<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 12508 EAP-TLS handshake failed in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5056848#M588583</link>
    <description>&lt;P&gt;The registry change at endpoint side or the RSA_PPS disabling on PSN side have the same effect, then I guess if any of these methods is solving your issue, you're not hitting this bug.&lt;/P&gt;</description>
    <pubDate>Fri, 05 Apr 2024 06:00:32 GMT</pubDate>
    <dc:creator>LAN team</dc:creator>
    <dc:date>2024-04-05T06:00:32Z</dc:date>
    <item>
      <title>12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562091#M573056</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We upgraded from 2.7 - 3.0 and then a few weeks ago from 3.0 to 3.1 (for some AzureAD functionality that we require) but since the upgrade we are now seeing devices get rejected from the corporate network with the errors below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Event 5400 Authentication failed&lt;BR /&gt;Failure Reason 12508 EAP-TLS handshake failed&lt;BR /&gt;Resolution Check whether the proper server certificate is installed and configured for EAP in the System Certificates page ( Administration &amp;gt; System &amp;gt; Certificates &amp;gt; System Certificates ). Also ensure that the certificate authority that signed this server certificate is correctly installed in client's supplicant. Similarly, verify that the certificate authority that signed the client's certificate is correctly installed in the Trusted Certificates page (Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Trusted Certificates). Check the previous steps in the log for this EAP-TLS conversation for a message indicating why the authentication failed. Check the OpenSSLErrorMessage and OpenSSLErrorStack for more information.&lt;BR /&gt;Root cause EAP-TLS handshake failed.&lt;/P&gt;&lt;P&gt;OpenSSLErrorMessage SSL alert: code=0x233=563 ; source=local ; type=fatal ; message="decrypt error.ssl/statem/statem_lib.c:561 error:1417B07B:SSL routines:tls_process_cert_verify:bad signature [error=337096827 lib=20 func=379 reason=123]"&lt;BR /&gt;OpenSSLErrorStack 140056563922688:error:0407E086:rsa routines:RSA_verify_PKCS1_PSS_mgf1:last octet invalid:crypto/rsa/rsa_pss.c:88:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone come across this issue before? We have a ticket open with TAC but it doesn't appear to be getting anywhere near being resolved... This is a major issue for us as users cannot authenticate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 12:51:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562091#M573056</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2022-03-02T12:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562097#M573057</link>
      <description>&lt;P&gt;&lt;SPAN&gt;We upgraded from 2.7 - 3.0 and then a few weeks ago from 3.0 to 3.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-I am assuming eap-tls onboarding was working fine before both bundle upgrades? Any other changes occur from ISE and/or client perspective? Is the CA chain that is presented in the client certs during onboarding in the ISE trust store? Are there any issues with validity for the ISE identity certs used for eap? Have you attempted to re-import the CA chain/s into trust store? Keep us posted with what TAC presents to you.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 13:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562097#M573057</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2022-03-02T13:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562100#M573058</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/833210"&gt;@Mike.Cifelli&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EAP-TLS was working fine on both versions prior to the upgrade, this only appears to be an issue with version 3.1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yep, the rootCA is stored in trusted certificates and has the same cert on the client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other model laptops appear to be ok, ours seems to be affecting surface tablet 4 devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TAC believe their is other known cases regarding TPM 2.0 and windows compatibility, have you come across this yet?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure how close you are to TAC but the experience has been painful thus far.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 13:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562100#M573058</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2022-03-02T13:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562549#M573087</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1008639"&gt;@InfraISE2020&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;IMO, the best way to help &lt;STRONG&gt;TAC&lt;/STRONG&gt; on this is to install an&amp;nbsp;&lt;STRONG&gt;ISE&amp;nbsp;3.0 Node&lt;/STRONG&gt; to test an specific&amp;nbsp;&lt;STRONG&gt;Endpoint &amp;amp; NAD&lt;/STRONG&gt; with not only this &lt;STRONG&gt;ISE 3.0&lt;/STRONG&gt;, but also&amp;nbsp;with your &lt;STRONG&gt;ISE 3.1&lt;/STRONG&gt;.... this way you have the possibility to easily compare both version.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 22:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562549#M573087</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-03-02T22:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562757#M573097</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;If you are using Anyconnect as 802.1x supplicant, try to upgrade to Anyconnect to the latest version (4.10.04071+)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 06:04:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562757#M573097</guid>
