<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x authentication with Cisco ISE/Windows 11 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729127#M578523</link>
    <description>&lt;P&gt;Hi Marvin,&lt;BR /&gt;At our end we using EAP-TLS. Again, we see these issues after Windows 11 only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Mon, 28 Nov 2022 13:54:47 GMT</pubDate>
    <dc:creator>network_geek1979</dc:creator>
    <dc:date>2022-11-28T13:54:47Z</dc:date>
    <item>
      <title>802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4728984#M578519</link>
      <description>&lt;P&gt;Team, we see issues with 802.1x authentication after Windows 11 upgrades.&lt;BR /&gt;&lt;BR /&gt;Few complaints coming in are when the machine is idle for some time the 802.1x authentication breaks and the end users&amp;nbsp; computer goes in the default Internet only access VLAN. This typically happens for end users who are using docking stations.&lt;BR /&gt;&lt;BR /&gt;Unless the end user does not unplug/plug the cable the 802.1x authentication does not succeed.&lt;BR /&gt;&lt;BR /&gt;We are not using any posture assessments, we have only the 802.1x authentications.&lt;BR /&gt;&lt;BR /&gt;I know that Windows 11 and 802.1x authentication have been a challenge but specifically any suggestion? Anyone has come across these issues?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards!!&lt;/P&gt;&lt;P&gt;N.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 09:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4728984#M578519</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2022-11-28T09:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729114#M578522</link>
      <description>&lt;P&gt;Are you using EAP-MSCHAPv2? There is a known issue whereby Windows 11 update 22H2 credential Guard feature disables the MSCHAPv2 protocol since it is considered insecure. You can re-enable it via registry key (most commonly set via GPO).&lt;/P&gt;
&lt;P&gt;The long term recommendation is to move to a secure inner method like EAP-TLS but that requires a PKI to issue certificates and takes a bit of planning and deployment testing.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 13:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729114#M578522</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-11-28T13:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729127#M578523</link>
      <description>&lt;P&gt;Hi Marvin,&lt;BR /&gt;At our end we using EAP-TLS. Again, we see these issues after Windows 11 only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 13:54:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729127#M578523</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2022-11-28T13:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729141#M578524</link>
      <description>&lt;P&gt;That's a new one by me then. It does sound like something changed in the supplicant behaviour though.&lt;/P&gt;
&lt;P&gt;What does the RADIUS live log indicate is happening?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 14:13:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729141#M578524</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-11-28T14:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729375#M578533</link>
      <description>&lt;P&gt;This sounds like another case of FlexAuth (order mab dot1x, priority dot1x mab) with legacy IBNS configuration on the switch. See this whitepaper for the expected behaviour and workaround using the 'terminate-action-modifier=1' Cisco AV pair (in the footer on page 3).&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/support/docs/ios-nx-os-software/identity-based-networking-service/flexible_authentication.pdf" target="_blank" rel="noopener"&gt;Flexible Authentication Order, Priority, and Failed Authentication&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This doc also shows an example of how to use this option:&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/top-ten-mis-configured-cisco-ios-switch-settings-for-ise/ta-p/3643912#toc-hId--1759816418" target="_blank" rel="noopener"&gt;Top Ten mis-configured Cisco IOS Switch settings for ISE integration &lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 21:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4729375#M578533</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-11-28T21:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4732558#M578642</link>
      <description>&lt;P&gt;The Radius live logs show that user sessions is toggling between Production VLAN and Guest VLAN.&lt;BR /&gt;We are not sure why this is going on.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2022 13:19:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4732558#M578642</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2022-12-05T13:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4732559#M578643</link>
      <description>&lt;P&gt;In our case we do the dot1x first, and then mab.&lt;/P&gt;&lt;P&gt;This is for both, order and priority.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2022 13:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4732559#M578643</guid>
      <dc:creator>network_geek1979</dc:creator>
      <dc:date>2022-12-05T13:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4734369#M578710</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/47004"&gt;@network_geek1979&lt;/a&gt;&amp;nbsp;If you still have some Windows 10 clients with similar docking stations and working fine, then Windows 11 is more likely the source of this networking problem. The following two articles might interest you, in case you have not read them yet:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://www.reddit.com/r/sysadmin/comments/xr7kaa/8021x_authentication_broken_after_windows_11/" target="_self"&gt;802.1x authentication broken after Windows 11 upgrade - reddit/r/sysadmin&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/troubleshoot/windows-client/networking/802-1x-authentication-issues-troubleshooting" target="_self"&gt;Advanced troubleshooting 802.1X authentication - Microsoft Learn Doc&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I have only tested a couple of Windows 11 VM with manual configured wired .1X and found it prompted for more user interactions for domain login.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 00:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/4734369#M578710</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2022-12-08T00:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x authentication with Cisco ISE/Windows 11</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/5217401#M592833</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/47004"&gt;@network_geek1979&lt;/a&gt;&amp;nbsp;, Did you manage to fix this issue? I am having exactly the same problem. Authentication is working but Authorization policy is hitting default which puts the user to Quarantine. It only happens after upgrading to windows 11 and also using a docking station. Would like to know which solution fixed your issue?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 13:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-authentication-with-cisco-ise-windows-11/m-p/5217401#M592833</guid>
      <dc:creator>NETSEC11</dc:creator>
      <dc:date>2024-10-30T13:23:25Z</dc:date>
    </item>
  </channel>
</rss>

