<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: “5411  Supplicant stopped responding to ISE&amp;quot;. Use EAP-TLS for in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4680710#M577101</link>
    <description>&lt;P&gt;Is it possible that if the clinet MAC address deleted from WLC and user faces this issue "5411 Supplication issue"? or because of DHCP leases overlapping ?&lt;/P&gt;</description>
    <pubDate>Sat, 03 Sep 2022 09:40:23 GMT</pubDate>
    <dc:creator>sumanrai1980</dc:creator>
    <dc:date>2022-09-03T09:40:23Z</dc:date>
    <item>
      <title>“5411  Supplicant stopped responding to ISE". Use EAP-TLS for authentication method and the root CA is window CA</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4084578#M560340</link>
      <description>&lt;P&gt;The background is the end devices PC would like to use EAP-TLS for authentication method and the root CA is window CA.&lt;/P&gt;&lt;P&gt;However the ISE live log show “5411 &amp;nbsp;Supplicant stopped responding to ISE”.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below as the ISE live log.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/74427iBF63D36B9009B710/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise1.png" alt="ise1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/74426i1528CB53BBAE30F5/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise2.png" alt="ise2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise3.png" style="width: 871px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/74425i44D992E4E1A77D1D/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise3.png" alt="ise3.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch config:&lt;/P&gt;&lt;P&gt;aaa group server radius gp-ISE&lt;BR /&gt;server name ISE&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ group-ts-ISE&lt;BR /&gt;server name ts-ISE&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group group-ts-ISE local&lt;BR /&gt;aaa authentication enable default group group-ts-ISE enable&lt;BR /&gt;aaa authentication dot1x default group gp-ISE&lt;BR /&gt;aaa authorization exec default group group-ts-ISE local&lt;BR /&gt;aaa authorization commands 0 default group group-ts-ISE local&lt;BR /&gt;aaa authorization commands 1 default group group-ts-ISE local&lt;BR /&gt;aaa authorization network default group gp-ISE&lt;BR /&gt;aaa accounting auth-proxy default start-stop group gp-ISE&lt;BR /&gt;aaa accounting dot1x default start-stop group gp-ISE&lt;BR /&gt;aaa accounting exec default start-stop group group-ts-ISE&lt;BR /&gt;aaa accounting commands 0 default stop-only group group-ts-ISE&lt;BR /&gt;aaa accounting commands 1 default stop-only group group-ts-ISE&lt;BR /&gt;aaa accounting commands 15 default start-stop group group-ts-ISE&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 192.168.100.240 server-key 7 xxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;server-key 7 xxxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;dot1x critical eapol&lt;BR /&gt;errdisable recovery cause bpduguard&lt;BR /&gt;errdisable recovery cause loopback&lt;BR /&gt;errdisable recovery interval 180&lt;BR /&gt;license boot level ipservicesk9&lt;BR /&gt;diagnostic bootup level minimal&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;switchport access vlan 100&lt;BR /&gt;switchport mode access&lt;BR /&gt;ip arp inspection limit rate 100&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x&lt;BR /&gt;authentication priority dot1x&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ip radius source-interface Vlan100&lt;BR /&gt;ip sla enable reaction-alerts&lt;BR /&gt;logging history size 50&lt;BR /&gt;logging history debugging&lt;BR /&gt;logging origin-id ip&lt;BR /&gt;logging facility local2&lt;BR /&gt;logging source-interface Vlan100&lt;BR /&gt;logging host 192.168.100.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;!&lt;BR /&gt;radius server ISE&lt;BR /&gt;address ipv4 192.168.100.240 auth-port 1645 acct-port 1646&lt;BR /&gt;key 7 xxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;Any hits for this issues?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 06:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4084578#M560340</guid>
      <dc:creator>TerryLaw86466</dc:creator>
      <dc:date>2020-05-18T06:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for authentication method and the root CA is window CA</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4084599#M560342</link>
      <description>&lt;P&gt;See a similar community post &lt;A href="https://community.cisco.com/t5/network-access-control/nac-endpoint-stopped-responding-to-ise/td-p/2890408" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This is typically an issue with the client supplicant and/or certificate trust chain.&lt;/P&gt;
&lt;P&gt;I've also seen this issue caused by fragmentation due to an MTU mismatch somewhere between the switch and PSN. If your switch MTU is set to jumbo, try setting it to 1500 and testing again. See the document &lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/118634-technote-eap-00.html" target="_self"&gt;EAP Fragmentation Implementations and Behavior&lt;/A&gt; for more info.&lt;/P&gt;
&lt;P&gt;You might also want to do a packet capture on the client to see the full EAP conversation and open a TAC case if all else fails.&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 03:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4084599#M560342</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-05-13T03:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for authentication method and the root CA is window CA</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4084603#M560343</link>
      <description>&lt;P&gt;Basic checks&lt;/P&gt;
