<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Secure access configuration for the ethernet failed in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5228217#M593331</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to configure wired BYOD dot1x onboarding.&lt;/P&gt;&lt;P&gt;However, when the client downloads and starta Network Setup Assistant, I always get the sam error: "Secure access configuration for the ethernet failed".&lt;/P&gt;&lt;P&gt;Did anyone experienced the sam issus and how did you solve it?&lt;/P&gt;&lt;P&gt;I am using ISE 3.0 with WinSPWizard 3.0.0.2. The client is Win 11 with admin rights.&lt;/P&gt;</description>
    <pubDate>Sun, 24 Nov 2024 21:50:15 GMT</pubDate>
    <dc:creator>iores</dc:creator>
    <dc:date>2024-11-24T21:50:15Z</dc:date>
    <item>
      <title>Secure access configuration for the ethernet failed</title>
      <link>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5228217#M593331</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to configure wired BYOD dot1x onboarding.&lt;/P&gt;&lt;P&gt;However, when the client downloads and starta Network Setup Assistant, I always get the sam error: "Secure access configuration for the ethernet failed".&lt;/P&gt;&lt;P&gt;Did anyone experienced the sam issus and how did you solve it?&lt;/P&gt;&lt;P&gt;I am using ISE 3.0 with WinSPWizard 3.0.0.2. The client is Win 11 with admin rights.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Nov 2024 21:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5228217#M593331</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2024-11-24T21:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: Secure access configuration for the ethernet failed</title>
      <link>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5229212#M593370</link>
      <description>&lt;P&gt;Not sure of that old version of ISE - it's best to at least patch ISE 3.0 or upgrade to 3.3 latest patch, and then try again. What does TAC say about this?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 20:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5229212#M593370</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-26T20:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: Secure access configuration for the ethernet failed</title>
      <link>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5230217#M593432</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;Did not contact TAC yet. Could it be done with AnyConnect instead of WinSPWizard? I want client to get the certificate from ISE CA, and then to perform EAP TLS.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 18:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5230217#M593432</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2024-11-28T18:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: Secure access configuration for the ethernet failed</title>
      <link>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5230238#M593437</link>
      <description>&lt;P&gt;I don't see a lot of BYOD in my customer base, and I don't personally use it, or have much time/desire to play with this in the lab. It's always been fiddly and troublesome when new OSs are released. I think it's wise to upgrade the ISE to something more recent than 3.0 because you can't keep track of all the bugs and enhancement - best to aim higher and then work with the remaining issues that come up.&lt;/P&gt;
&lt;P&gt;If you just have a single endpoint (or a few endpoints) then you could onboard them using the Self Provisioning Portal. But the user must have access to the ISE GUI. Users can login to the web interface of the Self Provisioning Portal with their AD creds, and then ISE will generate them a certificate they can download and install manually, along with the ISE CA certs. For remote users, they could probably enrol themselves while they are on the VPN.&amp;nbsp; As far as using AnyConnect to onboard into ISE, that's not supported or possible, as far as I know.&amp;nbsp; The other method would be to use an MDM instead of ISE.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 20:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5230238#M593437</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-28T20:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Secure access configuration for the ethernet failed</title>
      <link>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5230819#M593483</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;For certificate enrollments, do you mean the certificate provisioning portal where the client needs to enter all relevant certificate fields (CN...) or you had something else on your mind?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Nov 2024 13:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5230819#M593483</guid>
      <dc:creator>iores</dc:creator>
      <dc:date>2024-11-30T13:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: Secure access configuration for the ethernet failed</title>
      <link>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5231085#M593497</link>
      <description>&lt;P&gt;Yep that was my thinking - You don't have a lot of control over the cert creation, other than CN and MAC address. ISE will force the user to enter the same value in the CN that matches the username they used to login to the portal - so the user can't create arbitrary CNs.&amp;nbsp; But the MAC address is somewhat open - but even if it's garbage, you don't need to look at the SAN of that cert (that's where the MAC address ends up in)&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2024 01:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/secure-access-configuration-for-the-ethernet-failed/m-p/5231085#M593497</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-12-02T01:11:31Z</dc:date>
    </item>
  </channel>
</rss>

