<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE – TEAP Authentication without Agent in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-teap-authentication-without-agent/m-p/5336522#M598440</link>
    <description>&lt;P&gt;So, we ran into a similar issue with RDP, and can tell you with I think it was Windows 8 and on, RDP is not treated as a user login, so it will only do machine auth. As such, your rules will not hit with the default windows authentication.&lt;/P&gt;&lt;P&gt;As for why it didn't work, it would depend on what your rules were. If you move to a restricted vlan or such then you will have issues with an IP change. Best is if you have a restricted vlan, star the device on it so it doesn't move vlans after authentication for RDP.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Oct 2025 13:31:03 GMT</pubDate>
    <dc:creator>Dustin Anderson</dc:creator>
    <dc:date>2025-10-07T13:31:03Z</dc:date>
    <item>
      <title>ISE – TEAP Authentication without Agent</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-teap-authentication-without-agent/m-p/5336299#M598430</link>
      <description>&lt;P data-start="0" data-end="22"&gt;Good morning, Experts,&lt;/P&gt;
&lt;P data-start="24" data-end="238"&gt;I’m currently working on implementing an &lt;STRONG data-start="65" data-end="72"&gt;ISE&lt;/STRONG&gt; deployment that will operate &lt;STRONG data-start="102" data-end="131"&gt;solely as a RADIUS server&lt;/STRONG&gt; for both &lt;STRONG data-start="141" data-end="157"&gt;WLAN and LAN&lt;/STRONG&gt; authentication. The authentication process must meet the following requirements:&lt;/P&gt;
&lt;UL data-start="240" data-end="823"&gt;
&lt;LI data-start="240" data-end="618"&gt;
&lt;P data-start="242" data-end="618"&gt;&lt;STRONG data-start="242" data-end="262"&gt;VLAN Assignment:&lt;/STRONG&gt;&lt;BR data-start="262" data-end="265" /&gt;The client is coming from a fully wired model (since Wi-Fi has been deemed unreliable due to several issues that are being addressed in the new implementation). Therefore, Active Directory groups have been created so that, depending on the group a user belongs to, the corresponding VLAN is assigned &lt;STRONG data-start="567" data-end="617"&gt;regardless of the connection medium (LAN/WLAN)&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="620" data-end="823"&gt;
&lt;P data-start="622" data-end="823"&gt;&lt;STRONG data-start="622" data-end="648"&gt;Secure Authentication:&lt;/STRONG&gt;&lt;BR data-start="648" data-end="651" /&gt;To enhance authentication security, we proposed using &lt;STRONG data-start="707" data-end="771"&gt;certificate-based chained authentication with TEAP (EAP-TLS)&lt;/STRONG&gt;, validating both &lt;STRONG data-start="789" data-end="822"&gt;user and machine certificates&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="825" data-end="1048"&gt;At the moment, I have a few doubts regarding the system’s behavior — some things are working but not in a way that aligns with the theory, and others aren’t working at all (though I’m not sure if they’re actually required).&lt;/P&gt;
&lt;P data-start="1050" data-end="1188"&gt;Due to legal restrictions, I can’t share configuration screenshots, so I’ll describe everything as clearly as possible using [ ] notation.&lt;/P&gt;
&lt;HR data-start="1190" data-end="1193" /&gt;
&lt;H3 data-start="1195" data-end="1224"&gt;&lt;STRONG data-start="1199" data-end="1224"&gt;Authentication Policy&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL data-start="1225" data-end="1292"&gt;
&lt;LI data-start="1225" data-end="1292"&gt;
&lt;P data-start="1227" data-end="1292"&gt;This section is standard — validating certificates + AD sequence.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 data-start="1294" data-end="1322"&gt;&lt;STRONG data-start="1298" data-end="1322"&gt;Authorization Policy&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL data-start="1323" data-end="1701"&gt;
&lt;LI data-start="1323" data-end="1451"&gt;
&lt;P data-start="1325" data-end="1451"&gt;[Technology] [(Member of “Technology” AD group) &lt;STRONG data-start="1373" data-end="1380"&gt;AND&lt;/STRONG&gt; (Both user and machine authentication succeeded)] → [Assign VLAN 10]&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1452" data-end="1582"&gt;
&lt;P data-start="1454" data-end="1582"&gt;[Development] [(Member of “Development” AD group) &lt;STRONG data-start="1504" data-end="1511"&gt;AND&lt;/STRONG&gt; (Both user and machine authentication succeeded)] → [Assign VLAN 11]&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1583" data-end="1701"&gt;
&lt;P data-start="1585" data-end="1701"&gt;[Sales] [(Member of “Sales” AD group) &lt;STRONG data-start="1623" data-end="1630"&gt;AND&lt;/STRONG&gt; (Both user and machine authentication succeeded)] → [Assign VLAN 12]&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1703" data-end="1758"&gt;&lt;EM data-start="1703" data-end="1758"&gt;If none of the above conditions are met, deny access.&lt;/EM&gt;&lt;/P&gt;
&lt;HR data-start="1760" data-end="1763" /&gt;
&lt;H3 data-start="1765" data-end="1783"&gt;&lt;STRONG data-start="1769" data-end="1783"&gt;Questions:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;OL data-start="1785" data-end="2626" data-is-last-node="" data-is-only-node=""&gt;
&lt;LI data-start="1785" data-end="2350"&gt;
&lt;P data-start="1788" data-end="2350"&gt;Documentation indicates that an authorization policy must exist to allow &lt;STRONG data-start="1861" data-end="1892"&gt;machine-only authentication&lt;/STRONG&gt; (for example, when user authentication fails but the machine is successfully authenticated).&lt;BR data-start="1985" data-end="1988" /&gt;However, when I add this policy, machines authenticate but do not get assigned to any VLAN, resulting in no IP address — they remain stuck in that state.&lt;BR data-start="2144" data-end="2147" /&gt;When I remove that policy, user authentication works properly, and I can see both &lt;STRONG data-start="2232" data-end="2265"&gt;user and machine certificates&lt;/STRONG&gt; in the logs.&lt;BR data-start="2278" data-end="2281" /&gt;→ Is it redundant to include that machine-only authorization rule?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2352" data-end="2626" data-is-last-node=""&gt;