      <dc:creator>nir-r</dc:creator>
      <dc:date>2022-03-03T06:04:54Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562892#M573105</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/52582"&gt;@nir-r&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;didn't know ... thanks for that !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1008639"&gt;@InfraISE2020&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/52582"&gt;@nir-r&lt;/a&gt;&amp;nbsp;said ... also take a look at:&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz90541" target="_blank" rel="noopener"&gt;CSCvz90541&amp;nbsp;NAM: AnyConnect NAM 4.9.x/4.10.x fails auth w/ISE 3.1, but is successful with previous ISE versions&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Symptom&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;AnyConnect NAM 4.9.x/4.10.x fails to auth with ISE 3.1, but is successful with previous ISE versions&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Conditions&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Specific to AnyConnect/NAM versions 4.9.x/4.10.x with ISE 3.1&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Workaround&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;1. Use AnyConnect/NAM 4.8.x - Not recommended but can be an option&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;2. Use Microsoft Native Supplicant&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;FONT size="2"&gt;3. Use AnyConnect 4.9.x/4.10.x with ISE 2.7 or 3.0&lt;/FONT&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Further Problem Description&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;BR /&gt;&lt;U&gt;&lt;FONT size="2"&gt;Behavior is currently being address via an ISE 3.1 patch.&lt;/FONT&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Last Modified&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Feb 18, 2022.&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 10:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4562892#M573105</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-03-03T10:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4582239#M573761</link>
      <description>&lt;P&gt;any updates here? we are running into the same and getting the same line from TAC. they have some registry keys that can be removed (looks like they got their info from&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/answers/questions/467673/windows-10-tpm-20-client-authentication-in-tls-12.html" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/answers/questions/467673/windows-10-tpm-20-client-authentication-in-tls-12.html&amp;nbsp;&lt;/A&gt;) and looks to "fix" the issue for us but not comfortable removing these keys on our clients for fear of impacting other TLS traffic&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 20:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4582239#M573761</guid>
      <dc:creator>gizzard_man</dc:creator>
      <dc:date>2022-03-30T20:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4691267#M577325</link>
      <description>&lt;P&gt;We had the very same problem, using the Windows 10 WiFi supplicant. So, this is not a real workaround for this problem.&lt;/P&gt;&lt;P&gt;But I was able to resolve the situation with the instructions from this page:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/answers/questions/467673/windows-10-tpm-20-client-authentication-in-tls-12.html" target="_blank"&gt;https://learn.microsoft.com/en-us/answers/questions/467673/windows-10-tpm-20-client-authentication-in-tls-12.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Basically, you only have to disable the&amp;nbsp;&lt;SPAN&gt;RSA PSS cipher in the registry on the client.&lt;/SPAN&gt;&lt;SPAN&gt;You can disable RSA PSS by following those steps:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Start the registry&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Go to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography\Configuration\Local\SSL\00010003&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Backup/export this key&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Remove the following signature suites from 'Functions'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- RSAE-PSS/SHA256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- RSAE-PSS/SHA384&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- RSAE-PSS/SHA512&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Reboot&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Wed, 21 Sep 2022 10:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/4691267#M577325</guid>
      <dc:creator>christian.faessler</dc:creator>
      <dc:date>2022-09-21T10:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5039653#M588088</link>
      <description>&lt;P&gt;Hopefully Microsoft rolls out an update. This doesn't scale for my operation.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 13:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5039653#M588088</guid>
      <dc:creator>DKCisco</dc:creator>
      <dc:date>2024-03-14T13:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5039656#M588089</link>
