<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Public cert issue with Windows. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/public-cert-issue-with-windows/m-p/4450031#M569057</link>
    <description>&lt;P&gt;So, with the push with Android to require public certs, we are testing using a public cert for ISE, but as EAP is an all or nothing, we are seeing an issue with our wired devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are testing setting 802.1x to trust Comodo CA for certs, but see mixed results.&amp;nbsp;&lt;/P&gt;&lt;P&gt;info on out setup,&lt;/P&gt;&lt;P&gt;1: All ports start with an ACL on the switch called unauth that blocks most except AD controllers until authenticated.&lt;/P&gt;&lt;P&gt;2: PCs are in a user or computer auth so ISE can see if the PC is domain joined.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With Comodo checked on the PC, we can see the PC itself auth, but when a user logs in, it gets stuck, or fails auth. From a pcap, I can see the PC trying to go out to&amp;nbsp;ocsp.comodoca.com, but the unauth ACL blocks this. The weird thing is if you let it sit for a min or so before logging in, it will usually work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, my question is I can't be the only one to use/try public certs. How do you fix the issue? Tell the PCs to not validate? Give them internet access to validate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing I see is OCSP Stapling, but it looks like this is not supported in ISE.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Aug 2021 16:28:45 GMT</pubDate>
    <dc:creator>Dustin Anderson</dc:creator>
    <dc:date>2021-08-16T16:28:45Z</dc:date>
    <item>
      <title>Public cert issue with Windows.</title>
      <link>https://community.cisco.com/t5/network-access-control/public-cert-issue-with-windows/m-p/4450031#M569057</link>
      <description>&lt;P&gt;So, with the push with Android to require public certs, we are testing using a public cert for ISE, but as EAP is an all or nothing, we are seeing an issue with our wired devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are testing setting 802.1x to trust Comodo CA for certs, but see mixed results.&amp;nbsp;&lt;/P&gt;&lt;P&gt;info on out setup,&lt;/P&gt;&lt;P&gt;1: All ports start with an ACL on the switch called unauth that blocks most except AD controllers until authenticated.&lt;/P&gt;&lt;P&gt;2: PCs are in a user or computer auth so ISE can see if the PC is domain joined.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With Comodo checked on the PC, we can see the PC itself auth, but when a user logs in, it gets stuck, or fails auth. From a pcap, I can see the PC trying to go out to&amp;nbsp;ocsp.comodoca.com, but the unauth ACL blocks this. The weird thing is if you let it sit for a min or so before logging in, it will usually work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, my question is I can't be the only one to use/try public certs. How do you fix the issue? Tell the PCs to not validate? Give them internet access to validate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing I see is OCSP Stapling, but it looks like this is not supported in ISE.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 16:28:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/public-cert-issue-with-windows/m-p/4450031#M569057</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2021-08-16T16:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: Public cert issue with Windows.</title>
      <link>https://community.cisco.com/t5/network-access-control/public-cert-issue-with-windows/m-p/4450916#M569100</link>
      <description>&lt;P&gt;If you are able to give access to the OCSP URL, please try that. Also, please give this feedback to Microsoft.&lt;/P&gt;
&lt;P&gt;On OCSP stapling, it seems still early days, per &lt;A href="https://www.reddit.com/r/AskNetsec/comments/c212d9/crl_or_oscp_checking_from_the_client_during_dot1x/" target="_self"&gt;CRL or OSCP checking from the client during dot1x&lt;/A&gt;&amp;nbsp;:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;...&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;OCSP stapling can be used to supply the OCSP status as part of the server certificate response. This is part of EAP-TLS with TLS 1.3.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;...&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 06:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/public-cert-issue-with-windows/m-p/4450916#M569100</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2021-08-18T06:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Public cert issue with Windows.</title>
      <link>https://community.cisco.com/t5/network-access-control/public-cert-issue-with-windows/m-p/4451454#M569117</link>
      <description>&lt;P&gt;Thanks, I was afraid of that, but may be the only option. As an ACL can not do FQDN, I may have to give them port 80 access and use the firewall to do the FQDN access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All this cause android is starting to force cert validation.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 19:33:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/public-cert-issue-with-windows/m-p/4451454#M569117</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2021-08-18T19:33:03Z</dc:date>
    </item>
  </channel>
</rss>