&lt;P data-start="2355" data-end="2626" data-is-last-node=""&gt;I understand that &lt;STRONG data-start="2373" data-end="2426"&gt;ISE uses the RADIUS CoA (Change of Authorization)&lt;/STRONG&gt; extension to trigger VLAN changes. However, when checking the communication between ISE and the switches/APs, I don’t see any traffic on &lt;STRONG data-start="2564" data-end="2581"&gt;UDP port 1700&lt;/STRONG&gt;.&lt;BR data-start="2582" data-end="2585" /&gt;→ What could be causing this behavior?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2352" data-end="2626" data-is-last-node=""&gt;
&lt;P data-start="2355" data-end="2626" data-is-last-node=""&gt;The IT group connects remotely to office PCs via RDP, and I’ve observed that when I enable the &lt;STRONG data-start="98" data-end="128"&gt;machine-only authorization&lt;/STRONG&gt; policy this stops working — but if I remove that policy, RDP works without issue. I understand that the recommended approach for this scenario is to use the &lt;STRONG data-start="286" data-end="318"&gt;Network Access Manager (NAM)&lt;/STRONG&gt; agent, but initially I would like to understand &lt;STRONG data-start="367" data-end="374"&gt;why&lt;/STRONG&gt; this behavior occurs.&lt;/P&gt;
&lt;ARTICLE class="text-token-text-primary w-full focus:outline-none scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id="68480d5d-1ddf-46f9-a746-004a9b86cfe8" data-testid="conversation-turn-8" data-scroll-anchor="true" data-turn="assistant"&gt;
&lt;DIV class="text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] thread-sm:[--thread-content-margin:--spacing(6)] thread-lg:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)"&gt;
&lt;DIV class="[--thread-content-max-width:40rem] thread-lg:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn" tabindex="-1"&gt;
&lt;DIV class="flex max-w-full flex-col grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-5" dir="auto" data-message-author-role="assistant" data-message-id="1c9ff240-0536-476b-92f5-1c76fc3150b3" data-message-model-slug="gpt-5-t-mini"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden first:pt-[3px]"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full break-words dark markdown-new-styling"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="z-0 flex min-h-[46px] justify-start"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="z-0 flex min-h-[46px] justify-start"&gt;I’d like to thank everyone in advance for any guidance or insight you can provide.&lt;/DIV&gt;
&lt;DIV class="mt-3 w-full empty:hidden"&gt;
&lt;DIV class="text-center"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;
&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Mon, 06 Oct 2025 19:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-teap-authentication-without-agent/m-p/5336299#M598430</guid>
      <dc:creator>camilosilva</dc:creator>
      <dc:date>2025-10-06T19:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE – TEAP Authentication without Agent</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-teap-authentication-without-agent/m-p/5336516#M598439</link>
      <description>&lt;P&gt;Greetings&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1362446"&gt;@camilosilva&lt;/a&gt;&amp;nbsp;, below my thoughts related to your post:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.- Given the environment and scenario you are providing the answer is yes, the policy for machine only auth is something redundant.&lt;/P&gt;
&lt;P&gt;The TEAP/eap chaining is going to depend here mostly in how your supplicant is handling the authentication, in some scenarios the supplicant is going to send credentials for machine authentication first or in a similar way in which you mention it where both machine and user authentication happens simultaneously, that is the reason a policy for machine only with certain level of access is suggested so the following authentication for the user can occur to complete the chaining.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.- Related to that question, the CoA can be generated not only during a eap chaining flow but for other flows such as profiling/posture and so on, so I would review if CoA traffic is generated&amp;nbsp; first through livelogs/captures from ISE , if traffic CoA from ISE is triggered there but you don't see changes on the radius sessions on NAD, it can be some other problem related to configuration/communication on UDP 1700.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. To provide you some understanding of that particular flow , this may require some analysis of the scenario you are facing alongside logs and your configurations, I would encourage you to open a TAC ticket for this one .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please rate and comment if that helps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Oct 2025 13:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-teap-authentication-without-agent/m-p/5336516#M598439</guid>
      <dc:creator>Rodrigo Diaz</dc:creator>
      <dc:date>2025-10-07T13:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE – TEAP Authentication without Agent</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-teap-authentication-without-agent/m-p/5336522#M598440</link>
      <description>&lt;P&gt;So, we ran into a similar issue with RDP, and can tell you with I think it was Windows 8 and on, RDP is not treated as a user login, so it will only do machine auth. As such, your rules will not hit with the default windows authentication.&lt;/P&gt;&lt;P&gt;As for why it didn't work, it would depend on what your rules were. If you move to a restricted vlan or such then you will have issues with an IP change. Best is if you have a restricted vlan, star the device on it so it doesn't move vlans after authentication for RDP.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Oct 2025 13:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-teap-authentication-without-agent/m-p/5336522#M598440</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2025-10-07T13:31:03Z</dc:date>
    </item>
  </channel>
</rss>

