<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Implementing wired access control by certificate based authenticat in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587288#M573910</link>
    <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your detailed answer!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--What types of clients are in the environment? For Windows based, will you use native supplicant or NAM?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It will be for Windows clients only for now and I will use native supplicant for that&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--If using Native, best bet is to rely on GPOs to push settings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This sound good, as we are using an Active Directory as the external identity source&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--For certificate based authentication, are you talking about onboarding only computers via certs or do you want to perform user ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Exactly, i only want to onboard computers via certs and if they don´t have a cert, then just give them guest access in form of a specific VLAN (Internet access only)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--How will clients enroll for identity certs? Does your enterprise have an internal PKI? If so, ADCS and GPOs for auto-enrollment will help make things simpler VLAN (Internet only)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We don´t have an internal PKI yet, i thought that the we could roll out the machine certificates from the CISCO ISE server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--Are there clients in the environment that will require mab?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;There will be no clients which will need mab. Only Computers such as Notebooks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;</description>
    <pubDate>Wed, 06 Apr 2022 13:22:40 GMT</pubDate>
    <dc:creator>CasualUser01</dc:creator>
    <dc:date>2022-04-06T13:22:40Z</dc:date>
    <item>
      <title>Implementing wired access control by certificate based authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587061#M573904</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in our company i would like to implement ciscoISE for the wired access control with certificate based authentication. My goal in the end is, that all clients who don't have the certificate of our CiscoISE Server only get a default VLAN with internet access only. For all the clients who have the certificate are granted with normal employee VLAN. A Catalyst Switch will be used as the authenticator in this example. I already read the "&lt;SPAN&gt;Cisco ISE Secure Wired Access Prescriptive Deployment Guide" but got a bit confused because i don't actually know what steps i need to follow in the guide and what steps would be unnecessary, for reaching my end goal. Any help would be appreciated.&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;CasualUser01&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 09:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587061#M573904</guid>
      <dc:creator>CasualUser01</dc:creator>
      <dc:date>2022-04-06T09:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587259#M573907</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I already read the "&lt;/SPAN&gt;&lt;SPAN&gt;Cisco ISE Secure Wired Access Prescriptive Deployment Guide" but got a bit confused because i don't actually know what steps i need to follow in the guide and what steps would be unnecessary&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-That guide will definitely assist with your journey and will hit on each component in the workflow.&amp;nbsp; Here are some (not all) items of consideration for design/deployment:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--What types of clients are in the environment? For Windows based, will you use native supplicant or NAM?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--If using NAM, how will you deploy the AC modules to support this + respective profiles?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--If using Native, best bet is to rely on GPOs to push settings&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--For certificate based authentication, are you talking about onboarding only computers via certs or do you want to perform user + computer cert auth; if both, you will need to research and look into eap-chaining;&amp;nbsp; eap-chaining can be accomplished with EAP-FAST (NAM supplicant) OR with later versions of ISE + Windows EAP-TEAP (native supp)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--How will clients enroll for identity certs? Does your enterprise have an internal PKI? If so, ADCS and GPOs for auto-enrollment will help make things simpler&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--What type of external identity source will be in use? AD?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--Are there clients in the environment that will require mab? Example, printers with no supp, etc. You will need ISE local endpoint groups to help here&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; I would recommend reviewing it again, reaching out to your Cisco reps for help, and checking online for tutorials (youtube/labminutes).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here are additional docs that may help:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-amp-nac-resources/ta-p/3621621#Start" target="_blank"&gt;Cisco ISE &amp;amp; NAC Resources - Cisco Community&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 13:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587259#M573907</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-04-06T13:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587263#M573908</link>
