<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using 802.1x wired + which cert?? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134934#M590227</link>
    <description>&lt;P&gt;Rob,&lt;/P&gt;&lt;P&gt;No, none of those are trusted on ISE. So do I need to install my EAP client cert (trusted and exported from ISE) into the personal certificate store for this to work?&amp;nbsp; I was under the impression just the root Godaddy cert into trusted store and the intermediate into trusted store and, like wireless, ISE will present my client cert to endpoint for trust upon authentication.&lt;/P&gt;</description>
    <pubDate>Sun, 23 Jun 2024 07:06:35 GMT</pubDate>
    <dc:creator>siryonz</dc:creator>
    <dc:date>2024-06-23T07:06:35Z</dc:date>
    <item>
      <title>Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134783#M590219</link>
      <description>&lt;P&gt;Hey ! First post here but desperate to pick some brains here. We are implementing 802.1x on the wired side and infosec wants to prevent BYOD so I've found myself drowning in the 802.1x cert based/machine authentication space. We are currently using 802.1x + EAP for wireless which works just great. On the wireless side, we have never had to push our 3rd party CA EAP cert to clients but instead it was trusted upon authentication and worked ( I think bc public certs like GoDaddy are preinstalled on common vendor device). Now, can I use that same EAP cert we are using for wireless for wired as it is installed in ISE already? If so, what do I need to do to get that onto my endpoints (Windows/MacOS)? Thank you in any case.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Jun 2024 04:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134783#M590219</guid>
      <dc:creator>siryonz</dc:creator>
      <dc:date>2024-06-22T04:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134787#M590220</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1449572"&gt;@siryonz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;You can use the same client certificate (user or machine) for wired and wireless authentication, which ISE would trust if you are already using it. ISE uses the EAP certificate for authentication, if this is the public GoDaddy certificate then the client devices need to trust this certificate. &lt;/P&gt;
&lt;P&gt;You just need to configure the native supplicant for the wired interface with the correct configuration, authentication method and trusted CA - &lt;A href="https://integratingit.wordpress.com/2019/07/13/configuring-windows-gpo-for-802-1x-authentication/" target="_blank"&gt;https://integratingit.wordpress.com/2019/07/13/configuring-windows-gpo-for-802-1x-authentication/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Jun 2024 05:22:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134787#M590220</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-22T05:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134915#M590222</link>
      <description>&lt;P&gt;Grateful for your response Rob.&amp;nbsp; I have configured supplicant using smartcard/certificate method, EAP authentication method, and checked the GoDaddy root authority in the trust store, but no luck.&lt;/P&gt;&lt;P&gt;1.) So I guess there is some confusion about what cert and where it needs to be installed on the endpoint. I have not loaded anything relative to my client EAP certificate in the computer or user 'personal' folders (see attached). Just the root and intermediate Go Daddy certs in the trusted store on my endpoint which are checked for trusted.&lt;/P&gt;&lt;P&gt;2.) is the generic GoDaddy root certificate enough or do I need to install my client EAP cert in one of the folders also? I;m confused on the flow. I will try to learn how to do a packet capture to capture the conversation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jun 2024 02:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134915#M590222</guid>
      <dc:creator>siryonz</dc:creator>
      <dc:date>2024-06-23T02:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134927#M590226</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1449572"&gt;@siryonz&lt;/a&gt; of those 3 certificates in the personal certificate store, doe ISE trust those CAs? You can see what authentication method and what certificate was used by your wireless clients by looking in the ISE live logs for an authentication session.&lt;/P&gt;
&lt;P&gt;You can also check your authentication configuration settings on client supplicant to confirm what is configured and mirror that for the wired interface configuration.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/215621-tls-ssl-certificates-in-ise.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/215621-tls-ssl-certificates-in-ise.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-implement-digital-certificates-in-ise/ta-p/3630897" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-implement-digital-certificates-in-ise/ta-p/3630897&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jun 2024 05:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134927#M590226</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-23T05:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134934#M590227</link>
      <description>&lt;P&gt;Rob,&lt;/P&gt;&lt;P&gt;No, none of those are trusted on ISE. So do I need to install my EAP client cert (trusted and exported from ISE) into the personal certificate store for this to work?&amp;nbsp; I was under the impression just the root Godaddy cert into trusted store and the intermediate into trusted store and, like wireless, ISE will present my client cert to endpoint for trust upon authentication.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jun 2024 07:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134934#M590227</guid>
      <dc:creator>siryonz</dc:creator>
      <dc:date>2024-06-23T07:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134937#M590228</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1449572"&gt;@siryonz&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;You don't need to export the EAP certificate used by ISE and import to the clients. If the client trusts the public GoDaddy certificate they can validate ISE's certificate. If the client has a certificate issued by another CA, then ISE needs to trust those CAs in order for ISE to validate the client certificates (import to ISE's trusted certificate store).&lt;/P&gt;
&lt;P&gt;Detemine how it's currently working for wireless authentication and mirror this, assume it's configured correctly. Did you check the ISE logs to confirm how those clients are authenticated and which CA is in use?&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jun 2024 07:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134937#M590228</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-23T07:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134938#M590229</link>
      <description>&lt;P&gt;ok to be safe. I will make sure GoDaddy is trusted in both intermediate and root stores. I will do this in both user and computer certificate stores. As for live logs, I do not see anything relevant to a CA. I see an EAP key and also see user and group results from AD which we use to resolve identities.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jun 2024 07:27:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134938#M590229</guid>
      <dc:creator>siryonz</dc:creator>
      <dc:date>2024-06-23T07:27:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134939#M590230</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1449572"&gt;@siryonz&lt;/a&gt;&amp;nbsp;GoDaddy is not the CA that issued the client certificate, what ever CA issued the certificate in the user/machine Personal store is what you need to import to ISE trusted store.&lt;/P&gt;
&lt;P&gt;If you are already using certificates for wireless authentication, then ISE should already trust that certificate!!&lt;/P&gt;
&lt;P&gt;Have you looked at the wireless authentication settings in the client to confirm what is configured?&lt;/P&gt;
&lt;P&gt;What authentication method is used? Definitely EAP-TLS? Or PEAP/MSCHAPv2? Provide the output for review.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Jun 2024 07:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5134939#M590230</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-23T07:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Using 802.1x wired + which cert??</title>
      <link>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5266728#M595295</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 11:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-802-1x-wired-which-cert/m-p/5266728#M595295</guid>
      <dc:creator>Ferdaush</dc:creator>
      <dc:date>2025-03-03T11:42:57Z</dc:date>
    </item>
  </channel>
</rss>

