<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396329#M567028</link>
    <description>&lt;P&gt;Hello Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I find the best way to resolve these things is by lab testing. I have a handy way to test this without needing any equipment, other than ISE and a Linux workstation. In your example you show Wired 802.1X, but if you would agree that Wireless 802.1X is an equivalent, then I would like to share with you my lab setup below. I don't know exactly what config you put in the Policy Set Condition (the top-most part) and what you put into the Authentication Policy - let's start with the config below and then tell me if I got it wrong:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andy-peap1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119341iA969BD1BF0A2ED2F/image-size/large?v=v2&amp;amp;px=999" role="button" title="andy-peap1.png" alt="andy-peap1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My test client is a Linux workstation with wpa_supplicant configured on it. I wrote a blog series about this years ago - still one of my favourite things to lab with. The command below sends RADIUS requests to ISE and it looks to ISE as if it came from a Wireless Controler. The user is defined in a config file:&lt;/P&gt;
&lt;PRE&gt;[admin-biera@iptel-centos-01 radius]$ &lt;STRONG&gt;cat mschap.conf&lt;/STRONG&gt;
#
network={
        ssid="example"
        key_mgmt=WPA-EAP
        eap=PEAP
        identity="biera"
        anonymous_identity="anonymous"
        password="MyADPassword"
        phase2="autheap=MSCHAPV2"
        ca_cert="/home/admin-biera/radius/IPTEL-ROOT.CA.pem"
}
&lt;/PRE&gt;
&lt;P&gt;Then a client connection is simulated with this command&lt;/P&gt;
&lt;PRE&gt;[admin-biera@iptel-centos-01 radius]$ eapol_test -c mschap.conf -s secretkey -a 192.168.0.220 -M '04:00:00:00:00:DD' -N '6:d:2' -N '8:x:C0A815CA'&lt;/PRE&gt;
&lt;P&gt;The output on the CLI is very long and debug-like - but we look for the last message&lt;/P&gt;
&lt;PRE&gt;WPA: Clear old PMK and PTK
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 1  mismatch: 0
&lt;STRONG&gt;SUCCESS
&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;If you have this setup in the lab, you can quickly test any ISE Policy Set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know the exact test you want to run and I can try again. I am using ISE 2.7 patch 3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andy-peap2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119342iD2623513296D5DE7/image-size/large?v=v2&amp;amp;px=999" role="button" title="andy-peap2.png" alt="andy-peap2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 30 Apr 2021 21:30:44 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2021-04-30T21:30:44Z</dc:date>
    <item>
      <title>failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4395716#M566997</link>
      <description>&lt;P&gt;Gentlemen&lt;/P&gt;&lt;P&gt;i've some deployment 2.1 with single dot1x policy matching CAP.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Dot1X : If Wired_802.1X OR&lt;BR /&gt;Wireless_802.1XAllow Protocols : Default Network Access and&lt;BR /&gt;Default : use MyPKI_Certificate&lt;/P&gt;&lt;P&gt;endpoints configured for EAP-TLS authenticate nice.&lt;/P&gt;&lt;P&gt;but i have some endpoints not configured for EAP-TLS but trying to use&amp;nbsp;PEAP (EAP-MSCHAPv2) instead. They expectedly fails:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Failure Reason 22044 Identity policy result is configured for certificate based authentication methods but received password based&lt;BR /&gt;Authentication Method dot1x&lt;BR /&gt;Authentication Protocol PEAP (EAP-MSCHAPv2)&lt;/P&gt;&lt;P&gt;When i create policy like this:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;If Wired_802.1X AND&lt;BR /&gt;Radius:Calling-Station-ID EQUALS AA-BB-CC-DD-EE-FF AND&lt;BR /&gt;Allow Protocols : Default Network Access and&lt;BR /&gt;Default : use My_AD&lt;/P&gt;&lt;P&gt;endpoints just nice authenticate against AD with&amp;nbsp;PEAP (EAP-MSCHAPv2)&lt;/P&gt;&lt;P&gt;but