<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowed Protocol TEAP with preferred EAP Protocol TEAP - use case in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5351919#M599186</link>
    <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;mentioned, the "Preferred EAP Protocol" is just a way to make ISE to request the selected protocol during the EAP negotiation with the endpoint. However, the "Allow TEAP" is just to make ISE accept the authentication negotiation over TEAP.&lt;/P&gt;</description>
    <pubDate>Wed, 03 Dec 2025 09:21:05 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2025-12-03T09:21:05Z</dc:date>
    <item>
      <title>Allowed Protocol TEAP with preferred EAP Protocol TEAP - use case</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5351310#M599151</link>
      <description>&lt;P&gt;Refer to below screenshot from allowed protocols - What's the difference between Preferred EAP Protocol between TEAP and EAP-TLS and when to use &lt;STRONG&gt;Preferred EAP Protocol&lt;/STRONG&gt; between these 2 ( EAP-TLS and TEAP ) as preferred ?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MSJ1_0-1764611078299.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/256081iEF9192E6B662BAB1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MSJ1_0-1764611078299.png" alt="MSJ1_0-1764611078299.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Dec 2025 17:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5351310#M599151</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2025-12-01T17:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Allowed Protocol TEAP with preferred EAP Protocol TEAP - use case</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5351320#M599152</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1146335"&gt;@MSJ1&lt;/a&gt;&amp;nbsp;when configured the Preferred EAP Protocol is the first protocol ISE will attempt to authenticate the client. If you leave Preferred EAP Protocol disabled, ISE will propose EAP-TLS when a client attempts to authenticate. If the client does not use EAP-TLS it will inform ISE what protocol it does support. Set the Preferred EAP Protocol to the protocol the clients are using.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Dec 2025 18:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5351320#M599152</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-12-01T18:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: Allowed Protocol TEAP with preferred EAP Protocol TEAP - use case</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5351919#M599186</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;mentioned, the "Preferred EAP Protocol" is just a way to make ISE to request the selected protocol during the EAP negotiation with the endpoint. However, the "Allow TEAP" is just to make ISE accept the authentication negotiation over TEAP.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 09:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5351919#M599186</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-12-03T09:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: Allowed Protocol TEAP with preferred EAP Protocol TEAP - use case</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5352027#M599196</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;The "allow" checkbox is to allow or disallow ISE to use that specific EAP method for incoming authentication requests; if your supplicants uses that method, this checkbox must be enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;The "preferred EAP" protocol is what ISE will propose as EAP method to the suplicant; however, since supplicants are already configured with the EAP method to be used and will signal it to ISE, this let's say feature doesn't really add value; moreover, based on the EAP method signaled by client, if you use this checkbox you may find yourself in the buggy situation where ISE reject the authentication request instead of failing over to whatever the supplicant has requested, assuming the supplicant required EAP method has been "allowed" through the previously discussed checkbox.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 13:29:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5352027#M599196</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2025-12-03T13:29:37Z</dc:date>
    </item>
    <item>
      <title>Re: Allowed Protocol TEAP with preferred EAP Protocol TEAP - use case</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5352043#M599198</link>
      <description>&lt;P&gt;I wouldn't say "&lt;SPAN&gt;doesn't really add value&lt;/SPAN&gt;". If we set it to the typically used EAP method, and it is not EAP-TLS, we save one round-trip time. It's not much, but why waste this when it is easy to configure.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 14:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5352043#M599198</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-12-03T14:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Allowed Protocol TEAP with preferred EAP Protocol TEAP - use case</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5352059#M599202</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Can you give one real and functional example where you actually save one round-trip time, with explanations? Not per what documentation is saying, but per what actually happens behind the scenes in the event chain.&lt;/P&gt;
&lt;P&gt;Just to re-enforce my statement, depending on your actual EAP method being used and the value you set to preference, if these two are not identical, you could end up with authentication request being dropped instead of failing over to allowed methods.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 14:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5352059#M599202</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2025-12-03T14:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: Allowed Protocol TEAP with preferred EAP Protocol TEAP - use case</title>
      <link>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5352104#M599205</link>
      <description>&lt;P&gt;Yes, and I have it in captures. The customer has nearly all clients still with PEAP. Without setting this option, the ISE is sending the EAP Request as EAP-TLS, and the Supplicant first has to send a Legacy NAK before the ISE continues with PEAP:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KarstenIwen_0-1764779605596.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/256208iC5AAF96CD26F7049/image-size/medium?v=v2&amp;amp;px=400" role="button" title="KarstenIwen_0-1764779605596.jpeg" alt="KarstenIwen_0-1764779605596.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2025 16:33:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allowed-protocol-teap-with-preferred-eap-protocol-teap-use-case/m-p/5352104#M599205</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-12-03T16:33:59Z</dc:date>
    </item>
  </channel>
</rss>

