<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE 3.1 (patch3) speaks with Active directory using ntlmv1 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4667092#M576620</link>
    <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I am getting logs on DC that there is NTLMv1 communication from ISE server:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can see this communication happening when Windows computer authenticates to ISE from WiFi network using PEAP (EAP-MSCHAPv2) with computer authentication. Looks like &lt;/SPAN&gt;&lt;SPAN&gt;ISE takes MSCHAPv2 information and sends it to domain controller as NTLMv1 request, and I want it to be NTLMv2 due to the company security policy.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;part of log: Protocol: Ntlm, IsNtlmV1: True, NtlmV1Count: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Apart from settings in Passive ID section to use ntlmv1 or ntlmv2 (ntlmv2 is checked, but we are NOT using passive ID), I cannot find anywhere to specify/force Cisco ISE to use ntlmv2 and not ntlmv1 when it speaks with DC to authenticate users coming from 802.1x networks.&lt;/P&gt;&lt;P&gt;Is there a way to force the use of ntlmv2 towards DCs, for EAP authentications (&lt;SPAN&gt;PEAP EAP-MSCHAPv2&lt;/SPAN&gt; in my case) coming from users?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks a lot in advance!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Aug 2022 08:44:11 GMT</pubDate>
    <dc:creator>milos_p</dc:creator>
    <dc:date>2022-08-10T08:44:11Z</dc:date>
    <item>
      <title>Cisco ISE 3.1 (patch3) speaks with Active directory using ntlmv1</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4667092#M576620</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I am getting logs on DC that there is NTLMv1 communication from ISE server:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can see this communication happening when Windows computer authenticates to ISE from WiFi network using PEAP (EAP-MSCHAPv2) with computer authentication. Looks like &lt;/SPAN&gt;&lt;SPAN&gt;ISE takes MSCHAPv2 information and sends it to domain controller as NTLMv1 request, and I want it to be NTLMv2 due to the company security policy.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;part of log: Protocol: Ntlm, IsNtlmV1: True, NtlmV1Count: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Apart from settings in Passive ID section to use ntlmv1 or ntlmv2 (ntlmv2 is checked, but we are NOT using passive ID), I cannot find anywhere to specify/force Cisco ISE to use ntlmv2 and not ntlmv1 when it speaks with DC to authenticate users coming from 802.1x networks.&lt;/P&gt;&lt;P&gt;Is there a way to force the use of ntlmv2 towards DCs, for EAP authentications (&lt;SPAN&gt;PEAP EAP-MSCHAPv2&lt;/SPAN&gt; in my case) coming from users?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks a lot in advance!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 08:44:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4667092#M576620</guid>
      <dc:creator>milos_p</dc:creator>
      <dc:date>2022-08-10T08:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.1 (patch3) speaks with Active directory using ntlmv1</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4667474#M576625</link>
      <description>&lt;P&gt;MSCHAPv2 is NTLMv1 based. I'm not aware of a way to 'force' the protocol to use NTLMv2 when used with EAP, hence the known issues caused by &lt;A href="https://docs.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-considerations" target="_blank" rel="noopener"&gt;MS Defender Credential Guard&lt;/A&gt;. Microsoft's recommendation is to use EAP-TLS instead.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2022 22:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4667474#M576625</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-08-10T22:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.1 (patch3) speaks with Active directory using ntlmv1</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4667649#M576626</link>
      <description>&lt;P&gt;Hi Greg,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for clarification, I assumed something like that is happening.&lt;/P&gt;&lt;P&gt;On the other side, although like you said MSCHAPv2 is by default NTLMv1 based, Microsoft enabled possibility in their RADIUS server (NPS) to use strictly NTLMv2 when NPS speaks with DC:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-US/troubleshoot/windows-server/networking/rras-vpn-connections-fail-ms-chapv2-authentication" target="_blank"&gt;https://docs.microsoft.com/en-US/troubleshoot/windows-server/networking/rras-vpn-connections-fail-ms-chapv2-authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there some possibility like this in ISE, using Active Directory advanced tuning configuration?&lt;/P&gt;&lt;P&gt;Case is, this is big thing from Security Department perspective, as NTLMv1 raise some red flags.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 11 Aug 2022 07:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4667649#M576626</guid>
      <dc:creator>milos_p</dc:creator>
      <dc:date>2022-08-11T07:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.1 (patch3) speaks with Active directory using ntlmv1</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4668039#M576639</link>
      <description>&lt;P&gt;The VPN use case is completely different than the EAP use case, hence, the specific phrasing I used when I said "I'm not aware of a way to 'force' the protocol to use NTLMv2 &lt;STRONG&gt;when used with EAP&lt;/STRONG&gt;".&lt;/P&gt;
&lt;P&gt;This is a limitation of the protocol and the client supplicant, which is not something any configuration in ISE can change.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Aug 2022 22:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4668039#M576639</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-08-11T22:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE 3.1 (patch3) speaks with Active directory using ntlmv1</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4668302#M576647</link>
      <description>&lt;P&gt;Hi Greg,&lt;/P&gt;&lt;P&gt;I really was hoping there is some hidden/advanced parameter that can force ISE to use NTLMv2 for this case.&lt;/P&gt;&lt;P&gt;Thanks again for great explanation and discussion!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Fri, 12 Aug 2022 07:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-3-1-patch3-speaks-with-active-directory-using-ntlmv1/m-p/4668302#M576647</guid>
      <dc:creator>milos_p</dc:creator>
      <dc:date>2022-08-12T07:26:29Z</dc:date>
    </item>
  </channel>
</rss>