when i modify policy like this:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;If Wired_802.1X AND&lt;BR /&gt;Radius:Calling-Station-ID EQUALS AA-BB-CC-DD-EE-FF AND&lt;BR /&gt;Network Access:EapTunnel EQUALS PEAP Allow Protocols : Default Network Access and&lt;BR /&gt;Default : use My_AD&lt;/P&gt;&lt;P&gt;or like this:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Dot1X_AD_Computers_MSCHAP_test : If Wired_802.1X AND&lt;BR /&gt;Radius:Calling-Station-ID EQUALS AA-BB-CC-DD-EE-FF AND&lt;BR /&gt;Network Access:EapAuthentication EQUALS EAP-MSCHAPv2 Allow Protocols : Default Network Access and&lt;BR /&gt;Default : use My_AD&lt;/P&gt;&lt;P&gt;or like this:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Dot1X_AD_Computers_MSCHAP_test : If Wired_802.1X AND&lt;BR /&gt;Radius:Calling-Station-ID EQUALS AA-BB-CC-DD-EE-FF AND&lt;BR /&gt;Network Access:EapTunnel EQUALS PEAP AND&lt;BR /&gt;Network Access:EapAuthentication EQUALS EAP-MSCHAPv2 Allow Protocols : Default Network Access and&lt;BR /&gt;Default : use My_AD&lt;/P&gt;&lt;P&gt;target endpoints never match policy &amp;amp; fallback to one EAP-TLS based with expected result.&lt;/P&gt;&lt;P&gt;worth to note that AuthZ policy created for&amp;nbsp;PEAP (EAP-MSCHAPv2) case works like a charm whilst has the same condition inside &amp;amp; always converts Calling-Station-ID into ":" delimiter format&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;if (Wired_802.1X AND My_AD:ExternalGroups EQUALS myad.local/Users/Domain Computers AND Network Access:EapAuthentication EQUALS EAP-MSCHAPv2 AND Network Access:EapTunnel EQUALS PEAP AND Radius:Calling-Station-ID EQUALS AA:BB:CC:DD:EE:FF )&lt;/P&gt;&lt;P&gt;can anybody help here pls?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 21:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4395716#M566997</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-04-29T21:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396035#M567018</link>
      <description>&lt;P&gt;I always separate out Wired and Wireless into separate Policy Sets. Period. I find the separation for Wireless 802.1X is very handy because I often combine it with an SSID check too - different logic per SSID - hence, give each SSID its own Policy Set. Nice and clean. It also make adds/moves/changes more atomic.&lt;/P&gt;
&lt;P&gt;So, why not create a Wired 802.1X and a Wireless 802.1X and then you don't need to test that condition in AuthN and AuthZ. It's tested once at the top of the Policy Set as the primary "condition of entry" into that Policy Set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And per Policy Set, I always separate out my Authentication methods&lt;/P&gt;
&lt;P&gt;EAP-TLS -&amp;gt; Use a Cert Profile (e.g. that checks the SAN for an AD user credential)&lt;/P&gt;
&lt;P&gt;EAP-PEAP -&amp;gt; Use an Identity Source Sequence that does a lookup in AD, then ISE local accounts&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once AuthN is taken care of, then take care of Authorization (AuthZ)&lt;/P&gt;
&lt;P&gt;Remember that you got this far because AuthN succeeded. Therefore, you perform checks like AD membership etc.&lt;/P&gt;
&lt;P&gt;Why are you checking Calling Station ID? I presume that is for a test of a single endpoint only?&lt;/P&gt;
&lt;P&gt;I typically don't care about testing the EAP method again in AuthZ unless the logic really demands it. Because, in many cases you can check for AD membership in AuthZ irrespective of whether the endpoint did EAP-TLS or EAP-PEAP - the AD username is present in either EAP method and in AuthZ you would check that AD user against an AD Group. Just an example, but you get my point?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Apr 2021 11:16:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396035#M567018</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-04-30T11:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396094#M567019</link>