&lt;P&gt;It appears that your supplicant is performing Machine Authentication - is it configured for &lt;STRONG&gt;certificate authentication (or user authentication)&lt;/STRONG&gt;, and does your machine have a machine certificate?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if the above is all good (i.e. you r supplicant is configured for Machine Auth and you have a machine cert) then:&lt;/P&gt;
&lt;P&gt;In your ISE Wired 802.1X Policy Set Overall Condition, did you include "Allow Protocols EAP-TLS"?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your Windows Clients are using TLS 1.0 or TLS 1.1, did you allow this under Admin &amp;gt; System &amp;gt; Settings Security Settings?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 03:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4084603#M560343</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-05-13T03:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for authentication method and the root CA is window CA</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4087626#M560475</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"Allow Protocols EAP-TLS" already enabled in&amp;nbsp;&amp;nbsp;Policy Set in ISE.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And the client cert. and root cert. already imported to client PC.&lt;/P&gt;&lt;P&gt;"certificate authentication (or user authentication)"already configure&amp;nbsp;at network adapter of client PC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Added partial config. of the switch relayed to authenticate configuration. is it possible it caused by switch configuration issues?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch config:&lt;/P&gt;&lt;P&gt;aaa group server radius gp-ISE&lt;BR /&gt;server name ISE&lt;BR /&gt;!&lt;BR /&gt;aaa group server tacacs+ group-ts-ISE&lt;BR /&gt;server name ts-ISE&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group group-ts-ISE local&lt;BR /&gt;aaa authentication enable default group group-ts-ISE enable&lt;BR /&gt;aaa authentication dot1x default group gp-ISE&lt;BR /&gt;aaa authorization exec default group group-ts-ISE local&lt;BR /&gt;aaa authorization commands 0 default group group-ts-ISE local&lt;BR /&gt;aaa authorization commands 1 default group group-ts-ISE local&lt;BR /&gt;aaa authorization network default group gp-ISE&lt;BR /&gt;aaa accounting auth-proxy default start-stop group gp-ISE&lt;BR /&gt;aaa accounting dot1x default start-stop group gp-ISE&lt;BR /&gt;aaa accounting exec default start-stop group group-ts-ISE&lt;BR /&gt;aaa accounting commands 0 default stop-only group group-ts-ISE&lt;BR /&gt;aaa accounting commands 1 default stop-only group group-ts-ISE&lt;BR /&gt;aaa accounting commands 15 default start-stop group group-ts-ISE&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa server radius dynamic-author&lt;BR /&gt;client 192.168.100.240 server-key 7 xxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;server-key 7 xxxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;dot1x system-auth-control&lt;BR /&gt;dot1x critical eapol&lt;BR /&gt;errdisable recovery cause bpduguard&lt;BR /&gt;errdisable recovery cause loopback&lt;BR /&gt;errdisable recovery interval 180&lt;BR /&gt;license boot level ipservicesk9&lt;BR /&gt;diagnostic bootup level minimal&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;switchport access vlan 100&lt;BR /&gt;switchport mode access&lt;BR /&gt;ip arp inspection limit rate 100&lt;BR /&gt;authentication event fail action next-method&lt;BR /&gt;authentication open&lt;BR /&gt;authentication order dot1x&lt;BR /&gt;authentication priority dot1x&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ip radius source-interface Vlan100&lt;BR /&gt;ip sla enable reaction-alerts&lt;BR /&gt;logging history size 50&lt;BR /&gt;logging history debugging&lt;BR /&gt;logging origin-id ip&lt;BR /&gt;logging facility local2&lt;BR /&gt;logging source-interface Vlan100&lt;BR /&gt;logging host 192.168.100.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;radius-server attribute 6 on-for-login-auth&lt;BR /&gt;radius-server attribute 8 include-in-access-req&lt;BR /&gt;radius-server attribute 25 access-request include&lt;BR /&gt;!&lt;BR /&gt;radius server ISE&lt;BR /&gt;address ipv4 192.168.100.240 auth-port 1645 acct-port 1646&lt;BR /&gt;key 7 xxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 06:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4087626#M560475</guid>
      <dc:creator>TerryLaw86466</dc:creator>
      <dc:date>2020-05-18T06:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for authentication method and the root CA is window CA</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4096575#M560855</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally, it is working fine with the cert. signed by window Standalone CA, but it is not working for&amp;nbsp;windows enterprise ca.&lt;/P&gt;&lt;P&gt;Any requirement or specific setting needed in ISE to compatible to windows enterprise ca.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jun 2020 01:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4096575#M560855</guid>
      <dc:creator>TerryLaw86466</dc:creator>
      <dc:date>2020-06-03T01:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for authentication method and the root CA is window CA</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4305197#M566026</link>
