<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic EAP-TLS Fall back in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326054#M598008</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We plan to migrate ISE Authentication from PEAP to EAP‑TLS and want the transition to be as smooth as possible. I would like to know if it is feasible to configure EAP‑TLS as the primary authentication method with PEAP as a fallback, and if so, how this can be implemented?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 01 Sep 2025 07:25:54 GMT</pubDate>
    <dc:creator>henokk60</dc:creator>
    <dc:date>2025-09-01T07:25:54Z</dc:date>
    <item>
      <title>EAP-TLS Fall back</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326054#M598008</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We plan to migrate ISE Authentication from PEAP to EAP‑TLS and want the transition to be as smooth as possible. I would like to know if it is feasible to configure EAP‑TLS as the primary authentication method with PEAP as a fallback, and if so, how this can be implemented?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2025 07:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326054#M598008</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-09-01T07:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Fall back</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326063#M598009</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1753581"&gt;@henokk60&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We plan to migrate ISE Authentication from PEAP to EAP‑TLS and want the transition to be as smooth as possible. I would like to know if it is feasible to configure EAP‑TLS as the primary authentication method with PEAP as a fallback, and if so, how this can be implemented?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes, it's feasible using multiple authentication policies in Cisco ISE. You can configure EAP-TLS as the primary method and set a secondary policy for PEAP fallback. Ensure your Allowed Protocols list includes both methods, and use identity source sequences to prioritize certificate-based auth while allowing AD fallback for PEAP.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;Shana Brush&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2025 07:58:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326063#M598009</guid>
      <dc:creator>shana598brush</dc:creator>
      <dc:date>2025-09-01T07:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Fall back</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326150#M598010</link>
      <description>&lt;P&gt;Can I see ISE policy of PEAP?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2025 11:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326150#M598010</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-01T11:45:36Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Fall back</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326213#M598013</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1753581"&gt;@henokk60&lt;/a&gt;&amp;nbsp; the native windows supplicant doesn't support fallover, Cisco NAM should if you have multiple profiles and define an order. If your supplicant doesn't support fallover then you'd have to rely on MAB for fallback.&lt;/P&gt;
&lt;P&gt;Cisco ISE will authenticate using any protocol offered by the client as long as it's defined in the allowed protocols list.&lt;/P&gt;
&lt;P&gt;In an ISE deployment typically you deploy Monitor Mode first, which still permits network access if authentication fails. During this phase you monitor the authentication lgos and rectify any authentication issues for devices failing to authenticate, only then do you proceed to low-impact or closed mode.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2025 15:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326213#M598013</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-09-01T15:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Fall back</title>
      <link>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326266#M598014</link>
      <description>&lt;P&gt;PEAP have two inner authc&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One is MSCHAPv3 and other is EAP-TLS&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can only enable eap-tls under peap in allow protocol and do some change in authc policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This make both user (peap mschapv3 and peap eap-tls) to authc&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 02 Sep 2025 15:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/eap-tls-fall-back/m-p/5326266#M598014</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-02T15:45:00Z</dc:date>
    </item>
  </channel>
</rss>