      <description>&lt;P&gt;hi Arne&lt;/P&gt;&lt;P&gt;tnx for input. i totally agree with approach u've described, but this cube came to me as is . that's why particularly i narrowize potential modifications to selected endpoints ;0) meaning i cannot start with splitting policies at this point...&amp;nbsp;&lt;/P&gt;&lt;P&gt;Returning to the problem though, as u can assume i started exactly with AuthC policy (no AuthZ policy yet though i've looked up username against AD &amp;amp; received success - good news at that moment so that i've ran to configure AuthC policy) &amp;amp; stuck :0o&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Dot1X_AD_Computers_MSCHAP_test : If Wired_802.1X AND&lt;BR /&gt;Radius:Calling-Station-ID EQUALS AA-BB-CC-DD-EE-FF AND&lt;BR /&gt;Network Access:EapTunnel EQUALS PEAP AND&lt;BR /&gt;Network Access:EapAuthentication EQUALS EAP-MSCHAPv2 Allow Protocols : Default Network Access and&lt;BR /&gt;Default : use My_AD&lt;/P&gt;&lt;P&gt;why, how, what??? this policy SHOULD match but didnt... at that point i fell back to the simplest&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;If Wired_802.1X AND&lt;BR /&gt;Radius:Calling-Station-ID EQUALS AA-BB-CC-DD-EE-FF AND&lt;BR /&gt;Allow Protocols : Default Network Access and&lt;BR /&gt;Default : use My_AD&lt;/P&gt;&lt;P&gt;&amp;amp; it worked but got failed to AuthZ. Ok. i've configured AuthZ policy (intentionally with all that EAP-stuff)&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;if (Wired_802.1X AND My_AD:ExternalGroups EQUALS myad.local/Users/Domain Computers AND Network Access:EapAuthentication EQUALS EAP-MSCHAPv2 AND Network Access:EapTunnel EQUALS PEAP AND Radius:Calling-Station-ID EQUALS AA:BB:CC:DD:EE:FF )&lt;/P&gt;&lt;P&gt;&amp;amp; it worked - endpoint got fully AuthC/AuthZ'ed...&lt;/P&gt;&lt;P&gt;But as soon as i add that&amp;nbsp;Network Access:Eap* conditions in my simple AuthC policy stuff stops to work.&lt;/P&gt;&lt;P&gt;Can u pls explain why&amp;nbsp;Network Access:Eap* conditions dont work in my original AuthC policy?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Apr 2021 12:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396094#M567019</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-04-30T12:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396329#M567028</link>
      <description>&lt;P&gt;Hello Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I find the best way to resolve these things is by lab testing. I have a handy way to test this without needing any equipment, other than ISE and a Linux workstation. In your example you show Wired 802.1X, but if you would agree that Wireless 802.1X is an equivalent, then I would like to share with you my lab setup below. I don't know exactly what config you put in the Policy Set Condition (the top-most part) and what you put into the Authentication Policy - let's start with the config below and then tell me if I got it wrong:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andy-peap1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119341iA969BD1BF0A2ED2F/image-size/large?v=v2&amp;amp;px=999" role="button" title="andy-peap1.png" alt="andy-peap1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My test client is a Linux workstation with wpa_supplicant configured on it. I wrote a blog series about this years ago - still one of my favourite things to lab with. The command below sends RADIUS requests to ISE and it looks to ISE as if it came from a Wireless Controler. The user is defined in a config file:&lt;/P&gt;
&lt;PRE&gt;[admin-biera@iptel-centos-01 radius]$ &lt;STRONG&gt;cat mschap.conf&lt;/STRONG&gt;
#
network={
        ssid="example"
        key_mgmt=WPA-EAP
        eap=PEAP
        identity="biera"
        anonymous_identity="anonymous"
        password="MyADPassword"
        phase2="autheap=MSCHAPV2"
        ca_cert="/home/admin-biera/radius/IPTEL-ROOT.CA.pem"
}
&lt;/PRE&gt;
&lt;P&gt;Then a client connection is simulated with this command&lt;/P&gt;
&lt;PRE&gt;[admin-biera@iptel-centos-01 radius]$ eapol_test -c mschap.conf -s secretkey -a 192.168.0.220 -M '04:00:00:00:00:DD' -N '6:d:2' -N '8:x:C0A815CA'&lt;/PRE&gt;
&lt;P&gt;The output on the CLI is very long and debug-like - but we look for the last message&lt;/P&gt;
