<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows 10 TEAP EAP-Chaining with ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-10-teap-eap-chaining-with-ise/m-p/4398381#M567154</link>
    <description>&lt;P&gt;We are just starting to test using TEAP with Windows and Cisco ISE (EAP-Chaining) rather than use the AnyConnect NAM module.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have deployed Workstation Authentication Certificates and are trying to get the machine authentication done via certificate and the user authentication via username/password (MSCHAPV2) - both of which will be Active Directory authenticated.&lt;BR /&gt;&lt;BR /&gt;My main question is that so far the ISE Live Logs show EAP (MSCHAPV2) for both the machine and user auth.&lt;BR /&gt;&lt;BR /&gt;Is using MSCHAPV2 secure enough for machine authentication?&lt;/P&gt;&lt;P&gt;Is it actually the certificate or not?&lt;BR /&gt;&lt;BR /&gt;Or should I be aiming to ensure the machine authentication part is EAP-TLS?&lt;BR /&gt;&lt;BR /&gt;Bit confused about how secure machine auth is with MSCHAPV2.&lt;BR /&gt;&lt;BR /&gt;We have experimented with the settings on Windows but cannot seem to get the cert for machine auth to work?&lt;/P&gt;</description>
    <pubDate>Wed, 05 May 2021 17:57:37 GMT</pubDate>
    <dc:creator>nathgregory</dc:creator>
    <dc:date>2021-05-05T17:57:37Z</dc:date>
    <item>
      <title>Windows 10 TEAP EAP-Chaining with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-teap-eap-chaining-with-ise/m-p/4398381#M567154</link>
      <description>&lt;P&gt;We are just starting to test using TEAP with Windows and Cisco ISE (EAP-Chaining) rather than use the AnyConnect NAM module.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have deployed Workstation Authentication Certificates and are trying to get the machine authentication done via certificate and the user authentication via username/password (MSCHAPV2) - both of which will be Active Directory authenticated.&lt;BR /&gt;&lt;BR /&gt;My main question is that so far the ISE Live Logs show EAP (MSCHAPV2) for both the machine and user auth.&lt;BR /&gt;&lt;BR /&gt;Is using MSCHAPV2 secure enough for machine authentication?&lt;/P&gt;&lt;P&gt;Is it actually the certificate or not?&lt;BR /&gt;&lt;BR /&gt;Or should I be aiming to ensure the machine authentication part is EAP-TLS?&lt;BR /&gt;&lt;BR /&gt;Bit confused about how secure machine auth is with MSCHAPV2.&lt;BR /&gt;&lt;BR /&gt;We have experimented with the settings on Windows but cannot seem to get the cert for machine auth to work?&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 17:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-teap-eap-chaining-with-ise/m-p/4398381#M567154</guid>
      <dc:creator>nathgregory</dc:creator>
      <dc:date>2021-05-05T17:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 TEAP EAP-Chaining with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-teap-eap-chaining-with-ise/m-p/4398505#M567158</link>
      <description>&lt;P&gt;Certificate-based EAP methods like EAP-TLS are generally considered more secure than password-based methods like PEAP-MSCHAPv2. See &lt;A href="https://www.securew2.com/blog/eap-tls-vs-peap-mschapv2-which-authentication-protocol-is-superior/" target="_blank" rel="noopener"&gt;this blog&lt;/A&gt; for details on two.&lt;/P&gt;
&lt;P&gt;Machine auth using EAP-TLS is common, but lots of organisations find user certificate-based user auth too difficult to manage due to certificate enrollment, expiry, etc. TEAP supports using EAP-TLS for machine auth and PEAP-MSCHAPv2, so it's a viable option to mitigate user certificate concerns. It also provides the added benefit of EAP Chaining. I would suggest reviewing the &lt;A href="https://www.ise-support.com/2020/05/29/using-teap-for-eap-chaining/" target="_blank" rel="noopener"&gt;Using TEAP for EAP Chaining&lt;/A&gt; document and comparing it to your setup.&lt;/P&gt;
&lt;P&gt;It's not very clear in the UI but, in the Client Authentication section of the supplicant the 'Primary EAP method' refers to the User auth state, and the 'Secondary EAP method' refers to the computer auth state.&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 00:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-teap-eap-chaining-with-ise/m-p/4398505#M567158</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-05-06T00:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 10 TEAP EAP-Chaining with ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-10-teap-eap-chaining-with-ise/m-p/4398697#M567168</link>
      <description>&lt;P&gt;Thanks that got it working!&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 11:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-10-teap-eap-chaining-with-ise/m-p/4398697#M567168</guid>
      <dc:creator>nathgregory</dc:creator>
      <dc:date>2021-05-06T11:20:57Z</dc:date>
    </item>
  </channel>
</rss>

