<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users ) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946908#M584821</link>
    <description>&lt;P&gt;Hello!&lt;/P&gt;
&lt;P&gt;Currently we are designing a brand new deployment of ISE 3.2 with windows native dot1x client.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;My questions is: Is it possible to use TEAP as an outer method and EAP-TLS(cert based) for computers and MS-CHAPv2 for users as inner method?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I have read in a forum that the windows native client does not support multiple inner methods, only one.&lt;/P&gt;
&lt;P&gt;And we dont want to you EAP-TLS for user authentication. The goal is to use the AD as a single point of truth regarding the users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another question is:&lt;STRONG&gt; If we use EAP-TLS - certificate based - machine auth, is it mandatory to configure a Certificate Authentication Profile?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Another question is: &lt;STRONG&gt;If we use EAP-TLS - certificate based - machine auth, does the machine object need to exist in the AD?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Oct 2023 13:46:59 GMT</pubDate>
    <dc:creator>mtar</dc:creator>
    <dc:date>2023-10-24T13:46:59Z</dc:date>
    <item>
      <title>Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946908#M584821</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;
&lt;P&gt;Currently we are designing a brand new deployment of ISE 3.2 with windows native dot1x client.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;My questions is: Is it possible to use TEAP as an outer method and EAP-TLS(cert based) for computers and MS-CHAPv2 for users as inner method?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I have read in a forum that the windows native client does not support multiple inner methods, only one.&lt;/P&gt;
&lt;P&gt;And we dont want to you EAP-TLS for user authentication. The goal is to use the AD as a single point of truth regarding the users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another question is:&lt;STRONG&gt; If we use EAP-TLS - certificate based - machine auth, is it mandatory to configure a Certificate Authentication Profile?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Another question is: &lt;STRONG&gt;If we use EAP-TLS - certificate based - machine auth, does the machine object need to exist in the AD?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 13:46:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946908#M584821</guid>
      <dc:creator>mtar</dc:creator>
      <dc:date>2023-10-24T13:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946909#M584822</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/433362"&gt;@mtar&lt;/a&gt; yes you can use TEAP, with certificates for machine authentication and MSCHAPv2 for user authentication.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 13:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946909#M584822</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-24T13:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946948#M584825</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;In that case how would my authentication policy would look like?&lt;/P&gt;
&lt;P&gt;One line is enough to handle the two kind of protocols with the proper Server Sequence? Iike here:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mtar_0-1698158500213.png" style="width: 729px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/200563iBF339BAD35128252/image-dimensions/729x82?v=v2" width="729" height="82" role="button" title="mtar_0-1698158500213.png" alt="mtar_0-1698158500213.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I mean, I don't have to create a separate rule for the user and the machine auth?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 14:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946948#M584825</guid>
      <dc:creator>mtar</dc:creator>
      <dc:date>2023-10-24T14:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946954#M584826</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/433362"&gt;@mtar&lt;/a&gt; you may wish to have 2 rules in the authentication policy, one for EAP-TLS which uses a certificate authentication profile (CAP) for authentication and lookups (if required) and another for MSCHAPv2 which authenticates against AD.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 14:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946954#M584826</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-24T14:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946956#M584827</link>
      <description>&lt;P&gt;If I understand correctly, the above showed "one rule" design is working too right?&lt;/P&gt;
&lt;P&gt;It is it not necessary to have a rule for each kind of auth.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 14:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4946956#M584827</guid>
      <dc:creator>mtar</dc:creator>
      <dc:date>2023-10-24T14:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4954968#M585048</link>
      <description>&lt;P&gt;You will need 2 separate Authentication Rules in your ISE Policy Set - one for each EAP inner method. The reason is that EAP-TLS will need to be associated with a Certificate Authentication Profile (CAP) - the default &lt;STRONG&gt;Preloaded_Certificate_Profile&lt;/STRONG&gt; should work - while your MS-CHAPv2 auth will need to be associated with an Identity Store (Internal, AD, etc.) or sequence.&lt;/P&gt;
&lt;P&gt;You &lt;EM&gt;may&lt;/EM&gt; combine the Certificate Profile and Identity Store(s) into a single Identity Source Sequence but depending on how many other authentication rules are in your policy set, it may become a lot of extra processing for each authentication. I prefer to see each auth by protocol unless they are all the same protocol and it's more of a convenience to use an ordered set of Identity Stores with the same protocol (MS-CHAPv2 for AD1 then AD2 then Internal Users, etc.)&lt;/P&gt;
&lt;P&gt;For an authorization rule example, see&amp;nbsp;&lt;SPAN class="lia-message-read"&gt;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/security-knowledge-base/ise-authentication-and-authorization-policy-reference/ta-p/3850472" target="_blank"&gt;ISE Authentication and Authorization Policy Reference&lt;/A&gt;&lt;/SPAN&gt; &amp;gt; &lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-authentication-and-authorization-policy-reference/ta-p/3850472#toc-hId-956975206" rel="nofollow noopener noreferrer" target="_blank"&gt;TEAP-Chaining with Tunneled EAP (TEAP)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 14:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4954968#M585048</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2023-11-07T14:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4955011#M585050</link>
      <description>&lt;P&gt;It would be best practice not to deploy MS-CHAPv2.&amp;nbsp; Its broken from an encryption prospective and is effectively disabled by Microsoft via Credential Guard (unless you choose to disable).&amp;nbsp; A better option would be to use user and computer certificates within TEAP instead.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 15:35:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4955011#M585050</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-11-07T15:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4956849#M585103</link>
      <description>&lt;P&gt;Using User certificates for user authentication is not an option unfortunatelly &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there are other secure alternatives to MsChapv2 which you would recommend?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 08:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4956849#M585103</guid>
      <dc:creator>mtar</dc:creator>
      <dc:date>2023-11-10T08:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4956873#M585107</link>
      <description>&lt;P&gt;That makes sense, thank you very much!&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 10:15:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4956873#M585107</guid>
      <dc:creator>mtar</dc:creator>
      <dc:date>2023-11-10T10:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4960082#M585225</link>
      <description>&lt;P&gt;Why not?&amp;nbsp; The alternative is TLS based auth or SAML via Captive Portal.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 17:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/4960082#M585225</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-11-15T17:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/5210194#M592524</link>
      <description>&lt;P&gt;What are the TEAP properties settings under client authentication (primary and secondary EAP) of the windows supplicant if machine authentication using TLS and user using MSCHAPv2? Thanks in advance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 10:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/5210194#M592524</guid>
      <dc:creator>aputra</dc:creator>
      <dc:date>2024-10-17T10:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/5210205#M592525</link>
      <description>&lt;P&gt;The primary method refers to the user and the secondary refers to machine, so in your case primary would be configured with MSCHAPv2 and secondary with EAP-TLS.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 11:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/5210205#M592525</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-17T11:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/5210345#M592530</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 13:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/5210345#M592530</guid>
      <dc:creator>aputra</dc:creator>
      <dc:date>2024-10-17T13:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3.2 - TEAP ( EAP-TLS for  machine and MS-CHAPv2 for users )</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/5210375#M592531</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 14:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-3-2-teap-eap-tls-for-machine-and-ms-chapv2-for-users/m-p/5210375#M592531</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-17T14:30:35Z</dc:date>
    </item>
  </channel>
</rss>

