<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wireless NAC via Azure ISE using ON-Prem PKI in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259460#M594914</link>
    <description>&lt;P&gt;If you are using EAP-TLS and only authenticating and authorising the session based on the certificate (not performing checks against any external identity store), then you would be limited to the information provided to ISE in the certificate.&lt;/P&gt;
&lt;P&gt;Ideally, you would want to use matching conditions in the AuthC/AuthZ policies that match on unique attributes in the certificate. These could include the Issuer CN, Subject OU, etc, and would depend on how you have defined your certificate templates and profiles.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2025 00:33:05 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2025-02-12T00:33:05Z</dc:date>
    <item>
      <title>Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5232618#M593584</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp; - Hi I looked at your article its very helpful.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/cisco-ise-with-microsoft-active-directory-entra-id-and-intune/ta-p/4763635&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to do NAC on wireless via ISE in Azure using on-prem PKI which will enroll windows machines in Intune. I am going to use certificate connector for On-prem PKI. I read it doesn't support ISE essentials and I need ISE advantage as a minimum. Can you advise which license will be suitable - ISE Essentials, advantage or Premier. I can't see this clearly from Cisco ISE Licensing guide.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't intend to use compliance based auth, I only intend to use cert-based auth. So for this do I need ISE advantage or Premier?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 21:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5232618#M593584</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2024-12-04T21:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5232648#M593585</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;I read it doesn't support ISE essentials and I need ISE advantage as a minimum"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Where did you read this?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The certificate enrolment happens outside of any control by ISE. If you only plan to use the enrolled certificates to authenticate the Users/Devices via EAP-TLS (and no other features such as Profiling, MDM, etc), this falls under the '&lt;STRONG&gt;AAA and 802.1X'&amp;nbsp;&lt;/STRONG&gt;use case covered by the Essentials licenses.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 22:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5232648#M593585</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-12-04T22:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5232681#M593588</link>
      <description>&lt;P&gt;Ok thank you very much&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2024 09:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5232681#M593588</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2024-12-05T09:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5233147#M593619</link>
      <description>&lt;P&gt;Lastly can I ask in the above context what best can I do for mac-os which are enrolled in Jamf pro (not many).&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2024 22:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5233147#M593619</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2024-12-05T22:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5235106#M593686</link>
      <description>&lt;P&gt;The same approach would generally be taken. Integrate Jamf Pro with your PKI, enroll certificates on the MacOS endpoints, and authenticate them via EAP-TLS.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 21:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5235106#M593686</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-12-10T21:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5246911#M594200</link>
      <description>&lt;P&gt;Hi - I am doing a POC for this using on-prem PKI. My ISE is stood up in azure now. Can you advise what are the key elements that I should be configuring? if there is any article you know on this please share.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2025 12:10:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5246911#M594200</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-01-14T12:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259169#M594904</link>
      <description>&lt;P&gt;Hi - I just wanted to check Since I am not doing and ISE integration with Intune/Entra ID and I can't use GUID in ISE polices to match for auth as there are thousands of machines. What do you advise to match against - something like issuer CN would make sense? This way anything presented by the CA server to the machines will be authenticated by ISE. I just need to define CA server in ISE's external CA settings. You think its workable?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 15:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259169#M594904</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-02-11T15:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259460#M594914</link>
      <description>&lt;P&gt;If you are using EAP-TLS and only authenticating and authorising the session based on the certificate (not performing checks against any external identity store), then you would be limited to the information provided to ISE in the certificate.&lt;/P&gt;
&lt;P&gt;Ideally, you would want to use matching conditions in the AuthC/AuthZ policies that match on unique attributes in the certificate. These could include the Issuer CN, Subject OU, etc, and would depend on how you have defined your certificate templates and profiles.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 00:33:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259460#M594914</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-02-12T00:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259609#M594926</link>
      <description>&lt;P&gt;Yes that's exactly what I am looking to do because I only wish to do NAC policies using cert fields or issuer etc as I have ISE essentials (can't upgrade to higher license due to costs) so I don't think I have more options available, because if I want to do any checks against external Identity store I will need higher license than ISE, right?. Do you believe this is still a workable basic level NAC? please see your first comment in this post which is exactly what I am doing.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 21:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259609#M594926</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-02-12T21:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259905#M594956</link>