      <description>&lt;P&gt;ISE teammates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok, so after months of working on this issue with "Supplicant Stopped Responding..." errors, I've determined that by updating the Wired AutoConfig GPO we use to include these settings, we got the endpoints connected and authorized as expected.&amp;nbsp; Out of the box Windows 10 tries once to connect to a Cisco switch via PEAP before giving up and waiting 20 minutes.&amp;nbsp; Here's the GPO settings we're using.&amp;nbsp; We opted for public CA certs because I was tired of fooling around with our internal CA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps someone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GPO_Fix_ISE_802.1x.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/106084i8714A89E719B991F/image-size/large?v=v2&amp;amp;px=999" role="button" title="GPO_Fix_ISE_802.1x.png" alt="GPO_Fix_ISE_802.1x.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Mar 2021 20:14:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4305197#M566026</guid>
      <dc:creator>pnowikow</dc:creator>
      <dc:date>2021-03-10T20:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for authentication method and the root CA is window CA</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4387920#M566766</link>
      <description>&lt;P&gt;It indeed helped me. Thank you for sharing. Appreciate it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Omid&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 05:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4387920#M566766</guid>
      <dc:creator>Omid Almasieh</dc:creator>
      <dc:date>2021-04-16T05:11:14Z</dc:date>
    </item>
    <item>
      <title>Re: “5411 Supplicant stopped responding to ISE". Use EAP-TLS for authentication method and the root CA is window CA</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4388389#M566771</link>
      <description>I'm glad it worked out for you. I spent a long time beating my head&lt;BR /&gt;against the wall &lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Apr 2021 13:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4388389#M566771</guid>
      <dc:creator>pnowikow</dc:creator>
      <dc:date>2021-04-16T13:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4680710#M577101</link>
      <description>&lt;P&gt;Is it possible that if the clinet MAC address deleted from WLC and user faces this issue "5411 Supplication issue"? or because of DHCP leases overlapping ?&lt;/P&gt;</description>
      <pubDate>Sat, 03 Sep 2022 09:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/4680710#M577101</guid>
      <dc:creator>sumanrai1980</dc:creator>
      <dc:date>2022-09-03T09:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/5235727#M593727</link>
      <description>&lt;P&gt;Our Cisco 3850 switch was on 16.09.06. After months of fight to configure EAP-TLS, I upgraded the switch to 16.12.12 today. EAP-TLS just worked without a peep of a complaint. It was highly frustrating journey totally unnecessary and a company like Cisco which produce ISE, Switch, WLC should produce complete validated design and remove all wasted time from these monstrosity. For what it does, ISE infrastructure is too complicated. Well 802.1x Ecosystem and its various actors..&amp;nbsp; Most organizations just want their own device to connect and there are far easier way to accomplish than pile of mess I had to dig through. Validated Design, Validated configuration which should include all Version numbers in involved should be doable in 30 page doc. If not these don't deserve to exist. Now it is done it is a cinch but journey was too costly. I enjoy reading but I can count some 3000 pages to get here and that was ones I skim through and I have not touched others on the subject..&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This article was written in 2020 when 16.09.06 is published. I am here from future 16.12.12 a 2024 release will likely fix your issue. My&amp;nbsp;&lt;SPAN&gt;5411 no longer appears in the log.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 00:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/5235727#M593727</guid>
      <dc:creator>jonkimsr</dc:creator>
      <dc:date>2024-12-12T00:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/5235736#M593728</link>
      <description>&lt;P&gt;I share your sentiment on suffering simple/stupid bugs for a technology that has been around for a very long time. But you mentioned that there are "far easier way(s) to accomplish ..." - what do you propose as the alternative?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 00:38:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/5235736#M593728</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-12-12T00:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: “5411  Supplicant stopped responding to ISE". Use EAP-TLS for</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/5235740#M593729</link>
      <description>&lt;P&gt;Simplified Canned Deployment.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;what would you like to do today?&amp;nbsp;&lt;BR /&gt;I would like a peap on vlan 10 using v10_user/password. Please authorize anyone with that credential and assign them vlan10.&amp;nbsp;&lt;BR /&gt;What more would you like to today?&amp;nbsp;&lt;BR /&gt;I would like a eap-tls with this CA Key and anyone presenting any Key issued from that CA let them connect.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;My organization will likely use 20 some peaps and 1 Cert(Maybe 2-3 more if I end up doing BYOD type).&lt;BR /&gt;&lt;BR /&gt;Hi, there is a device with 12:34:56:78:90:12 trying to connect what would you like to do? You can authorize, or put them in vLAN bucket or reject.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2024 00:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/m-p/5235740#M593729</guid>
      <dc:creator>jonkimsr</dc:creator>
      <dc:date>2024-12-12T00:48:23Z</dc:date>
    </item>
  </channel>
</rss>

