<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cert based 802.1x authentication with Microsoft NPS - need help in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4310332#M566289</link>
    <description>&lt;P&gt;Hi Thomas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for the document you shared and it was very informative. I have gone through it for the past few days and did some investigation into the issue. we found that the Radius request is going to a Radius server with misconfiguration and able to fix the issue by removing the radius server from the group to reconfigure.&amp;nbsp; but I found some strange behavior on the Radius requests on switch 2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even we have configured our radius servers as below way, the switch is preferring the PDC01NPS01&amp;nbsp; instead of PDC06NPS01.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa group server radius RAD_SERVERS&lt;/P&gt;&lt;P&gt;&amp;nbsp;server name PDC06NPS01&lt;/P&gt;&lt;P&gt;&amp;nbsp;server name PDC06NPS02&lt;/P&gt;&lt;P&gt;&amp;nbsp;server name PDC01NPS01&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there a way we can select weight on one server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The switch we are using is WS-C3650-48PD with&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ROM: IOS-XE ROMMON&lt;/P&gt;&lt;P&gt;BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) Version 3.56, RELEASE SOFTWARE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Mar 2021 12:12:06 GMT</pubDate>
    <dc:creator>ShainMilan</dc:creator>
    <dc:date>2021-03-19T12:12:06Z</dc:date>
    <item>
      <title>cert based 802.1x authentication with Microsoft NPS - need help</title>
      <link>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4306450#M566088</link>
      <description>&lt;P&gt;authentication We have recently deployed cert based 802.1x authentication with Microsoft NPS for two stack switch groups ( STACK01 / STACK02 ) &amp;nbsp;.&amp;nbsp; each stack switch group contains 3 switches. &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But we have identified cert based 802.1x is working as expected on stack switch ( STACK01) and STACK02 clients are not authenticating.&lt;/P&gt;&lt;P&gt;I have run some debug commands to identify the issue and found the below logs .and it shows “ EAPOL announcement CLI is not configured on GigabitEthernet2/0/9”&amp;nbsp;&amp;nbsp; which I’m not sure exactly what it means&lt;/P&gt;&lt;P&gt;Appreciate if someone can help me with this issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is my current port configuration&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;switchport access vlan 128&lt;BR /&gt;switchport mode access&lt;BR /&gt;switchport voice vlan 148&lt;BR /&gt;device-tracking&lt;BR /&gt;authentication event fail action authorize vlan 640&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;authentication event no-response action authorize vlan 640&lt;BR /&gt;authentication host-mode multi-domain&lt;BR /&gt;authentication order dot1x mab&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;authentication periodic&lt;BR /&gt;authentication timer reauthenticate 120&lt;BR /&gt;authentication timer restart 30&lt;BR /&gt;authentication timer unauthorized 30&lt;BR /&gt;authentication violation replace&lt;BR /&gt;mab&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;dot1x max-reauth-req 3&lt;BR /&gt;auto qos trust dscp&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;spanning-tree bpduguard enable&lt;BR /&gt;service-policy input AutoQos-4.0-Trust-Dscp-Input-Policy&lt;BR /&gt;service-policy output AutoQos-4.0-Output-Policy&lt;BR /&gt;ip dhcp snooping limit rate 10&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 18:16:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4306450#M566088</guid>
      <dc:creator>ShainMilan</dc:creator>
      <dc:date>2021-03-12T18:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: cert based 802.1x authentication with Microsoft NPS - need help</title>
      <link>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4306832#M566102</link>
      <description>&lt;P&gt;You may read &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515" target="_self"&gt;ISE Secure Wired Access Prescriptive Deployment Guide&lt;/A&gt; for our best practice switch configuration.&lt;/P&gt;
&lt;P&gt;It is unknown from your post what switch model or software version you are using.&lt;/P&gt;
&lt;P&gt;Also unknown what endpoint OS or supplicant configuration you are using.&lt;/P&gt;
&lt;P&gt;If the endpoint is getting the 802.1X challenge, all issues after that are between the endpoint supplicant (802.1X client) and the RADIUS server which is NPS in this case. Most likely an endpoint supplicant configuration issue like not trusting the RADIUS server certificate if I had to guess without knowing any actual details.&lt;/P&gt;
&lt;P&gt;See &lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-to-ask-the-community-for-help/ta-p/3704356" target="_self"&gt;How to Ask The Community for Help&lt;/A&gt;&lt;/SPAN&gt; for additional details that would help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 19:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4306832#M566102</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-03-13T19:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: cert based 802.1x authentication with Microsoft NPS - need help</title>
      <link>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4310332#M566289</link>
      <description>&lt;P&gt;Hi Thomas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for the document you shared and it was very informative. I have gone through it for the past few days and did some investigation into the issue. we found that the Radius request is going to a Radius server with misconfiguration and able to fix the issue by removing the radius server from the group to reconfigure.&amp;nbsp; but I found some strange behavior on the Radius requests on switch 2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even we have configured our radius servers as below way, the switch is preferring the PDC01NPS01&amp;nbsp; instead of PDC06NPS01.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;aaa group server radius RAD_SERVERS&lt;/P&gt;&lt;P&gt;&amp;nbsp;server name PDC06NPS01&lt;/P&gt;&lt;P&gt;&amp;nbsp;server name PDC06NPS02&lt;/P&gt;&lt;P&gt;&amp;nbsp;server name PDC01NPS01&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there a way we can select weight on one server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The switch we are using is WS-C3650-48PD with&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ROM: IOS-XE ROMMON&lt;/P&gt;&lt;P&gt;BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) Version 3.56, RELEASE SOFTWARE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Mar 2021 12:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4310332#M566289</guid>
      <dc:creator>ShainMilan</dc:creator>
      <dc:date>2021-03-19T12:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: cert based 802.1x authentication with Microsoft NPS - need help</title>
      <link>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4310731#M566311</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networking-services/whitepaper_C11-731907.html" target="_self"&gt;Demystifying RADIUS Server Configurations&lt;/A&gt;&amp;nbsp;has some explanations how load-balance can be done on IOS/IOS-XE.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Mar 2021 22:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cert-based-802-1x-authentication-with-microsoft-nps-need-help/m-p/4310731#M566311</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-03-19T22:59:57Z</dc:date>
    </item>
  </channel>
</rss>

