<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE PEAP to TEAP Auth Policy Set in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346119#M598914</link>
    <description>&lt;P&gt;Hi. What options have you set for the authentication policies - see below&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise auth options.png" style="width: 236px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/255009iAA821486A5F096F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise auth options.png" alt="ise auth options.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Tue, 11 Nov 2025 13:44:15 GMT</pubDate>
    <dc:creator>andrewswanson</dc:creator>
    <dc:date>2025-11-11T13:44:15Z</dc:date>
    <item>
      <title>Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346019#M598883</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;We want to transition from PEAP authentication to TEAP authentication for wireless users, and since we're rolling it out department by department in a phased approach, I want to have both policies active. For example, on Monday, I will begin the rollout in the IT and HR departments, transitioning from PEAP to TEAP.&lt;/P&gt;&lt;P&gt;In the Authentication Policy section of the policy set, I have used &lt;STRONG&gt;Network Access - EAP Tunnel Equals TEAP&lt;/STRONG&gt;, but this policy isn’t being hit when I place TEAP in the second order. When I make it first in the order, the PEAP policy stops being hit, even after I tried changing the order. What could be the reason for this?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 08:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346019#M598883</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-11-11T08:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346028#M598887</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1753581"&gt;@henokk60&lt;/a&gt;&amp;nbsp;please provide a screenshot of your policy set and authentication policy and the live logs.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 08:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346028#M598887</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-11-11T08:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346099#M598910</link>
      <description>&lt;P&gt;If placing the TEAP rule the second in order doesn't get hit it would suggest that the clients supplicants are not proeperly configured for TEAP, however, I'm confused because you mentioned if you place the TEAP rule above the PEAP rule doesn't get hit. This would suggest that the clients are configured properly for TEAP.&lt;/P&gt;
&lt;P&gt;The way how I would deal with this would be leaving the authentication conditions without specifying the outer or the inner EAP method, I would just leave them with wired_802.1x and wireless_802.1x and then specify the EAP chaining conditions in the authroization rules to match the TEAP traffic.&lt;/P&gt;
&lt;P&gt;Or, you could create a separate policy set for TEAP only. In that case you would need to use a separate allowed protocol profile where you only have TEAP enabled in it. That way, the dedicated policy set will only match TEAP traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 12:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346099#M598910</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-11-11T12:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346107#M598912</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;What I did is I create separate rule for TEAP only with separate&amp;nbsp;&lt;SPAN&gt;allowed protocol profile TEAP enabled in it and inner methods EAP-TLS.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 13:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346107#M598912</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-11-11T13:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346108#M598913</link>
      <description>&lt;P&gt;Policy set is as below for TEAP&lt;BR /&gt;&lt;STRONG&gt;Conditions&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;Radius:Called-Station-ID:"SSID" AND&lt;BR /&gt;Wirless_802.1x&lt;BR /&gt;&lt;STRONG&gt;Allowed Protocol&lt;/STRONG&gt;&lt;BR /&gt;TEAP&lt;BR /&gt;&lt;STRONG&gt;Auth Policy&lt;/STRONG&gt;&lt;BR /&gt;Wireless_802.1x AND&lt;BR /&gt;NetworkAccess:EAPTunnel TEAP&lt;BR /&gt;&lt;STRONG&gt;Authorization Policy&lt;/STRONG&gt;&lt;BR /&gt;AD:ExternalGroups: Equals IT,Sales,Finance&lt;BR /&gt;Network Access:EapChainingResult Equals User and machine both succeeded&lt;BR /&gt;Session:PostureStatus Equals Complaint,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 13:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346108#M598913</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-11-11T13:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346119#M598914</link>
      <description>&lt;P&gt;Hi. What options have you set for the authentication policies - see below&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise auth options.png" style="width: 236px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/255009iAA821486A5F096F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise auth options.png" alt="ise auth options.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 13:44:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346119#M598914</guid>
      <dc:creator>andrewswanson</dc:creator>
      <dc:date>2025-11-11T13:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346123#M598915</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;
&lt;P&gt;Usually we set the "If User not found" option to continue to allow guest endpoints to "pass" authentication, but I don't think that is relevant here?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 13:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346123#M598915</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-11-11T13:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346124#M598916</link>
      <description>&lt;P&gt;If you configured a separate policy set and enabled only TEAP in the allowed protocol then you don't have to specify the TEAP EAP tunnel in the authentication rule. Take a look at this doc please, is that what you've done?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html#toc-hId--1057623478" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html#toc-hId--1057623478&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2025 13:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346124#M598916</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-11-11T13:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346777#M598949</link>
      <description>&lt;P&gt;Hi Team,&lt;BR /&gt;is there an option to merge the TEAP and PEAP policies so they do not overlap?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 08:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5346777#M598949</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-11-13T08:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5352046#M599199</link>
      <description>&lt;P&gt;If you separate the policies with the right conditions they won't overlap. However, if you want to consolidate all of them in one then you would need to create multiple conditions using the or operator where applicable.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 14:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5352046#M599199</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-12-03T14:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE PEAP to TEAP Auth Policy Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5352260#M599210</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I just merged both the TEAP and PEAP policy and both the condition and the Auth policy the same however in the Authrz rule I use an attribute "Network Access:EapTunnel EQUALS PEAP" for the PEAP and new Autz policy within the same policy ""Network Access:EapTunnel EQUALS TEAP""&lt;BR /&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 07:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-peap-to-teap-auth-policy-set/m-p/5352260#M599210</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-12-04T07:47:04Z</dc:date>
    </item>
  </channel>
</rss>

