<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem in rule to compare SAN (Subject Alternative Name) and Call in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020191#M587418</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The smartphones will connect in network with access only Internet. It's not exactly BYOD network, but similar.&lt;/P&gt;&lt;P&gt;I'm test this solution. If OK after the tests, my idea is provisioning the certificates to smartphones in ISE. The instalation certificates on smartphones and profile configuration, will be done by Intune team.&lt;/P&gt;&lt;P&gt;My objective is that the user, receive the smartphone already configured, with the profile and certificate generated by ISE. This process will be done through Intune.&lt;/P&gt;</description>
    <pubDate>Sun, 18 Feb 2024 22:05:23 GMT</pubDate>
    <dc:creator>rafaelsalvinos</dc:creator>
    <dc:date>2024-02-18T22:05:23Z</dc:date>
    <item>
      <title>Problem in rule to compare SAN (Subject Alternative Name) and Calling</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5019858#M587399</link>
      <description>&lt;P&gt;Hey, Guys!&lt;/P&gt;&lt;P&gt;I'm with a problem related to athentication of users that use certificates generetad by Cisco ISE.&lt;/P&gt;&lt;P&gt;I generated the individual certificates through Certificate Provisioning Protal in Cisco ISE for EndPoints (smartphones corporate) authenticate via EAP-TLS, to network to access Internet only.&lt;/P&gt;&lt;P&gt;The autentication process of endpoint via EAP-TLS occurs successfully.&lt;/P&gt;&lt;P&gt;The problem is that when I export the individual certificate for other device with MAC Address different from SAN (Subject Alternative Name) of certificate, authentication continues to occur.&lt;/P&gt;&lt;P&gt;I believe that certificate of endpoint generated through ISE is unique.&lt;/P&gt;&lt;P&gt;To resolve, I created a rule for compare SAN and MAC Address Device (Calling Sation ID), but doesn't match.&lt;/P&gt;&lt;P&gt;I saw in the log, that the field "Calling Sation ID" use format MAC Address with ":" and the field "Subject Alternative Name" use format MAC Address "-". This difference in format is reject the access endpoint.&lt;/P&gt;&lt;P&gt;Event log:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_1-1708188154157.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210492iCF0A82F71958E510/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_1-1708188154157.png" alt="rafaelsalvinos_1-1708188154157.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_2-1708188218491.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210493iB359BF2C3659D0F7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_2-1708188218491.png" alt="rafaelsalvinos_2-1708188218491.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_0-1708191529545.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210496i68D994D99930DD6F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_0-1708191529545.png" alt="rafaelsalvinos_0-1708191529545.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_3-1708188353008.png" style="width: 566px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210494iE11FB4D6DD0C9979/image-dimensions/566x102?v=v2" width="566" height="102" role="button" title="rafaelsalvinos_3-1708188353008.png" alt="rafaelsalvinos_3-1708188353008.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I would't like to change format MAC Address in WLC because there are many.&lt;/P&gt;&lt;P&gt;My need is accept to access only the MAC device it is equal SAN, for prevent export the certificate.&lt;/P&gt;&lt;P&gt;Can you help me to solve this problem?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 17:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5019858#M587399</guid>
      <dc:creator>rafaelsalvinos</dc:creator>
      <dc:date>2024-02-18T17:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Problem in rule to compare SAN (Subject Alternative Name) and Call</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020170#M587413</link>
      <description>&lt;P&gt;I am using ISE 3.2 and in Authorization there is an operator called "MAC Contains" - that strips out the delimiter and compares only the hex digits. But that does not help your case where you're comparing SAN and Calling-Station-ID ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_1-1708290018184.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210535i40C53C92636B2E62/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_1-1708290018184.png" alt="ArneBier_1-1708290018184.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1708289966559.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210534iDDC9E7E12CAE3F47/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ArneBier_0-1708289966559.png" alt="ArneBier_0-1708289966559.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 21:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020170#M587413</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-18T21:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: Problem in rule to compare SAN (Subject Alternative Name) and Call</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020176#M587415</link>
