.1X sent to the switch. This explains the MAB. If the MAB causes an access-reject from ISE, then the switchport won't be in a good state and the PC might not have an IP address. Once the user logs into Windows, the supplicant will kick in - but by this time it's too late because the Cisco switch already has a session - and there was no Layer1 link down/up to cause the switch to restart the NAC. So, your solution to bounce the port is just that - Link Down/Up to cause the NAC process on the switch port. And then hey ....! User auth from Windows kicks in and the EAP-TLS does its job.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your machines are domain joined, then change your supplicant to use Machine Authentication. This will ensure that the PC gets the NAC out of the way while PC is booting up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is another mode called User/Machine auth - this does both. But it means that you will get a NAC event during boot up to auth the machine, and then a NAC event when the user logs on. If you don't need to NAC every time the user logs on, the just do machine auth.&lt;/P&gt;
&lt;P&gt;I will caution though ... what happens if the laptop goes to sleep after you've logged in and working for a while? Then come back from sleep and log into windows ... network will not work. Because the login event didn't trigger NAC event.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is one reason to do both user/machine auth together, as long as you have a machine cert (always the case for domain joined machines) as well as user certs (pushed by Group Policy).&lt;/P&gt;
&lt;P&gt;There are further complications if the user switches between wired and wireless, and mixes EAP methods (like EAP-TLS for machine auth and EAP-PEAP for user auth) - in those cases you will need Cisco AnyConnect client software.&lt;/P&gt;
&lt;P&gt;OR ... the future ... ISE2.7 and Windows 10 (May 2020 release) using TEAP. The solution to all of the above.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2020 00:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/network-adapter-shows-as-unauthenticated/m-p/4124691#M561901</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-07-24T00:50:18Z</dc:date>
    </item>
  </channel>
</rss>