      <description>&lt;P&gt;Performing checks against external Identity Stores (AD, Entra ID User AuthZ, etc) are part of the&amp;nbsp;&lt;SPAN&gt;'&lt;/SPAN&gt;&lt;STRONG&gt;AAA and 802.1X'&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;use case covered by the Essentials licenses.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 22:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5259905#M594956</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-02-12T22:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5262164#M595055</link>
      <description>&lt;P&gt;Many Thanks, it works when I allow EAP-TLS in AuthC/Z policies and enter CN=GUID in the conditions. But this is when I enter a GUID manually in the policy under conditions of AuthC/Z. I also see&amp;nbsp; the logs "Found Endpoint in Internal Endpoints IDStore" against that particular CN/GUID of single machine. But if I want to check for all thousands of machines, what can I do. I did refer to your article&amp;nbsp;&lt;STRONG&gt;Cisco ISE with Microsoft Active Directory, Entra ID&lt;/STRONG&gt;, and Intune&amp;nbsp;but&amp;nbsp;I cannot find how to check against entra with ISE essentials. Do I select issuer instead of Certificate CN? I cannot create auth profile in ext identity because entra doesn have domain controller. Unless I enter CN/GUID manually in authC/Z policies of every single machine I don't know how I can check against ID store Entra. Any Idea?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2025 20:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5262164#M595055</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-02-18T20:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5262174#M595056</link>
      <description>&lt;P&gt;The UPN is used to check Identity against Entra ID. The GUID is used to check Registration/Compliance against Intune.&lt;BR /&gt;These are two separate functions that use different API calls.&lt;/P&gt;
&lt;P&gt;As clearly stated in the blog that you referenced:&lt;BR /&gt;&lt;EM&gt;"As the Intune Registration and/or Compliance lookups are functions of the MDM Compliance feature in ISE, any sessions using these conditions will require a &lt;STRONG&gt;Premier&lt;/STRONG&gt; license as per the&amp;nbsp;&lt;A href="https://cs.co/ise-licensing" target="_blank" rel="noopener nofollow noreferrer"&gt;Cisco ISE Licensing Guide&lt;/A&gt;."&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2025 21:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5262174#M595056</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-02-18T21:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5262218#M595058</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I am using '&lt;/SPAN&gt;&lt;STRONG&gt;AAA and 802.1X'&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;use case covered by the Essentials licenses. Can I use UPN in this case?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;because I am receiving machine certificate&amp;nbsp;and it has GUID/Intune device ID in the subject field of the machine certificate.&amp;nbsp; I am using on-prem pki which is integrated with certificate connector. Do I need to tell On-prem PKI to issue UPN in the subject field of the machine certificate instead of GUID?&lt;/P&gt;&lt;P&gt;or a UPN can only be issued to a user certificate and not device certificate? because I am using device certificate, what can I match now?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2025 23:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5262218#M595058</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-02-18T23:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5266778#M595299</link>
      <description>&lt;P&gt;I am using a machine certificate and ISE is only validating based on the certificate that is presented to it. I am using issuer CN. its all working fine, but its also authenticating REVOKED machine certificates. I checked the comms between ISE and OCSP server is not working. You think&amp;nbsp; fixing this comms would block revoked cert and allow valid certs.&lt;/P&gt;&lt;P&gt;Also, do we need to enter OCSP public or private URL in the OCSP profile configured in ISE. (I have checked in UNKNOWN and Unreachable btw)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: because we are using machine certs we are not checking against external identity (with entra in our case). I hope this is not linked with above scenario?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 14:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5266778#M595299</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-03-03T14:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5266969#M595307</link>
      <description>&lt;P&gt;If you have configured CRL and/or OCSP settings in your Root or Intermediate trusted certificates, and ISE can reach those services, it will perform a revocation check during the Authentication process.&lt;/P&gt;
&lt;P&gt;Public vs. Private URL is entirely dependent on your environment and how ISE would communicate with that service. These comms would also be impacted by any proxy configured, so you may need to add those FQDNs to the 'bypass' list in the ISE proxy settings.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 23:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5266969#M595307</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-03-03T23:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless NAC via Azure ISE using ON-Prem PKI</title>
      <link>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5270074#M595433</link>
      <description>&lt;P&gt;My POC has worked but when I did some pilot sites on the on prem ISE I am having two issues.&lt;/P&gt;&lt;P&gt;1. When I uploaded and binded the server certificate (from onpre PKI)&amp;nbsp; for eap authentication. the existing eap authentication got moved here. The Win11 machines worked on the existing corp ssid but win10 didn't. I got an error saying ise is not trusting client certificate being presented. I disabled my new nac ssid policy yet the corp ssid won't work for win10 but works for win11. The Win11 are on Intune and Win10 is by AD. But I see server certificate on both win10 and win 11 in trusted and intermediate store on both the machines. Not sure how can I seamslessly implement it without causing an outage.&lt;/P&gt;&lt;P&gt;2. I am thinking I will rollout the machine certs to no just pilots but all win10 in the estate but this way it poses risk of multiple incidents. But I believe regardless if its win10 or win11 if its issued with a new machine cert from PKI/cert connector the machines will continue to connect on the existing corp ssid regardless if it works on new nac enalbed ssid or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. a quick question on the ISE policy - I am placing the new nac ssid at the top in the policy table using nas id in the wlc and also in ise policy along with radius wireless 802.1x to make sure existing corp ssid traffic doesn't hit this policy and isn't affected is this right approach?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2025 19:05:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/wireless-nac-via-azure-ise-using-on-prem-pki/m-p/5270074#M595433</guid>
      <dc:creator>shujath-syed</dc:creator>
      <dc:date>2025-03-11T19:05:43Z</dc:date>
    </item>
  </channel>
</rss>