&lt;PRE&gt;WPA: Clear old PMK and PTK
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 1  mismatch: 0
&lt;STRONG&gt;SUCCESS
&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;If you have this setup in the lab, you can quickly test any ISE Policy Set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know the exact test you want to run and I can try again. I am using ISE 2.7 patch 3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andy-peap2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119342iD2623513296D5DE7/image-size/large?v=v2&amp;amp;px=999" role="button" title="andy-peap2.png" alt="andy-peap2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Apr 2021 21:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396329#M567028</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-04-30T21:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396448#M567037</link>
      <description>&lt;P&gt;Hi Arne&lt;/P&gt;&lt;P&gt;i've in that deployment number of endpoints like this. No lab is needed. Can u pls show me how AAA details look like in your case?&lt;/P&gt;&lt;P&gt;i guess i need turn on AAA debug on ISE to drill down this issue.&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 09:31:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396448#M567037</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-05-01T09:31:12Z</dc:date>
    </item>
    <item>
      <title>Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396454#M567039</link>
      <description>&lt;P&gt;Do you mean the Auth result details? I need to fire up the lab again. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the meantime can you post a screenshot of your exact policy set? I can’t follow your text based explanations.&amp;nbsp;&lt;BR /&gt;And you’re running ISE 2.1. Ancient release and I don’t remember all the possible bugs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 10:10:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396454#M567039</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-05-01T10:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396473#M567042</link>
      <description>&lt;P&gt;Hi Arne&lt;/P&gt;&lt;P&gt;policy attached. session details r below:&lt;/P&gt;&lt;P&gt;Overview&lt;BR /&gt;Event 5400 Authentication failed&lt;BR /&gt;Username host/host0DTL0222.myad.local&lt;BR /&gt;Endpoint Id AA:BB:CC:DD:EE:FF&lt;BR /&gt;Endpoint Profile&lt;BR /&gt;Authentication Policy Default &amp;gt;&amp;gt; Dot1X &amp;gt;&amp;gt; Default&lt;BR /&gt;Authorization Result&lt;/P&gt;&lt;P&gt;Authentication Details&lt;BR /&gt;Source Timestamp 2021-05-01 13:56:01.837&lt;BR /&gt;Received Timestamp 2021-05-01 13:56:01.838&lt;BR /&gt;Policy Server PSN1&lt;BR /&gt;Event 5400 Authentication failed&lt;BR /&gt;Failure Reason 22044 Identity policy result is configured for certificate based authentication methods but received password based&lt;BR /&gt;Resolution Check the appropriate configuration in Policy &amp;gt; Authentication. This error happens when the identity source is configured for certificate based and received a password based authentication request.&lt;BR /&gt;Root cause Identity policy result is configured for certificate based authentication methods but received password based&lt;BR /&gt;Username host/host0DTL0222.myad.local&lt;BR /&gt;Endpoint Id AA:BB:CC:DD:EE:FF&lt;BR /&gt;Calling Station Id AA-BB-CC-DD-EE-FF&lt;BR /&gt;IPv4 Address 192.168.1.173&lt;BR /&gt;Audit Session Id 000000000004F56132ADBC21&lt;BR /&gt;Authentication Method dot1x&lt;BR /&gt;Authentication Protocol PEAP (EAP-MSCHAPv2)&lt;BR /&gt;Service Type Framed&lt;BR /&gt;Network Device SWT0S1STL&lt;BR /&gt;Device Type All Device Types#Switch#Production&lt;BR /&gt;Location All Locations#host0&lt;BR /&gt;NAS IPv4 Address 192.168.24.104&lt;BR /&gt;NAS Port Id GigabitEthernet2/0/34&lt;BR /&gt;NAS Port Type Ethernet&lt;BR /&gt;Response Time 1&lt;/P&gt;&lt;P&gt;Other Attributes&lt;BR /&gt;ConfigVersionId 492&lt;BR /&gt;Device Port 1645&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;RadiusPacketType AccessRequest&lt;BR /&gt;Protocol Radius&lt;BR /&gt;NAS-Port 50234&lt;BR /&gt;Framed-MTU 1500&lt;BR /&gt;State 37CPMSessionID=000000000004F56132ADBC21;38SessionID=PSN1/401633359/56582778;&lt;BR /&gt;NetworkDeviceProfileName Cisco&lt;BR /&gt;NetworkDeviceProfileId 6dd2ed4c-7ab2-4eb1-87dc-0cf56da7114e&lt;BR /&gt;IsThirdPartyDeviceFlow false&lt;BR /&gt;RadiusFlowType Wired802_1x&lt;BR /&gt;SSID 01-02-03-04-05-06&lt;BR /&gt;AcsSessionID PSN1/401633359/56582778&lt;BR /&gt;DetailedInfo Invalid username or password specified&lt;BR /&gt;CPMSessionID 000000000004F56132ADBC21&lt;BR /&gt;EndPointMACAddress AA-BB-CC-DD-EE-FF&lt;BR /&gt;ISEPolicySetName Default&lt;BR /&gt;AllowedProtocolMatchedRule Dot1X&lt;BR /&gt;IdentitySelectionMatchedRule Default&lt;BR /&gt;TLSCipher ECDHE-RSA-AES256-SHA&lt;BR /&gt;TLSVersion TLSv1&lt;BR /&gt;Location Location#All Locations#host0&lt;BR /&gt;Device Type Device Type#All Device Types#Switch#Production&lt;BR /&gt;Network Device Profile Cisco&lt;BR /&gt;RADIUS Username host/host0DTL0222.myad.local&lt;BR /&gt;Device IP Address 192.168.24.104&lt;BR /&gt;Called-Station-ID 01-02-03-04-05-06&lt;BR /&gt;CiscoAVPair service-type=Framed, audit-session-id=000000000004F56132ADBC21, method=dot1x&lt;/P&gt;&lt;P&gt;Result&lt;BR /&gt;RadiusPacketType AccessReject&lt;/P&gt;&lt;P&gt;Session Events&lt;BR /&gt;2021-05-01 13:56:02.382 RADIUS Accounting start request&lt;BR /&gt;2021-05-01 13:56:02.038 RADIUS Accounting stop request&lt;BR /&gt;2021-05-01 13:56:01.838 Authentication failed&lt;BR /&gt;2021-05-01 13:36:00.674 RADIUS Accounting start request&lt;BR /&gt;2021-05-01 13:35:59.376 RADIUS Accounting stop request&lt;BR /&gt;2021-05-01 13:35:59.213 Authentication failed&lt;BR /&gt;2021-05-01 13:15:57.299 RADIUS Accounting start request&lt;BR /&gt;2021-05-01 13:15:56.829 RADIUS Accounting stop request&lt;BR /&gt;2021-05-01 13:15:56.665 Authentication failed&lt;BR /&gt;2021-05-01 12:55:54.784 RADIUS Accounting start request&lt;BR /&gt;&lt;BR /&gt;Steps&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session&lt;BR /&gt;15049 Evaluating Policy Group&lt;BR /&gt;15008 Evaluating Service Selection Policy&lt;BR /&gt;15048 Queried PIP - Network Access.EapTunnel&lt;BR /&gt;15048 Queried PIP - Radius.User-Name&lt;BR /&gt;15048 Queried PIP - DEVICE.Device Type&lt;BR /&gt;15004 Matched rule - Dot1X&lt;BR /&gt;11507 Extracted EAP-Response/Identity&lt;BR /&gt;12500 Prepared EAP-Request proposing EAP-TLS with challenge&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12301 Extracted EAP-Response/NAK requesting to use PEAP instead&lt;BR /&gt;12300 Prepared EAP-Request proposing PEAP with challenge&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12302 Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated&lt;BR /&gt;12318 Successfully negotiated PEAP version 0&lt;BR /&gt;12800 Extracted first TLS record; TLS handshake started&lt;BR /&gt;12805 Extracted TLS ClientHello message&lt;BR /&gt;12806 Prepared TLS ServerHello message&lt;BR /&gt;12807 Prepared TLS Certificate message&lt;BR /&gt;12808 Prepared TLS ServerKeyExchange message&lt;BR /&gt;12810 Prepared TLS ServerDone message&lt;BR /&gt;12811 Extracted TLS Certificate message containing client certificate&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12318 Successfully negotiated PEAP version 0&lt;BR /&gt;12812 Extracted TLS ClientKeyExchange message&lt;BR /&gt;12813 Extracted TLS CertificateVerify message&lt;BR /&gt;12804 Extracted TLS Finished message&lt;BR /&gt;12801 Prepared TLS ChangeCipherSpec message&lt;BR /&gt;12802 Prepared TLS Finished message&lt;BR /&gt;12816 TLS handshake succeeded&lt;BR /&gt;12310 PEAP full handshake finished successfully&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12313 PEAP inner method started&lt;BR /&gt;11521 Prepared EAP-Request/Identity for inner EAP method&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;11522 Extracted EAP-Response/Identity for inner EAP method&lt;BR /&gt;11806 Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;11808 Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;BR /&gt;15041 Evaluating Identity