<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 3.1 patch-1 and Radius PEAP GTC or PEAP MSCHAPv2 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4584105#M573819</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're entirely correct. I just performed EAP-PEAP MSCHAP-v2 with a Windows 10 client where the Identity Privacy was enabled.&lt;/P&gt;
&lt;P&gt;I configured the Windows supplicant to use Identity Privacy (to obscure the outer identity) - I entered arbitrary text of "hideme300".&lt;/P&gt;
&lt;P&gt;This is from a GNS3 lab ... I took some shortcuts on checking the ISE cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suppl.PNG" style="width: 598px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/147926i5A0B495AE453B0DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="suppl.PNG" alt="suppl.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I logged in as "user1" when prompted by the Windows Supplicant.&lt;/P&gt;
&lt;P&gt;The ensuing wireshark on ISE shows that in the Access-Request contains User-Name "hideme300".&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="hideme.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/147924iBA9D79E003C8472A/image-size/large?v=v2&amp;amp;px=999" role="button" title="hideme.PNG" alt="hideme.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But as you pointed out, the final Access-Accept to the switch contains the inner identity of user1.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="access.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/147925i0C570DEBE0A6D5D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="access.PNG" alt="access.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From a security point of view that is possibly not what you wanted. But. Consider that the NAS (WLC/Switch) usually takes that username in the Access-Accept for display purposes to show authenticated users. It's very helpful and also very helpful for troubleshooting.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Perhaps there is an RFC somewhere that describes what &lt;EM&gt;SHOULD&lt;/EM&gt; be sent in the final Access-Accept when identity privacy is used. If the RFC says that the User-Name &lt;EM&gt;MUST&lt;/EM&gt; always be obfuscated, then I think you have a bone to pick with Cisco.&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2022 22:03:23 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2022-04-01T22:03:23Z</dc:date>
    <item>
      <title>ISE 3.1 patch-1 and Radius PEAP GTC or PEAP MSCHAPv2</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4583344#M573781</link>
      <description>&lt;P&gt;I have a Cisco ISE, version 3.1 patch-1, use for device administration with an IP address of 192.168.1.100. I have a client device (PaloAlto firewall) that has an IP address of 192.168.1.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I setup the PaloAlto for radius authentication via PEAP with GTC. I've enable PEAP with GTC on the ISE 3.1 patch-1. Everything is working fine but when I run tcpdump on the network, I still see the ISE respond back with the actual username in "clear text" over the wire. I thought PEAP MSCHAPv2 or PEAP with GTC is supposed to eliminate this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this expected behavior?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts? See below&lt;/P&gt;&lt;P&gt;19:42:47.308821 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 88 [id 0] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.334877 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 154 [id 0] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.335291 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 188 [id 1] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.337077 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 154 [id 1] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.337553 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 389 [id 2] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.442931 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 1166 [id 2] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.443537 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 188 [id 3] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.445595 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 1162 [id 3] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.446096 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 188 [id 4] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.447489 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 281 [id 4] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.459524 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 386 [id 5] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.475335 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 205 [id 5] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.475866 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 188 [id 6] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.477807 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 184 [id 6] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.478093 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 228 [id 7] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.479800 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 218 [id 7] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.480137 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 223 [id 8] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.610645 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 194 [id 8] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.611079 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 228 [id 9] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;19:42:47.627168 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-cha 194 [id 9] Attr[ [|radius] (DF)&lt;BR /&gt;19:42:47.627560 192.168.1.1.58251 &amp;gt; 192.168.1.100.1812: rad-access-req 232 [id 10] Attr[ User{anonymous} Framed_mtu{1200} Service_type{Framed} NAS_id{ACS} NAS_ipaddr{192.168.1.1} ]&lt;BR /&gt;&lt;U&gt;19:42:47.637284 192.168.1.100.1812 &amp;gt; 192.168.1.1.58251: rad-access-accept 302 [id 10] Attr[ User{&lt;EM&gt;&lt;STRONG&gt;adamscott&lt;/STRONG&gt;&lt;/EM&gt;} [|radius] (DF)&lt;/U&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 20:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4583344#M573781</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2022-03-31T20:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.1 patch-1 and Radius PEAP GTC or PEAP MSCHAPv2</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4583552#M573784</link>
      <description>&lt;P&gt;That's because the username is not being anonymised and the authenticator (switch or WLC) grabs the username from the EAP login and copies it into the RADIUS User-Name attribute. From there onwards it's reflected in clear text for all to see.&lt;/P&gt;
&lt;P&gt;Some supplicants do allow anonymous outer authentication but I have not used it intentionally - Windows has an option called "Enable Identity Privacy". I have also seen it on WPA Supplicant software and other Linux/Android variants.&amp;nbsp; I would like to dive a bit deeper on this but that's about as much as I know off the cuff.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is hiding of usernames important?&lt;/P&gt;
