<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question EAP-TLS security in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4779699#M579971</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well, you are correct; nonetheless, I want to talk to you about mobile authentication using TLS.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If TEAP is used for authentication and this authorization&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;If EAP-TLS authentication is used for corp mobile&amp;nbsp; this authorization.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure how to build up a condition because my client's does not want to have a MDM. Do you understand me?&lt;BR /&gt;Any suggestions when traffic is coming from mobile corporations? ( certificate )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Feb 2023 15:17:31 GMT</pubDate>
    <dc:creator>athan1234</dc:creator>
    <dc:date>2023-02-21T15:17:31Z</dc:date>
    <item>
      <title>Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4773865#M579787</link>
      <description>&lt;P&gt;Dear all:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have a few inquiries.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;My ISE EAP -TLS user certificate is configured.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;What will happen if a person copies this user certificate and pastes it into an another PC, enabling him to connect to the network?&lt;/P&gt;&lt;P&gt;How is the flow certificate between AD , iSE and&amp;nbsp; USER&lt;/P&gt;&lt;P&gt;Is it feasible to increase security and add extra user and password?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Feb 2023 08:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4773865#M579787</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-13T08:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4773871#M579789</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/159821"&gt;@athan1234&lt;/a&gt; it depends, do the users have permissions to export their user certificate?&lt;/P&gt;
&lt;P&gt;You could use EAP chaining using TEAP, which combines machine and user authentication. This could be certificates or username/password. Certificates are considered more secure.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Feb 2023 08:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4773871#M579789</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-13T08:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4774951#M579809</link>
      <description>&lt;P&gt;hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; so thanks for your reply&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;some questionsover TEAP&lt;BR /&gt;What is the advantage in my situationusing use TEAP?&lt;BR /&gt;I've read that using TEAP, you can authenticate both the computer and the user at the same time, but I'm not sure what the benefit of doing it&lt;/P&gt;&lt;P&gt;Could you provide me with a short example?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regarding machine and user certificates&lt;/P&gt;&lt;P&gt;My cliencertificate is merely a user certificate.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I want to understand when you use user certificate it does not involve AD. It only checks with AD for the athorization it is right? CN has to be the same as AD username otherwise ISE will not be able to look up the user against AD to fetch the user group info.&lt;BR /&gt;Only the CN name will show up on the report so that's all you have to query against.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In order to strengthen security, it is necessary to add the user's policy authorizacuin on ISE with AD to the authorization policy.&lt;BR /&gt;otherwise it is not required?&lt;/P&gt;&lt;P&gt;I'm uncertain about the machine certificate.&lt;BR /&gt;I wish to comprehend when you have a machine certificate, but it's unclear to me.&lt;BR /&gt;What is the advent6age for if it only controls the machines that belong to the dominion and has a machine certificate?&lt;BR /&gt;how is the process when using a certificate on a machine?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;What is the propuse for the ISE authorization policy assuming the True machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 08:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4774951#M579809</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-14T08:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4774961#M579812</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/159821"&gt;@athan1234&lt;/a&gt; the benefit of using EAP Chaining (TEAP) is if the user is authenticated using TEAP on a computer that was authenticated using TEAP, ISE would know that the user is connecting from an authenticated machine. It's considered more secure.&lt;/P&gt;
&lt;P&gt;When you use certificates for authentication, you can optionally lookup to AD for authorisation and check group membership and apply to authorisation rules.&lt;/P&gt;
&lt;P&gt;You'd want to use machine authentication so device has network access, to process computer group policies, allow AV, Windows updates etc without a user logged into the device.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 08:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4774961#M579812</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-14T08:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4777699#M579896</link>
      <description>&lt;P&gt;hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have one more query.sorry&lt;/P&gt;&lt;P&gt;My idea was for incrise the security to do an authorritazion condicion the user has to belong AD especific group&lt;BR /&gt;If the user is an AD member, pass I can´t to do it and i have a dilema&amp;nbsp; because my customer will also have mobiles corporate with a certificate.&lt;BR /&gt;and ask me how to make this SSID as secure as possible while the user is connecting via a mobile device.&lt;BR /&gt;Is there a any policy authoritation condition for do it more secure?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 21:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4777699#M579896</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-17T21:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4777701#M579897</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/159821"&gt;@athan1234&lt;/a&gt;&amp;nbsp;Using TEAP (EAP Chaining) is the most secure authentication method. If using TEAP with machine and user certificates, ISE can do a lookup to AD against the username in the certificate to determine AD group membership for authorisation.&lt;/P&gt;
&lt;P&gt;For the mobile devices I doubt they can do TEAP, so you would need to use EAP-TLS with a device certificate, which can be deployed via an MDM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 21:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4777701#M579897</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-17T21:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4778676#M579934</link>
      <description>&lt;P&gt;Hello, Rob Ingram&lt;BR /&gt;Once more, many thanks.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So, the following scenario for my client is possible:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Assume that my clients accept wireless TEAP for PC connections and EAP-TLS for mobile corporations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It will be feasible to develop two distinct authentication and authentication mechanisms&lt;/P&gt;&lt;P&gt;If TEAP is used for authentication and&amp;nbsp; this authorization&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If EAP-TLS authentication is used and , this authentication&lt;/P&gt;&lt;P&gt;Do you believe it to work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 16:57:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4778676#M579934</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-20T16:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4778678#M579935</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/159821"&gt;@athan1234&lt;/a&gt; yes, define the EAP-TLS in the authorisation rule, only the client configured to use EAP-TLS will match that rule. The client devices configured to use TEAP will not match that rule. That's were you'd configure the EAP Chaining.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 17:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4778678#M579935</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-20T17:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4779699#M579971</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well, you are correct; nonetheless, I want to talk to you about mobile authentication using TLS.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If TEAP is used for authentication and this authorization&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;If EAP-TLS authentication is used for corp mobile&amp;nbsp; this authorization.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure how to build up a condition because my client's does not want to have a MDM. Do you understand me?&lt;BR /&gt;Any suggestions when traffic is coming from mobile corporations? ( certificate )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 15:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4779699#M579971</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-21T15:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4779712#M579973</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/159821"&gt;@athan1234&lt;/a&gt; if Corporate devices use TEAP and mobile devices use EAP-TLS, you just need to distinguish between using at least the authentication method.&lt;/P&gt;
&lt;P&gt;Use the condition EAP-TLS in an authorisation rule, then you know only the mobile devices will match that rule. You can also add a condition to match on the certificate issuer, such as your internal CA only. How you'll get a certificate on the mobile devices without an MDM is another problem.&lt;/P&gt;
&lt;P&gt;For the corporate devices you can use "Network Access·EapChainingResult Equals User succeeded and machine succeeded" so you know TEAP was the authentication protocol used, the mobile devices will not match these rules. You can do an AD group lookup for the TEAP devices, for group membership of the users and add that as a condition in one of the rules as well.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 15:27:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4779712#M579973</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-21T15:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: Question EAP-TLS security</title>
      <link>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4779895#M579991</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Apparently&lt;/SPAN&gt;&amp;nbsp;apparently he has how MDM intune .&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 20:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/question-eap-tls-security/m-p/4779895#M579991</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-21T20:38:06Z</dc:date>
    </item>
  </channel>
</rss>

