<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User and Machine Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308324#M597228</link>
    <description>&lt;P&gt;Hello Rob,&lt;/P&gt;
&lt;P&gt;Thanks for the help as always, but i was trying to doit with MAR using PEAP aparently so ill try with TEAP one question do a need a user CERT for it?&lt;/P&gt;
&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jul 2025 13:43:42 GMT</pubDate>
    <dc:creator>vivarock12</dc:creator>
    <dc:date>2025-07-11T13:43:42Z</dc:date>
    <item>
      <title>User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308040#M597219</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;Am having troubles getting my WIFI to work with machine authentication and user authentication i keept trying to reauthenticate every time im not really sure why it doing it at the machine authentication part, but it get that correct.&lt;/P&gt;
&lt;P&gt;this is whats happening:&lt;BR /&gt;i created a new SSID on a classic WLC to do the test:&lt;/P&gt;
&lt;P&gt;this is the SSID configuration:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_0-1752185163595.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248031iB281BCA580367D10/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_0-1752185163595.png" alt="vivarock12_0-1752185163595.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_1-1752185202316.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248032i889BD181ACC88946/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_1-1752185202316.png" alt="vivarock12_1-1752185202316.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_2-1752185228818.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248033i9385704C7D6C0B47/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_2-1752185228818.png" alt="vivarock12_2-1752185228818.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_3-1752185253120.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248034iE7C0E5064F88385E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_3-1752185253120.png" alt="vivarock12_3-1752185253120.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;the AP SW port config&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_4-1752185353976.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248035iD71BFE0F9C1BBED6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_4-1752185353976.png" alt="vivarock12_4-1752185353976.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;im using the same VLAN for users and management, for the testing.&lt;/P&gt;
&lt;P&gt;This is the configturation of the ISE&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_5-1752186022741.png" style="width: 550px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248036i5DCFA51B81ECB5B6/image-dimensions/550x55?v=v2" width="550" height="55" role="button" title="vivarock12_5-1752186022741.png" alt="vivarock12_5-1752186022741.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_1-1752189203293.png" style="width: 832px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248040i5C31DB471DA7CE55/image-dimensions/832x92?v=v2" width="832" height="92" role="button" title="vivarock12_1-1752189203293.png" alt="vivarock12_1-1752189203293.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;the thing is the machine auhthentication and users logs like it work but it wont assing the user its IP ADDRESS.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_2-1752189321445.png" style="width: 903px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248041i44B64901725E5823/image-dimensions/903x261?v=v2" width="903" height="261" role="button" title="vivarock12_2-1752189321445.png" alt="vivarock12_2-1752189321445.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;i try the same policy just with the ssid in other ruel and it worked like a charm&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_3-1752189387970.png" style="width: 887px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248044iF6329E66444F7A4D/image-dimensions/887x56?v=v2" width="887" height="56" role="button" title="vivarock12_3-1752189387970.png" alt="vivarock12_3-1752189387970.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;any idea what it migth be the problem?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 23:16:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308040#M597219</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-07-10T23:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308145#M597221</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/340529"&gt;@vivarock12&lt;/a&gt;&amp;nbsp;are you using EAP Chaining (EAP-FAST or TEAP) or using &lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/116516-problemsolution-technology-00.html" target="_self"&gt;MAR&lt;/A&gt;&amp;nbsp;(no one recommends using MAR anyway)? If not using using EAP Chaining "Network Access WasMachineAuthenticated" will not work.&lt;/P&gt;
&lt;P&gt;I would recommend using TEAP over EAP-FAST&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 06:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308145#M597221</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-11T06:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308222#M597223</link>
      <description>&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 10:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308222#M597223</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-16T10:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308228#M597224</link>
      <description>&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 10:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308228#M597224</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-16T10:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308324#M597228</link>
      <description>&lt;P&gt;Hello Rob,&lt;/P&gt;
&lt;P&gt;Thanks for the help as always, but i was trying to doit with MAR using PEAP aparently so ill try with TEAP one question do a need a user CERT for it?&lt;/P&gt;
