<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 5411 Supplicant stopped responding to ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193890#M591815</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MateenAhmad_0-1726156038744.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229032i0575599C0A55BCB9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MateenAhmad_0-1726156038744.png" alt="MateenAhmad_0-1726156038744.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I am getting this error "Attempt to get credential key by call package blocked by Credential Gaurd"&lt;/P&gt;</description>
    <pubDate>Thu, 12 Sep 2024 15:48:42 GMT</pubDate>
    <dc:creator>Mateen Ahmad</dc:creator>
    <dc:date>2024-09-12T15:48:42Z</dc:date>
    <item>
      <title>5411 Supplicant stopped responding to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193403#M591787</link>
      <description>&lt;P&gt;I am facing issue on some client machines windows 10/11, i have 2 node deployment&amp;nbsp; ISE3.2 p6.&lt;/P&gt;
&lt;P&gt;I upgraded wireless adaptor firmware. but no luck. below live logs. I am using PEAP(MSCHAPv2), User and Machine authentications both. But i not using any certificate for machine authentications, I have self signed on ISE server and on client supplicant settings i have disabled "Verify server identity by validating server certificate"&lt;/P&gt;
&lt;P&gt;Windows supplicant settings&lt;/P&gt;
&lt;DIV id="tinyMceEditorMateenAhmad_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MateenAhmad_1-1726080084174.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228965i661B007B81D89AB7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MateenAhmad_1-1726080084174.png" alt="MateenAhmad_1-1726080084174.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MateenAhmad_2-1726080105684.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228966iF2114CD6FDD7B959/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MateenAhmad_2-1726080105684.png" alt="MateenAhmad_2-1726080105684.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MateenAhmad_3-1726080128526.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228967i3D8D0565DEF29097/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MateenAhmad_3-1726080128526.png" alt="MateenAhmad_3-1726080128526.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MateenAhmad_4-1726080153000.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228968iF70926C1CEBB284F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MateenAhmad_4-1726080153000.png" alt="MateenAhmad_4-1726080153000.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;ISE Policy:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MateenAhmad_5-1726080606440.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228969iA8A87A5523181EE5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MateenAhmad_5-1726080606440.png" alt="MateenAhmad_5-1726080606440.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Event 5411 Supplicant stopped responding to ISE&lt;BR /&gt;Failure Reason&lt;BR /&gt;12937 Supplicant stopped responding to ISE after sending it&lt;BR /&gt;the first inner EAP-MSCHAPv2 message&lt;BR /&gt;Resolution&lt;BR /&gt;Verify that supplicant is configured properly to conduct a full&lt;BR /&gt;EAP conversation with ISE. Verify that NAS is configured&lt;BR /&gt;properly to transfer EAP messages to/from supplicant. Verify&lt;BR /&gt;that supplicant or NAS does not have a short timeout for EAP&lt;BR /&gt;conversation. Check the network that connects the Network&lt;BR /&gt;Access Server to ISE. Verify that supplicant supports and has a&lt;BR /&gt;properly configured inner EAP-MSCHAPv2 method and&lt;BR /&gt;user/machine credentials.&lt;BR /&gt;Root cause&lt;BR /&gt;Supplicant stopped responding to ISE after sending it the first&lt;BR /&gt;inner EAP-MSCHAPv2 message&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 19:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193403#M591787</guid>
      <dc:creator>Mateen Ahmad</dc:creator>
      <dc:date>2024-09-11T19:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: 5411 Supplicant stopped responding to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193430#M591788</link>
      <description>&lt;P&gt;Is this a lab or production?&amp;nbsp; Please tell me it's a lab ... you should not be setting up your client devices like this.&lt;/P&gt;
&lt;P&gt;Does this happen to only one client or all of them?&lt;/P&gt;
&lt;P&gt;EAP-PEAP MSCHAPv2 is a bad idea for Windows enterprise environments for a couple of reasons&lt;/P&gt;
&lt;P&gt;Windows Credential Guard will break the ability for your users' credentials to be supplied to the supplicant&lt;/P&gt;
&lt;P&gt;When users change their AD password, they must then "forget network" and reconnect. Or how do you suggest they change the supplicant password after they have changed their Windows password (CTRL-ALT-Del) ?&lt;/P&gt;
&lt;P&gt;MSCHAPv2 used to be the most convenient way to do network authentication - but better is to use an MDM, or ISE BYOD and put certs on your devices. Seriously.&lt;/P&gt;
&lt;P&gt;Telling the supplicant to ignore the server cert is a serious security compromise. Why then waste your time with all this 802.1X - you'd be better off with PSK SSID. Don't use self-signed EAP certs. Make a CA (it's easy) and then sign your ISE EAP server certs and push the CA certs to your clients as a trusted cert (use group policy, or an MDM).&lt;/P&gt;
&lt;P&gt;To solve your issue, run an ISE tcpdump and then analyse the EAP conversation in Wireshark to see why the clients are unhappy.&lt;/P&gt;
