<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE-LDAP Authentication issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-ldap-authentication-issue/m-p/4630634#M575423</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Not sure what do you mean by not supported.? MSCHAPv2 will be the inner&lt;BR /&gt;authentication method between NAD (e.g. your switch) and ISE server&lt;BR /&gt;when using PEAP. LDAP can still be used between ISE server and AD. The&lt;BR /&gt;overall result shows that MSCHAPv2 can still be used while ISE uses LDAP&lt;BR /&gt;with AD.&lt;BR /&gt;&lt;BR /&gt;Go through this doc for between understanding on how things work.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
    <pubDate>Mon, 13 Jun 2022 08:30:19 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2022-06-13T08:30:19Z</dc:date>
    <item>
      <title>ISE-LDAP Authentication issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ldap-authentication-issue/m-p/4630582#M575421</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our team have been using&lt;STRONG&gt; LDAP&lt;/STRONG&gt; and &lt;STRONG&gt;RADIUS&lt;/STRONG&gt; using&amp;nbsp; &lt;STRONG&gt;MSCHAPv2&lt;/STRONG&gt; protocol&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;They are evaluating &lt;STRONG&gt;ISE&lt;/STRONG&gt; but, using ISE with LDAP is not getting dot1x authentication&lt;/LI&gt;
&lt;LI&gt;ISE is getting logs for the switch 2960-x and tested the MAB authentication&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN class=" jss1129 jss1130"&gt;&lt;SPAN class="jss1131 jss1132"&gt;What&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jss1131 jss1133"&gt;is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jss1131 jss1134"&gt;the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1135"&gt;&lt;SPAN class="jss1131 jss1136"&gt;reason&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1137"&gt;&lt;SPAN class="jss1131 jss1138"&gt;that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jss1131 jss1139"&gt;when&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jss1131 jss1140"&gt;the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1141"&gt;&lt;SPAN class="jss1131 jss1142"&gt;dot1x&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1143"&gt;&lt;SPAN class="jss1131 jss1144"&gt;is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1145"&gt;&lt;SPAN class="jss1131 jss1146"&gt;enabled,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1147"&gt;&lt;SPAN class="jss1131 jss1148"&gt;ISE&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1149"&gt;&lt;SPAN class="jss1131 jss1150"&gt;does&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="jss1131 jss1151"&gt;not&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1152"&gt;&lt;SPAN class="jss1131 jss1153"&gt;receive&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1154"&gt;&lt;SPAN class="jss1131 jss1155"&gt;the &lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=" jss1129 jss1156"&gt;&lt;SPAN class="jss1131 jss1157"&gt;logs for the same ?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;How do I enable &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit;"&gt;801.1x&lt;/STRONG&gt;&lt;SPAN&gt; authentication in endpoints that are connected to an LDAP server ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 09:09:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ldap-authentication-issue/m-p/4630582#M575421</guid>
      <dc:creator>rahul.k1</dc:creator>
      <dc:date>2022-06-13T09:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-LDAP Authentication issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ldap-authentication-issue/m-p/4630634#M575423</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Not sure what do you mean by not supported.? MSCHAPv2 will be the inner&lt;BR /&gt;authentication method between NAD (e.g. your switch) and ISE server&lt;BR /&gt;when using PEAP. LDAP can still be used between ISE server and AD. The&lt;BR /&gt;overall result shows that MSCHAPv2 can still be used while ISE uses LDAP&lt;BR /&gt;with AD.&lt;BR /&gt;&lt;BR /&gt;Go through this doc for between understanding on how things work.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/TrustSec_1-99/Dot1X_Deployment/Dot1x_Dep_Guide.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Jun 2022 08:30:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ldap-authentication-issue/m-p/4630634#M575423</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2022-06-13T08:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE-LDAP Authentication issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-ldap-authentication-issue/m-p/4631230#M575455</link>
      <description>&lt;P&gt;Identity Stores using direct LDAP connection do not support PEAP-MSCHAPv2 due to the way the passwords are stored/secured. See the '&lt;SPAN class="tabletitle"&gt;Authentication Protocols and Supported External Identity Sources&lt;/SPAN&gt;' table in the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_asset_visibility.html?bookSearch=true#concept_BD3A270FEC0C411DA10FB808C14B48D5" target="_blank" rel="noopener"&gt;ISE Admin Guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;If you need to use PEAP-MSCHAPv2, you would need to &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/ise_active_directory_integration/b_ISE_AD_integration_2x.html" target="_blank" rel="noopener"&gt;integrate ISE with Active Directory as per this guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;If you need to use LDAP instead of AD Integration, you would need to use an authentication protocol supported by LDAP, like EAP-TLS.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 04:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-ldap-authentication-issue/m-p/4631230#M575455</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-06-14T04:47:31Z</dc:date>
    </item>
  </channel>
</rss>

