<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127571#M561984</link>
    <description>Hi Colby,&lt;BR /&gt;&lt;BR /&gt;Thanks for your help and points. I've just set up a lab with a Windows 2k19 hosting NPAS role, Win 10, and a Catalyst 2960 Cisco switch. I'm moving forward on this subject and will update the topic.&lt;BR /&gt;&lt;BR /&gt;Regards</description>
    <pubDate>Wed, 29 Jul 2020 17:57:42 GMT</pubDate>
    <dc:creator>mhdganji110</dc:creator>
    <dc:date>2020-07-29T17:57:42Z</dc:date>
    <item>
      <title>Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124208#M561874</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I know it may looks weird but as we use Cisco devices and ISE is one of the bests for NAC, I'm asking the question here hoping to find some help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As we know, NAP service or agent is not included on windows 10. Prior to it (on windows 7) we used NAP and NPS to control and prevent non joined computers to get access to network. With windows 10 this is not an option and I don't like to get involved with complexity and costs of Cisco ISE and solutions like that. Is there anyway for this to be done using methods like certificates or so?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S.&lt;/P&gt;&lt;P&gt;MAC filtering and security, DHCP or solutions like that are not acceptable cause we cannot wholly prevent people bringing their own devices to work (So they can change their MAC, use static IP's , etc.)&lt;/P&gt;&lt;P&gt;We use Windows 2016 AD domain, Windows 10 clients and Cisco devices if it helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks !&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 13:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124208#M561874</guid>
      <dc:creator>mhdganji110</dc:creator>
      <dc:date>2020-07-23T13:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124230#M561878</link>
      <description>&lt;P&gt;To authenticate the devices connecting to the network, you need to use 802.1x.&amp;nbsp; With 802.1x, you need a Radius server of some sort.&amp;nbsp; ISE is the Radius server.&amp;nbsp; Microsoft also has NPS that is a Radius server.&amp;nbsp; And I am sure there are a lot of free Radius servers out there.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 13:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124230#M561878</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-07-23T13:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124245#M561879</link>
      <description>&lt;P&gt;Thanks but you are wrong. NPS and Windows 7 clients work without any problem (using 802.1X implementation). But on Windows 10, NAP agent is removed so you cannot send computer properties to the RADIUS server in order to make authentication. This is a common widely known problem on Windows 10 so we are forced to use other solutions that use an agent on the systems and connect to the related RADIUS like Cisco ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 14:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124245#M561879</guid>
      <dc:creator>mhdganji110</dc:creator>
      <dc:date>2020-07-23T14:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124277#M561881</link>
      <description>&lt;P&gt;I am not wrong!&amp;nbsp; You asked about authenticating the Windows 10 machines to prevent non-corporate devices from connecting to the network.&amp;nbsp; 802.1x is your answer and only requires the Windows Native Supplicant on Windows 10, a network device that supports 802.1x, and a Radius server.&amp;nbsp; Microsoft NPS is a Radius server.&lt;/P&gt;&lt;P&gt;You are wrong!&amp;nbsp; You are confusing Network Access Protection (NAP) with 802.1x authentication.&amp;nbsp; NAP is like Cisco ISE Posture.&amp;nbsp; It sends details about the machine's health to NPS for consideration in access policies.&amp;nbsp; That DOES require the NAP agent.&amp;nbsp; Just like with Cisco ISE, posture requires the Anyconnect Posture agent.&amp;nbsp; But 802.1x is a separate thing.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 14:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124277#M561881</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-07-23T14:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124487#M561894</link>
      <description>Dear Colby,&lt;BR /&gt;&lt;BR /&gt;Let's make it simple. As a Microsoft term, NAP is the service controlling&lt;BR /&gt;dot1x authenticating and the agent is removed in Windows 10. So, Computer&lt;BR /&gt;authentication is not possible in windows 10 without any agent and just by&lt;BR /&gt;using local and native supplicant. Cisco ISE and AnyConnect (on clients)&lt;BR /&gt;can do the job. Now, to make this discussion go ahead, please just answer&lt;BR /&gt;yes or no to this question:&lt;BR /&gt;&lt;BR /&gt;Is it possible to control and prevent non joined computers from accessing&lt;BR /&gt;network in windows 10 without the need of any extra 3rd party agent?&lt;BR /&gt;(RADIUS server is not important and can be NPS or anything else)&lt;BR /&gt;&lt;BR /&gt;My answer is NO, cause the service and agent doing this (name it NAP or NAC&lt;BR /&gt;or anything) is removed from windows 10.&lt;BR /&gt;&lt;BR /&gt;Is your answer a YES to my specific question?&lt;BR /&gt;&lt;BR /&gt;Many thanks&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 23 Jul 2020 19:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4124487#M561894</guid>
      <dc:creator>mhdganji110</dc:creator>
      <dc:date>2020-07-23T19:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127533#M561980</link>