&lt;P&gt;The password is the thing that you don't want to see in cleartext. And with MSChapv2 there are no passwords - just exchanges of hashes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 05:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4583552#M573784</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-01T05:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.1 patch-1 and Radius PEAP GTC or PEAP MSCHAPv2</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4583766#M573793</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;That's because the username is not being anonymised and the authenticator (switch or WLC) grabs the username from the EAP login and copies it into the RADIUS User-Name attribute. From there onwards it's reflected in clear text for all to see.&lt;/P&gt;&lt;P&gt;Some supplicants do allow anonymous outer authentication but I have not used it intentionally - Windows has an option called "Enable Identity Privacy". I have also seen it on WPA Supplicant software and other Linux/Android variants.&amp;nbsp; I would like to dive a bit deeper on this but that's about as much as I know off the cuff.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Is hiding of usernames important?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;The password is the thing that you don't want to see in cleartext. And with MSChapv2 there are no passwords - just exchanges of hashes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes.&amp;nbsp; Getting the username is winning half the battle.&amp;nbsp; You must not be working in security, LOL...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know if you read the entire post before replying.&amp;nbsp; It is the ISE that sends back the username in cleartext.&amp;nbsp; The PaloAlto firewall anonymous username in the outer shell.&amp;nbsp; I enable feature on the PaloAlto firewall.&amp;nbsp; I am trying to understand the ISE is responding with sending username in cleartext over the wire, and that this is an expected behavior&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 11:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4583766#M573793</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2022-04-01T11:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.1 patch-1 and Radius PEAP GTC or PEAP MSCHAPv2</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4584105#M573819</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're entirely correct. I just performed EAP-PEAP MSCHAP-v2 with a Windows 10 client where the Identity Privacy was enabled.&lt;/P&gt;
&lt;P&gt;I configured the Windows supplicant to use Identity Privacy (to obscure the outer identity) - I entered arbitrary text of "hideme300".&lt;/P&gt;
&lt;P&gt;This is from a GNS3 lab ... I took some shortcuts on checking the ISE cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="suppl.PNG" style="width: 598px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/147926i5A0B495AE453B0DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="suppl.PNG" alt="suppl.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I logged in as "user1" when prompted by the Windows Supplicant.&lt;/P&gt;
&lt;P&gt;The ensuing wireshark on ISE shows that in the Access-Request contains User-Name "hideme300".&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="hideme.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/147924iBA9D79E003C8472A/image-size/large?v=v2&amp;amp;px=999" role="button" title="hideme.PNG" alt="hideme.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But as you pointed out, the final Access-Accept to the switch contains the inner identity of user1.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="access.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/147925i0C570DEBE0A6D5D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="access.PNG" alt="access.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From a security point of view that is possibly not what you wanted. But. Consider that the NAS (WLC/Switch) usually takes that username in the Access-Accept for display purposes to show authenticated users. It's very helpful and also very helpful for troubleshooting.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Perhaps there is an RFC somewhere that describes what &lt;EM&gt;SHOULD&lt;/EM&gt; be sent in the final Access-Accept when identity privacy is used. If the RFC says that the User-Name &lt;EM&gt;MUST&lt;/EM&gt; always be obfuscated, then I think you have a bone to pick with Cisco.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 22:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4584105#M573819</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-01T22:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.1 patch-1 and Radius PEAP GTC or PEAP MSCHAPv2</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4593639#M574179</link>
      <description>&lt;P&gt;ISE supports the RADIUS standard protocols s as documented in &lt;A href="https://cs.co/ise-compatibility" target="_self"&gt;ISE Compatibility Guides&lt;/A&gt;. &lt;/P&gt;
&lt;P&gt;If you find something where ISE is not compliant, please contact the Cisco TAC so they may file a bug.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Enable Identity Privacy&lt;/STRONG&gt; in the Windows supplicant appears to be a Windows-ism and even &lt;STRONG&gt;&lt;A href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd759219" target="_self"&gt;Microsoft's NPS documentation&lt;/A&gt;&lt;/STRONG&gt; states :&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;To configure your clients so that they &lt;EM&gt;will not send their identity in plaintext &lt;STRONG&gt;before the client has authenticated the RADIUS server&lt;/STRONG&gt;&lt;/EM&gt;, select Enable Identity Privacy , and then in Anonymous Identity , type a name or value, or leave the field empty.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2022 17:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4593639#M574179</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-04-15T17:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.1 patch-1 and Radius PEAP GTC or PEAP MSCHAPv2</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4595513#M574239</link>
      <description>&lt;P&gt;The point I am trying to make here is that anytime you have "username" in "cleartext" over the wire, that is a very BAD idea.&amp;nbsp; That's what happen even you implement PEAP-GTC or PEAP-msCHAP-2.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 15:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4595513#M574239</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2022-04-19T15:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 3.1 patch-1 and Radius PEAP GTC or PEAP MSCHAPv2</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4595736#M574249</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Perhaps submit an enhancement request to Cisco to allow an option to preserve the original User-Name attribute in the final Access-Accept. I think in Freeradius you can do all these nice things (and perhaps in other commercial RADIUS products). ISE is not that flexible in this respect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for a security hazard? Yes of course in theory this could be an issue. But if you have a situation where a bad actor is already siphoning your RADIUS traffic and capturing usernames, then I think you're already in bad shape. Obscuring the username is most likely just a small hinderance to that bad actor. Strong passwords and MFA is potentially a better angle to look at this, since we can't always hide our identities since the reality is that a lot of companies use &lt;A href="mailto:first.last@company.com" target="_blank"&gt;first.last@company.com&lt;/A&gt;&amp;nbsp;as credentials - therefore we can already guess a username without needing to sniff the wire.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Apr 2022 20:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-3-1-patch-1-and-radius-peap-gtc-or-peap-mschapv2/m-p/4595736#M574249</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-19T20:46:43Z</dc:date>
    </item>
  </channel>
</rss>