&lt;P&gt;And finally, MAR (Machine Access Restriction) is another no-no. It's unreliable. f you're gonna do user and machine auth together, then please look at EAP-TEAP.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 20:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193430#M591788</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-11T20:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: 5411 Supplicant stopped responding to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193520#M591801</link>
      <description>&lt;P&gt;Has your setup worked previously?&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;indicates you're using an unsecure way to permit connections, but I understand not everyone has the possibility/hability to deploy and mantain certificates in their environment for multiple reasons.&lt;/P&gt;
&lt;P&gt;Moving forward with your setup, what you are telling Windows is to authenticate with machine credentials when in the login page, and when the user is logged in, use the user credentials stored in Windows to connect. (Here the asumptiom from&amp;nbsp;Arne is not true about a change in user credentials, as windows always keep the latest ones so it always uses the good ones, but this is true that if the user blocks the account, they won't be able to join)&lt;/P&gt;
&lt;P&gt;The recommendation is that you use an internally signed certificate to be presented by ISE, and you validate it with the CA that signed it (this is cheaper than buying a public one), this way you can prevent non-corporate devices from joining the network, so securing it more.&lt;/P&gt;
&lt;P&gt;Regarding your ISE policies, you should split authentication policy for computers and for users, something like this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JPavonM_0-1726119896015.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228980i05A49426771680CE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JPavonM_0-1726119896015.png" alt="JPavonM_0-1726119896015.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And then also split authorizations for machine and user:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JPavonM_2-1726120032366.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228982i48D03FF95E111C73/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JPavonM_2-1726120032366.png" alt="JPavonM_2-1726120032366.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;As industry's best practice, consider moving formward to EAP-TLS with the same setup, but always validate certificates in both sides, and keep drivers and OS'es updated to latest releases/patches.&lt;/P&gt;
&lt;P&gt;By the way, in Win11 you would need to disable Credentials Guard so to allow them to use PEAP. (&lt;A href="https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/configure?tabs=reg#disable-credential-guard" target="_blank"&gt;https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/configure?tabs=reg#disable-credential-guard&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 05:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193520#M591801</guid>
      <dc:creator>JPavonM</dc:creator>
      <dc:date>2024-09-12T05:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: 5411 Supplicant stopped responding to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193883#M591814</link>
      <description>&lt;P&gt;Please try to run Wireshark capture on one of these affected machines and share the output for review.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 15:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193883#M591814</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-09-12T15:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: 5411 Supplicant stopped responding to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193890#M591815</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MateenAhmad_0-1726156038744.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229032i0575599C0A55BCB9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MateenAhmad_0-1726156038744.png" alt="MateenAhmad_0-1726156038744.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I am getting this error "Attempt to get credential key by call package blocked by Credential Gaurd"&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 15:48:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5193890#M591815</guid>
      <dc:creator>Mateen Ahmad</dc:creator>
      <dc:date>2024-09-12T15:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: 5411 Supplicant stopped responding to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5200973#M592081</link>
      <description>&lt;P&gt;See &lt;A href="https://cs.co/ise-berg#credential-guard" target="_blank"&gt;https://cs.co/ise-berg#credential-guard&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2024 15:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5200973#M592081</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-09-30T15:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: 5411 Supplicant stopped responding to ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5217372#M592831</link>
      <description>&lt;P&gt;After disabling credential gaurd also, machine authentication is failing. one more i am using your above authentication policy, in auth policy last line i am unable to find in ISE&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 12:38:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise/m-p/5217372#M592831</guid>
      <dc:creator>Mateen Ahmad</dc:creator>
      <dc:date>2024-10-30T12:38:32Z</dc:date>
    </item>
  </channel>
</rss>

