<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: windows machine use eap-tls &amp;amp; then peap during roaming in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5039012#M588066</link>
    <description>&lt;P&gt;I still don't know exactly what you're confused about. What do you mean by "concurrent" ?&amp;nbsp; EAP chaining does exactly that ... it sends both user and machine auth at the same time when the user is logged in.&lt;/P&gt;
&lt;P&gt;In your example with username and MAC addresses etc., what are you describing there? Which part is machine auth and which part is user auth?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2024 20:47:45 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-03-13T20:47:45Z</dc:date>
    <item>
      <title>windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5038280#M588030</link>
      <description>&lt;P&gt;time to learn again in my 57...&lt;BR /&gt;subject reflects conditions as how they can be seen from ISE perspective (no access to AD, its target computer etc to verify).&lt;BR /&gt;asset everytime authenticates with its machine account, but after initial EAP-TLS, when roaming. it switches to PEAP.&lt;BR /&gt;How can it be achieved on windows supplicant?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 19:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5038280#M588030</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-03-12T19:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5038350#M588038</link>
      <description>&lt;P&gt;Your question is quite strangely worded. Are you asking, whether a Windows supplicant can mysteriously switch from using EAP-TLS to EAP-PEAP when the endpoint is roaming?&lt;/P&gt;
&lt;P&gt;My only guess is that perhaps there is an AnyConnect NAM installed on the endpoint and the machine auth is EAP-TLS, and the user auth is EAP-PEAP. The machine boots up with EAP-TLS. User logs in - EAP-PEAP is triggered. User remains logged in and then goes walkabout roaming).&lt;/P&gt;
&lt;P&gt;Same could happen with EAP-TEAP and its EAP chaining support (similar to AnyConnect NAM)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 21:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5038350#M588038</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-03-12T21:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5038562#M588046</link>
      <description>&lt;P&gt;Hi Arne&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Glad to see u came to help. It was late yesterday so that i mislooked 2nd method. It's PEAP-MSCHAPv2 according to ISE. But in the rest the situation is exactly like i declared - each time it's machine authentication. I spent tens of hours checking how EAP-FAST (AnyConnect) &amp;amp; EAP-TEAP (Windows) work. But there is no such a feature as concurrent method for the account type (machine|user). So how is it possible to setup Supplicant on windows so that it runs machine authentication with 2 different methods a time?&lt;BR /&gt;EAP-TLS one:&lt;BR /&gt;...&lt;BR /&gt;Username hostname.company.tld&lt;BR /&gt;Endpoint Id AA:BB:CC:DD:EE:FF&lt;BR /&gt;Endpoint Profile Windows11-Workstation&lt;BR /&gt;...&lt;BR /&gt;Authentication Method dot1x&lt;BR /&gt;Authentication Protocol EAP-TLS&lt;BR /&gt;...&lt;BR /&gt;12502 Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated&lt;/P&gt;
&lt;P&gt;PEAP-MSCHAPv2 one:&lt;BR /&gt;...&lt;BR /&gt;Username host/hostname.company.tld&lt;BR /&gt;Endpoint Id AA:BB:CC:DD:EE:FF&lt;BR /&gt;Endpoint Profile Windows11-Workstation&lt;BR /&gt;...&lt;BR /&gt;Authentication Method dot1x&lt;BR /&gt;Authentication Protocol PEAP (EAP-MSCHAPv2)&lt;BR /&gt;...&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;11808 Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;BR /&gt;...&lt;BR /&gt;24343 RPC Logon request succeeded - hostname$@company.tld (step latency=1990 ms Step latency=1990 ms)&lt;BR /&gt;...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 08:35:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5038562#M588046</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-03-13T08:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5039012#M588066</link>
      <description>&lt;P&gt;I still don't know exactly what you're confused about. What do you mean by "concurrent" ?&amp;nbsp; EAP chaining does exactly that ... it sends both user and machine auth at the same time when the user is logged in.&lt;/P&gt;
&lt;P&gt;In your example with username and MAC addresses etc., what are you describing there? Which part is machine auth and which part is user auth?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 20:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5039012#M588066</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-03-13T20:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5039304#M588075</link>