Policy&lt;BR /&gt;15006 Matched Default Rule&lt;BR /&gt;22044 Identity policy result is configured for certificate based authentication methods but received password based&lt;BR /&gt;11815 Inner EAP-MSCHAP authentication failed&lt;BR /&gt;11520 Prepared EAP-Failure for inner EAP method&lt;BR /&gt;22028 Authentication failed and the advanced options are ignored&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12307 PEAP authentication failed&lt;BR /&gt;11504 Prepared EAP-Failure&lt;BR /&gt;11003 Returned RADIUS Access-Reject&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 12:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396473#M567042</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-05-01T12:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396596#M567057</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/293790"&gt;@Andrii Oliinyk&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think it's safe to say that you cannot (and should not) test the EAP Inner Methods in the Policy Set Condition (in other words, the outer-most part that happens BEFORE Authentication and Authorization). In ISE 2.1 it seems you could still try and test all those methods, but they will fail. In ISE 2.7 you can still try and test MS-CHAPV2 but it will fail. I think the reason is that ISE does not check inside the EAP packets yet for the Inner Method. That is the job of the Authentication Policy configuration section. The misleading issue is that even ISE 2.7 still lets you configure MSCHAPV2 in the Policy Set Condition - not sure what the use case would be for - but for EAP-PEAP it does not work. I was able to confirm that. I think your config will be fixed if you remove that from the Policy Set and put your EAP checks into the Authentication Section.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below shows what's still possible in ISE 2.7 - only MSCHAPV2 in the outer Policy Set Condition:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andy1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119382iBF3C6A573F269DBF/image-size/large?v=v2&amp;amp;px=999" role="button" title="andy1.png" alt="andy1.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andy2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119383iF8A4775BC5E070E8/image-size/large?v=v2&amp;amp;px=999" role="button" title="andy2.png" alt="andy2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The results:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andy3.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/119384iDF33F49812DBE3A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="andy3.png" alt="andy3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my case, if I include the MSCHAPV2 check in the Policy Set, it will fail that Policy Set, and try the next one. In my case the nect Policy Set is called IPTEL WIRELESS 802.1X and it's a very simple Condition that only checks for "Wireless_802.1X" - that of course is good enough, and hence the Policy passes. But in our little experiment here, it proves that we had a "failure".&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 22:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396596#M567057</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-05-01T22:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: failure to hit Authentication Protocol PEAP (EAP-MSCHAPv2) based AuthC policy</title>
      <link>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396946#M567084</link>
      <description>&lt;P&gt;Hi Arne&lt;/P&gt;&lt;P&gt;ton of tnx for your valuable help. PolicySet-writing convention like this have been always confusing me!&lt;/P&gt;&lt;P&gt;I've modified my original policy set (because it's Policy Set - u r totally right!) &amp;amp; stuff started to work :0)&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 11:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/failure-to-hit-authentication-protocol-peap-eap-mschapv2-based/m-p/4396946#M567084</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2021-05-03T11:01:01Z</dc:date>
    </item>
  </channel>
</rss>