      <description>&lt;P&gt;First off, the ISE Internal CA is only built and supported for the BYOD use case (and some minor pxGrid use cases). If these are Corporate-owned smartphones, you should be using an MDM to manage the devices and enrol certificates.&lt;/P&gt;
&lt;P&gt;Secondly, using this MAC_in_SAN condition match is going to be problematic in one or another due to the fact that most vendor devices are moving to use randomized MAC addresses by default. See &lt;A href="https://www.youtube.com/watch?v=LTum5EBNP4w" target="_blank" rel="noopener"&gt;ISE 3.1 BYOD Solution for MAC Randomized Endpoints&lt;/A&gt;&amp;nbsp;for more info.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 21:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020176#M587415</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-02-18T21:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: Problem in rule to compare SAN (Subject Alternative Name) and Call</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020187#M587416</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tomorrow I'm going to do a test with this condition.&lt;/P&gt;&lt;P&gt;In theory, I believe its work, because the formats of comparison are same formats your example.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rafaelsalvinos_0-1708293226715.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210536iAEEB326C26327A5C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rafaelsalvinos_0-1708293226715.png" alt="rafaelsalvinos_0-1708293226715.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I will back here with result.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 21:54:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020187#M587416</guid>
      <dc:creator>rafaelsalvinos</dc:creator>
      <dc:date>2024-02-18T21:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: Problem in rule to compare SAN (Subject Alternative Name) and Call</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020190#M587417</link>
      <description>&lt;P&gt;Oh cool - I hod forgotten that you can click on the "3x3 grid" icon to reveal other operands. I reckon that should work.&lt;/P&gt;
&lt;P&gt;But as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp; pointed out, by default most smartphones will use Private MAC addresses - and that might defeat the checks. But see how you go.&lt;/P&gt;
&lt;P&gt;I don't place any limitations on how one can/should use the internal CA - it's a tedious affair, but if customers can use it to their advantage, then that is a good thing.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 22:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020190#M587417</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-18T22:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: Problem in rule to compare SAN (Subject Alternative Name) and Call</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020191#M587418</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The smartphones will connect in network with access only Internet. It's not exactly BYOD network, but similar.&lt;/P&gt;&lt;P&gt;I'm test this solution. If OK after the tests, my idea is provisioning the certificates to smartphones in ISE. The instalation certificates on smartphones and profile configuration, will be done by Intune team.&lt;/P&gt;&lt;P&gt;My objective is that the user, receive the smartphone already configured, with the profile and certificate generated by ISE. This process will be done through Intune.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 22:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020191#M587418</guid>
      <dc:creator>rafaelsalvinos</dc:creator>
      <dc:date>2024-02-18T22:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: Problem in rule to compare SAN (Subject Alternative Name) and Call</title>
      <link>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020898#M587455</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1003519"&gt;@rafaelsalvinos&lt;/a&gt;&amp;nbsp;I'm not quite understanding how this is intended to work.&lt;/P&gt;
&lt;P&gt;The Profile (802.1x settings) is only installed on smartphones as part of the ISE BYOD enrolment flow. There is no way to export this from ISE to load into Intune, nor is there a way for Intune to integrate with ISE to programmatically request certificates on behalf of the users (like the SCEP or PKCS connector options).&lt;/P&gt;
&lt;P&gt;You would have to manually request individual certificates for each user, then use the Imported PKCS option to push the certificate and private key to each user along with the Wifi Profile created in Intune. That is a lot of operational overhead (if even feasible for multiple users).&lt;/P&gt;
&lt;P&gt;Using a CA that integrates with Intune (like AD CS, SCEPman, or MS Cloud PKI) would be a much better option.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 21:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/problem-in-rule-to-compare-san-subject-alternative-name-and/m-p/5020898#M587455</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-02-19T21:46:08Z</dc:date>
    </item>
  </channel>
</rss>