      <description>&lt;P&gt;Two years later I'm here reading this forum post and see that you had a problem we are experiencing now. The nam client is not installed on the workstations having this issue. Did you ever find a good solution for this?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 13:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5039656#M588089</guid>
      <dc:creator>DKCisco</dc:creator>
      <dc:date>2024-03-14T13:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5039798#M588097</link>
      <description>&lt;P&gt;TPM Firmware updates on the devices having the issue. TPM 2.0 spec 1.38 or higher was required. The devices having this issue had a TPM 2.0 spec version below 1.38. Anything 2.0 spec 1.38 and above was fine.&lt;BR /&gt;&lt;BR /&gt;Powershell to check version:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Get-CimInstance -Namespace "root\cimv2\security\microsofttpm" -class "win32_tpm"&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 14:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5039798#M588097</guid>
      <dc:creator>gizzard_man</dc:creator>
      <dc:date>2024-03-14T14:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5042843#M588195</link>
      <description>&lt;P&gt;I confirm that the issue is still present also with ISE version 3.2 patch 5.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Server Hello to PC with PSS Algorith:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FilippoCarzaniga_0-1710778346884.png" style="width: 673px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/212976iF78AC2A93AA179B8/image-dimensions/673x283?v=v2" width="673" height="283" role="button" title="FilippoCarzaniga_0-1710778346884.png" alt="FilippoCarzaniga_0-1710778346884.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Server hello to PC without PSS Algorithm&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FilippoCarzaniga_1-1710778588465.png" style="width: 587px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/212977i13BDC8D2EC40AF8B/image-dimensions/587x377?v=v2" width="587" height="377" role="button" title="FilippoCarzaniga_1-1710778588465.png" alt="FilippoCarzaniga_1-1710778588465.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&amp;nbsp;Azure Policy to disable Signature Algoritym RSAE-PSS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 16:21:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5042843#M588195</guid>
      <dc:creator>Filippo Carzaniga</dc:creator>
      <dc:date>2024-03-18T16:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5046754#M588273</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Solution which has solved issue on my side on 3.1 version, choose 33/disable RSA_PSS signature&amp;nbsp; :&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ISEPSN01/admin# application configure ise

Selection configuration option
[1]Reset M&amp;amp;T Session Database
[2]Rebuild M&amp;amp;T Unusable Indexes
[3]Purge M&amp;amp;T Operational Data
[4]Reset M&amp;amp;T Database
[5]Refresh Database Statistics
[6]Display Profiler Statistics
[7]Export Internal CA Store
[8]Import Internal CA Store
[9]Create Missing Config Indexes
[10]Create Missing M&amp;amp;T Indexes
[12]Generate Daily KPM Stats
[13]Generate KPM Stats for last 8 Weeks
[14]Enable/Disable Counter Attribute Collection
[15]View Admin Users
[16]Get all Endpoints
[19]Establish Trust with controller
[20]Reset Context Visibility
[21]Synchronize Context Visibility With Database
[22]Generate Heap Dump
[23]Generate Thread Dump
[24]Force Backup Cancellation
[25]CleanUp ESR 5921 IOS Crash Info Files
[26]Recreate undotablespace
[27]Reset Upgrade Tables
[28]Recreate Temp tablespace
[29]Clear Sysaux tablespace
[30]Fetch SGA/PGA Memory usage
[31]Generate Self-Signed Admin Certificate
[32]View Certificates in NSSDB or CA_NSSDB
[33]Enable/Disable/Current_status of RSA_PSS signature for EAP-TLS
[34]Check and Repair Filesystem
[35]Enable/Disable/Current_status of Audit-Session-ID Uniqueness
[0]Exit

&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2024 14:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5046754#M588273</guid>
      <dc:creator>LAN team</dc:creator>
      <dc:date>2024-03-21T14:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5050346#M588375</link>
      <description>&lt;P&gt;Unfortunately, I’m still seeing the bug impact machines as they re-authenticate. I rebooted the psn nodes to make sure and it persists after the cli change as well as the reboot.&amp;nbsp;The only thing that has worked as far as I can tell is doing a registry change on the workstation itself but that doesn't scale for us.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2024 01:48:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5050346#M588375</guid>
      <dc:creator>DKCisco</dc:creator>
      <dc:date>2024-03-26T01:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: 12508 EAP-TLS handshake failed</title>
      <link>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5056848#M588583</link>
      <description>&lt;P&gt;The registry change at endpoint side or the RSA_PPS disabling on PSN side have the same effect, then I guess if any of these methods is solving your issue, you're not hitting this bug.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2024 06:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12508-eap-tls-handshake-failed/m-p/5056848#M588583</guid>
      <dc:creator>LAN team</dc:creator>
      <dc:date>2024-04-05T06:00:32Z</dc:date>
    </item>
  </channel>
</rss>