&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 13:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308324#M597228</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-07-11T13:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308325#M597229</link>
      <description>&lt;P&gt;i was using WPA2 so do you recommend to use wpa3?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 13:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308325#M597229</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-07-11T13:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308326#M597230</link>
      <description>&lt;P&gt;Hmm&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is wireless cases&lt;/P&gt;
&lt;P&gt;Some wifi client support wpa3 abd other support wpa2' I will check the mix mode (using both in single SSID)&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 13:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308326#M597230</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-11T13:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308329#M597231</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/340529"&gt;@vivarock12&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If using WPA2 enterprise then that implies you are using PEAP/MSCHAPv2 or EAP-TLS and in both instances certificates are used. PEAP/MSCHAPv2 validates the server ceritificate (ISE's EAP certificate) and EAP-TLS validates the client and server certificate.&lt;/P&gt;
&lt;P&gt;If you want to use TEAP, then you can mix and match PEAP/MSCHAPv2 and EAP-TLS for user and machine authentication, TEAP will just combine the authentications together. So you could use certificate authentication for computer and PEAP/MSCHAPv2 for user, or use certificate for user aswell - you'd obviously have to distribute user certificates.&lt;/P&gt;
&lt;P&gt;You do not need to use WPA3, EAP Chaining will work with WPA2 enterprise.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 13:58:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5308329#M597231</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-11T13:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5309756#M597280</link>
      <description>&lt;P&gt;Guys sorry for the late reply, the TEAP solution worked but we have a problem now there using anyconnect with NAM im trying to generate a nam profile a wifi to use EAP-fast or TTLS using only MS-chap as authentication fo the machine and for the user but idid a TCP dump on the ISE but not getting any information from the "loggin that the Anyconnect is supposed to be doing" i dont&amp;nbsp; know if you guys have fund the same trouble with anyconnect?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;investigating i foundso recommendation to use TEAP without NAM because it wasnt working ethier but i dont know if they (client) would be able to disable the NAM. on the PCs.&lt;/P&gt;
&lt;P&gt;investigating i ended up with the followinf that you need to do a register&amp;nbsp;&lt;STRONG&gt;LsaAllowReturningUnencryptedSecrets&lt;/STRONG&gt;, for eap-fast to work and&amp;nbsp;&lt;/P&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;Microsoft support has informed that making this change will effectively make a hole in protecting the credentials.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Stated, :"kindly be informed that create and change registry key LsaAllowReturningUnencryptedSecrets to 1 will opens a hole in credential protection to allow application compatibility so applications (and yes attackers) can extract device secrets in clear text. This behavior is by design and improves protection of the LSA secret. Therefore we need to make it clear that they are opening a credential theft vector. Organizations concerned about credential theft attacks also known as pass-the-hash attacks, should understand that deploying this registry key makes it easy for attackers to steal the domain-joined device's clear-text password. "&lt;/P&gt;
&lt;P&gt;this is in a LINK&amp;nbsp;&lt;A href="https://community.cisco.com/t5/vpn/windows-10-machine-authentication-with-anyconnect-nam/td-p/3462166" target="_blank"&gt;https://community.cisco.com/t5/vpn/windows-10-machine-authentication-with-anyconnect-nam/td-p/3462166&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;so is it true?&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 15 Jul 2025 22:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5309756#M597280</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-07-15T22:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5309771#M597285</link>
      <description>&lt;P&gt;Yes, that is true but the same could be said of using MSCHAPv2 as it uses NTLMv1 which is just as vulnerable to pass-the-hash attacks.&lt;/P&gt;
&lt;P&gt;Credential Guard is enabled by default on newer versions of Windows 11 and must be disabled to use MSCHAPv2.&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/considerations-known-issues" target="_blank"&gt;https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/considerations-known-issues&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you're concerned about credential theft attacks, you should be using non-credential based authentication methods like EAP-TLS (as an inner or outer method). Microsoft has the same recommendation as stated in the link above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 22:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5309771#M597285</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-07-15T22:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5309773#M597286</link>
      <description>&lt;P&gt;so&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;the recomendation or best practice would be to use TEAP or EAP-FAST with certificates rigth?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2025 22:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5309773#M597286</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-07-15T22:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5309860#M597290</link>