      <description>&lt;P&gt;Arne,&lt;BR /&gt;1) in both cases it's a machine account.&lt;BR /&gt;2) if u look on the live logs u see 1st EAP-TLS authC, then series of PEAP-MSCHAPv2 authCs due to roaming. all off them are machine's authCs!&lt;BR /&gt;3) under "concurrent" i mean exactly situation when wireless nic may authenticate either with EAP-TLS or PEAP-MSCHAPv2 at a time with its _computer_ account w/o reconfigurations in the middle.&lt;BR /&gt;hopefully now it's clear...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 16:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5039304#M588075</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-03-14T16:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5040375#M588129</link>
      <description>&lt;P&gt;Is it EAP-TLS happening while in the login screen? If so then the Windows wireless profile is configured to use "user or computer authz" and SSO is enabled to authenticate in the login screen under "Advanced settings".&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JPavonM_1-1710486661019.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/212604i0E5273EBCB96A843/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JPavonM_1-1710486661019.png" alt="JPavonM_1-1710486661019.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The weird thing here is how Windows is changing from EAP-TLS with computer authZ to PEAP with user authZ, and using TEAP is the only way to do that EAP-chaining in Windows 10:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JPavonM_2-1710486953735.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/212605iB99AC034FBBC9313/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JPavonM_2-1710486953735.png" alt="JPavonM_2-1710486953735.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Try to create a profile and set this off and use EAP-PEAP and username as authentication mode as "user authz" only if that is what you want, or EAP-TLS by choosing Smartcard.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5040375#M588129</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2024-03-15T07:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5040394#M588130</link>
      <description>&lt;P&gt;no access to any of endpoint-side relevant tools(&lt;BR /&gt;only we can see is process from ISE/WLAN perspective. Each time asset presents either host/computername.company.tld (which in this endpoint's case always accompanied with negotiated method PEAP-MSCHAPv2) or computername.company.tld (which&amp;nbsp;in this endpoint's case always accompanied with negotiated method EAP-TLS). what i can conclude from above for 100% is it's every time computer's authC not user's. but this doesnt hint on how it can be configured on the NIC...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5040394#M588130</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-03-15T07:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5055540#M588562</link>
      <description>&lt;P&gt;other words, the windows supplicant that just failed (bc of authZ profile dictated so) with machine's&amp;nbsp;&lt;SPAN&gt;PEAP-MSCHAPv2 &amp;amp; few moments later it authenticates with new session with machine's EAP-TLS. How can this sequence be achieved? any ... idieas pls?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 11:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5055540#M588562</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2024-04-03T11:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: windows machine use eap-tls &amp; then peap during roaming</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5055835#M588571</link>
      <description>&lt;P&gt;The Windows supplicant is not capable of automatically 'falling back' to another authentication method (EAP-TLS) if the first one ([PEAP]MSCHAPv2) fails. My guess would be either:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Some custom scripting has been done on the endpoint to trigger the reconfig of the supplicant settings based on some Windows event that is triggered by the auth failure. You would likely have to look into the Task Scheduler and Event Viewer to find that.&lt;/LI&gt;
&lt;LI&gt;Another supplicant (like AnyConnect NAM) is installed and configured for different authC methods for Computer (PEAP) versus User (EAP-TLS) auth and the User certificate enrolled using the Computer FQDN instead of the User credential. That certificate is presented to ISE when the User logs in so it sees the computer FQDN as the identity.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For either scenario (or something else), there would be no way to validate the root cause without detailed investigation of the endpoint.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 21:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-machine-use-eap-tls-amp-then-peap-during-roaming/m-p/5055835#M588571</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-04-03T21:31:43Z</dc:date>
    </item>
  </channel>
</rss>