      <description>&lt;P&gt;First step is perform an assessment&amp;nbsp; on your network. Not all switches works with 802.1x. Also, you need to install clients certificates and this is not an easy task sometimes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 13:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587263#M573908</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-06T13:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587288#M573910</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your detailed answer!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--What types of clients are in the environment? For Windows based, will you use native supplicant or NAM?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It will be for Windows clients only for now and I will use native supplicant for that&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--If using Native, best bet is to rely on GPOs to push settings&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This sound good, as we are using an Active Directory as the external identity source&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--For certificate based authentication, are you talking about onboarding only computers via certs or do you want to perform user ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Exactly, i only want to onboard computers via certs and if they don´t have a cert, then just give them guest access in form of a specific VLAN (Internet access only)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--How will clients enroll for identity certs? Does your enterprise have an internal PKI? If so, ADCS and GPOs for auto-enrollment will help make things simpler VLAN (Internet only)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We don´t have an internal PKI yet, i thought that the we could roll out the machine certificates from the CISCO ISE server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;--Are there clients in the environment that will require mab?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;There will be no clients which will need mab. Only Computers such as Notebooks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 13:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587288#M573910</guid>
      <dc:creator>CasualUser01</dc:creator>
      <dc:date>2022-04-06T13:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587293#M573911</link>
      <description>&lt;P&gt;yea we will use a switch that is capable of 802.1x but the hard part will be installing and rolling out the client certificates as you said. I currently don´t know how it´s done with using the cisco ise. Any suggestions on how to implement it?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 13:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587293#M573911</guid>
      <dc:creator>CasualUser01</dc:creator>
      <dc:date>2022-04-06T13:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587317#M573916</link>
      <description>&lt;P&gt;There are some option here. You can do this by running a GPO to push the certicate to the machines. This is the most usuall.&lt;/P&gt;&lt;P&gt;But this is usually EUC job.&amp;nbsp; You can refer to the link:&lt;/P&gt;&lt;P&gt;&lt;A title="https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/distribute-certificates-to-client-computers-by-using-group-policy" href="https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/distribute-certificates-to-client-computers-by-using-group-policy" target="_self"&gt;https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/distribute-certificates-to-client-computers-by-using-group-policy&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 13:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587317#M573916</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-06T13:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587318#M573917</link>
      <description>&lt;P&gt;Use your AD Domain Controller to push the certs to the computers via GPO.&amp;nbsp; Once that is configured and you log in to the machine, the GPO will download the cert (can force it using gpupdate /force on the PC).&amp;nbsp; Once you reboot, the cert can be used for authentication.&lt;/P&gt;
&lt;P&gt;You can find good resources here for ISE and Active Directory integration:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216120-ise-security-ecosystem-integration-guide.html#anc78" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216120-ise-security-ecosystem-integration-guide.html#anc78&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 13:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4587318#M573917</guid>
      <dc:creator>Charlie Moreton</dc:creator>
      <dc:date>2022-04-06T13:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4588351#M573943</link>
      <description>&lt;P&gt;See &lt;A href="https://cs.co/ise-guides#EAP" target="_self"&gt;&lt;STRONG&gt;https://cs.co/ise-guides#EAP &lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 14:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4588351#M573943</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-04-07T14:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4588632#M573955</link>
      <description>&lt;P&gt;Hi Charlie,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your reply. After some research i found out that our company already has a root CA Certificate inside our Active Directory and it also assigns signed certificates to the clients, after they join our domain. My question would be if i can import that trusted root CA certificate of the AD to the ise server. Then my idea would be to use the already assigned machine certificates for the authentication against the ISE server. Is this somehow possible to do? It would be pretty good because then i would not have to create new Certificates for the clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 21:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4588632#M573955</guid>
      <dc:creator>CasualUser01</dc:creator>
      <dc:date>2022-04-07T21:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing wired access control by certificate based authenticat</title>
      <link>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4588673#M573959</link>
      <description>&lt;P&gt;Yes.&amp;nbsp;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html" target="_self"&gt;Configure EAP-TLS Authentication with ISE&lt;/A&gt;&amp;nbsp;this is the doc to read and will show what needs to be done.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 23:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/implementing-wired-access-control-by-certificate-based/m-p/4588673#M573959</guid>
      <dc:creator>Charlie Moreton</dc:creator>
      <dc:date>2022-04-07T23:12:53Z</dc:date>
    </item>
  </channel>
</rss>