      <description>&lt;P&gt;Yes, you would need to use certificate-based authentication.&lt;/P&gt;
&lt;P&gt;If you want to use EAP Chaining, you would need to use TEAP(EAP-TLS) [with the Windows native supplicant] or EAP-FAST(EAP-TLS) [with NAM]&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 04:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5309860#M597290</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-07-16T04:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5310053#M597296</link>
      <description>&lt;P&gt;&lt;STRONG&gt;this is TEAP Authc method&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-08-23_08-47-02.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248423i30BC67932DA3A61E/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-08-23_08-47-02.png" alt="2024-08-23_08-47-02.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;TEAP use two Auth&lt;BR /&gt;outer tunnel Authc use ISE cert only to authc&amp;nbsp;&lt;BR /&gt;inner authc use&amp;nbsp;&lt;BR /&gt;A- EAP-TLS (machine AND/OR user cert)&lt;BR /&gt;B-EAP-MSCHAPv2 (username/password)&lt;BR /&gt;&lt;BR /&gt;the config ot TEAP for both TEAP(EAP-TLS) and TEAP(EAP-MSCHAPv2) is same in WLC select WAP2 or WPA3 enterprise with 802.1x&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;in ISE the differnt come&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;allow protocol&lt;BR /&gt;you need to allow EAP-MSCHAPv2 AND/OR EAP-TLS&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (282).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248425iB20E0BA6C64A59F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (282).png" alt="Screenshot (282).png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Authz policy&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;You need differnt authz policy&amp;nbsp;&lt;BR /&gt;one for machine and user cert authc successed&amp;nbsp; (chain)&lt;BR /&gt;other for user cert authc successed&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (280).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248426iF9FE44D248FDCED4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (280).png" alt="Screenshot (280).png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 10:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5310053#M597296</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-16T10:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5314296#M597472</link>
      <description>&lt;P&gt;ok guys now im trying to doit with AEP-tls directly with the wired connection it work like a charm with out a trouble, but when im doing the same on the NAM its giving me 2 troubles if i try to select the Wireless network directly it gives me the following trouble:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_0-1753481190746.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/249226iD1845E3E3F92DD63/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_0-1753481190746.jpeg" alt="vivarock12_0-1753481190746.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;i creted a NAM profile wuth the test network for the wifi ad is giving me the follogin trouble:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_1-1753481238411.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/249227iB692995D8952DDAE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_1-1753481238411.jpeg" alt="vivarock12_1-1753481238411.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;it gets stuck on associating&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i did a network capture on the ise and the thing of im not seeing any request on it.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_2-1753481346586.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/249228i80E3E1AB65237DFC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_2-1753481346586.png" alt="vivarock12_2-1753481346586.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;im working in a ISE3.1 with trial version.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;so any idea on why im havving this trouible?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 22:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5314296#M597472</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-07-25T22:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5314300#M597473</link>
      <description>&lt;P&gt;Can I see live log of ISE when wifi client with NAM failed&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 22:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5314300#M597473</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-25T22:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5314301#M597474</link>
      <description>&lt;P&gt;that the trouble i dont see anything on the ISE and i did a packet capture but i dont see any trouble on the ISE etheir. so is there and thing that can be done? or any idea?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 23:15:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5314301#M597474</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2025-07-25T23:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: User and Machine Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5314383#M597475</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/cloud-systems-management/prime-nam-2440-appliance/221954-configure-secure-client-nam-for-dot1x-us.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/cloud-systems-management/prime-nam-2440-appliance/221954-configure-secure-client-nam-for-dot1x-us.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Follow guide to config Nam for eap-tls&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jul 2025 12:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-and-machine-authentication/m-p/5314383#M597475</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-26T12:14:31Z</dc:date>
    </item>
  </channel>
</rss>