      <description>&lt;P&gt;Still stuck in the machine authentication problem and maybe these posts confirm that we need a 3rd Party agent on windows 10 because of lacking NAP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://social.technet.microsoft.com/Forums/office/en-US/1b027cc1-6b97-4779-b8e9-ced71ed93651/can-nps-force-computer-and-user-authentication?forum=winserverNAP" target="_blank"&gt;https://social.technet.microsoft.com/Forums/office/en-US/1b027cc1-6b97-4779-b8e9-ced71ed93651/can-nps-force-computer-and-user-authentication?forum=winserverNAP&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Enabling NAP will give you the option to combine user and machine groups in the same policy with an AND statement.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://social.technet.microsoft.com/Forums/ie/en-US/bb886ded-19b5-4b58-9b39-dd572cbe4066/win10-8021x-profile-user-or-computer-authentication?forum=winserverNAP" target="_blank"&gt;https://social.technet.microsoft.com/Forums/ie/en-US/bb886ded-19b5-4b58-9b39-dd572cbe4066/win10-8021x-profile-user-or-computer-authentication?forum=winserverNAP&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I have the same issue that windows 10 unable to do machine authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://social.technet.microsoft.com/Forums/windowsserver/en-US/1b027cc1-6b97-4779-b8e9-ced71ed93651/can-nps-force-computer-and-user-authentication?forum=winserverNAP" target="_blank"&gt;https://social.technet.microsoft.com/Forums/windowsserver/en-US/1b027cc1-6b97-4779-b8e9-ced71ed93651/can-nps-force-computer-and-user-authentication?forum=winserverNAP&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cisco ACS performs this duty by checking that the user authentication is precluded by a computer authentication, and if there is no computer authentication the user auth is rejected. The feature is called Machine Access Restrictions, though i'm not sure exactly how it works I assume it checks the client MAC address against the host and user auth request.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://social.technet.microsoft.com/Forums/ie/en-US/5792931b-560f-440a-9ee0-4e03d165decd/windows-10-client-machine-information-in-nps-due-to-missing-nap-client?forum=winserverNAP" target="_blank"&gt;https://social.technet.microsoft.com/Forums/ie/en-US/5792931b-560f-440a-9ee0-4e03d165decd/windows-10-client-machine-information-in-nps-due-to-missing-nap-client?forum=winserverNAP&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;For other people that will read this, I finally managed to resolve my issue using:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Clearpass Policy Manager from Aruba Networks.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 16:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127533#M561980</guid>
      <dc:creator>mhdganji110</dc:creator>
      <dc:date>2020-07-29T16:53:32Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127537#M561981</link>
      <description>I think as you said, NAP sends information about machine health AND as a matter of fact, basic information about it including data that shows and verifies if it is a corporate joined to AD system. Will be happy and thankful to know how do you think about it.</description>
      <pubDate>Wed, 29 Jul 2020 16:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127537#M561981</guid>
      <dc:creator>mhdganji110</dc:creator>
      <dc:date>2020-07-29T16:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127552#M561982</link>
      <description>&lt;P&gt;As I said before, 802.1x authentication is separate from any posture/health checking.&amp;nbsp; In Windows, the native supplicant (Wired AutoConfig or Wireless AutoConfig) can do machine authentication with 802.1x.&amp;nbsp; The wireless supplicant is always enabled by default.&amp;nbsp; For the Wired side, you need to configure "Wired AutoConfig" to start automatically.&amp;nbsp; Once you do that, then you will see another tab show up on your network adapter properties where you can configure "Authentication."&amp;nbsp; If you choose PEAP MS-CHAPv2 as your EAP protocol, then the computer will send its AD computer credentials to authenticate.&amp;nbsp; So as long as the computer is joined to the domain, it will authenticate successfully.&amp;nbsp; Assuming your Radius server is configured properly.&amp;nbsp; So if you are just looking for authentication, then you do not need any third-party agent.&lt;/P&gt;&lt;P&gt;If you want to check health status or posture (i.e. anti-virus installed and up-to-date), then that is where you need an agent such as Anyconnect Posture Agent if using ISE.&lt;/P&gt;&lt;P&gt;That is what I was trying to explain to you from the beginning.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 17:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127552#M561982</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-07-29T17:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127571#M561984</link>
      <description>Hi Colby,&lt;BR /&gt;&lt;BR /&gt;Thanks for your help and points. I've just set up a lab with a Windows 2k19 hosting NPAS role, Win 10, and a Catalyst 2960 Cisco switch. I'm moving forward on this subject and will update the topic.&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Wed, 29 Jul 2020 17:57:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4127571#M561984</guid>
      <dc:creator>mhdganji110</dc:creator>
      <dc:date>2020-07-29T17:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: Machine authentication on Windows 10 without using Cisco ISE or similar solutions</title>
      <link>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4128694#M562038</link>
      <description>&lt;P&gt;Dear Colby&lt;/P&gt;&lt;P&gt;Let me say that&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It WORKED !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although there are still so many problems and imperfections but starting the service (Which I wonder why is not in automatic state by default) I was able to prevent non corporate machines from gaining access to the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are still issues like this which may be related to Cisco switch or NPS configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Computer and then User authentication not working, (Both in the order mentioned)&lt;/P&gt;&lt;P&gt;- Computer information is sent as null. The user id is sent as the computer name&lt;/P&gt;&lt;P&gt;- Can't figure out a way to allow the non corporate computers to gain access and then decide about them based on different criteria (even when no preventive policy is set against a port. For instance, when I just set the rule to "Ethernet on the switch port side device or a simple day time restriction which is always true)&amp;nbsp; to let a non joined PC to be able to connect but it does not work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll work on this and guess that it should move forward on Microsoft forums.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 15:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/machine-authentication-on-windows-10-without-using-cisco-ise-or/m-p/4128694#M562038</guid>
      <dc:creator>mhdganji110</dc:creator>
      <dc:date>2020-07-31T15:07:47Z</dc:date>
    </item>
  </channel>
</rss>

