<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TEAP Rollout – Default Profile Enforcement Issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/teap-rollout-default-profile-enforcement-issue/m-p/5354230#M599269</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;When a user "forgets" a network, it removes the saved connection profile, and the next connection attempt can no longer use these settings and fallback to default settings or settings pushed through Group Policy Objects (GPOs) from Active Directory to re-establish the connection.&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;Three solution here:&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;1. ask users to not use "forget" option, which is prone to failure as users will forget not to use the "forget" option&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;2. use Local Windows Policies to set the configuration permanently use TEAP, via Local Group Policy Editor (&lt;SPAN&gt;gpedit.msc); not scalable option if you have to do this on multiple devices and not the bet way to do it if there are computers that are members of AD&amp;nbsp;&lt;/SPAN&gt;infrastructure; useful only for computers that are not AD members.&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;3. use AD level GPO's to push 802.1x settings with using TEAP&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;Nothing you can do on ISE to address this challenge.&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;Thanks,&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;Cristian.&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Dec 2025 09:01:04 GMT</pubDate>
    <dc:creator>Cristian Matei</dc:creator>
    <dc:date>2025-12-11T09:01:04Z</dc:date>
    <item>
      <title>TEAP Rollout – Default Profile Enforcement Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-rollout-default-profile-enforcement-issue/m-p/5354196#M599267</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have initiated the rollout of &lt;STRONG&gt;user authentication using TEAP&lt;/STRONG&gt; (transitioning from PEAP). During testing, we observed the following issue&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;When a user clicks the &lt;/SPAN&gt;&lt;STRONG&gt;“Forget”&lt;/STRONG&gt;&lt;SPAN&gt; button on the Wi-Fi profile, the system reverts to &lt;/SPAN&gt;&lt;STRONG&gt;PEAP&lt;/STRONG&gt;&lt;SPAN&gt; as the default authentication method.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;As a result, users are challenged to connect with PEAP instead of TEAP, which breaks the intended authentication flow.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;What options are available to enforce &lt;/SPAN&gt;&lt;STRONG&gt;TEAP as the default profile&lt;/STRONG&gt;&lt;SPAN&gt; across all devices ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 07:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-rollout-default-profile-enforcement-issue/m-p/5354196#M599267</guid>
      <dc:creator>henokk60</dc:creator>
      <dc:date>2025-12-11T07:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP Rollout – Default Profile Enforcement Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-rollout-default-profile-enforcement-issue/m-p/5354197#M599268</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1753581"&gt;@henokk60&lt;/a&gt;&amp;nbsp;this is not really a Cisco (ISE) issue, but relates to how the devices are managed. Assuming these are Windows devices connected to Active Directory domain, then a Group Policy should be created and deployed to the devices with the correct authentication settings (TEAP), the users would then be unable to change the settings. Or if managed by MDM, then deploy a policy to do the same.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 07:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-rollout-default-profile-enforcement-issue/m-p/5354197#M599268</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-12-11T07:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP Rollout – Default Profile Enforcement Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-rollout-default-profile-enforcement-issue/m-p/5354230#M599269</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;When a user "forgets" a network, it removes the saved connection profile, and the next connection attempt can no longer use these settings and fallback to default settings or settings pushed through Group Policy Objects (GPOs) from Active Directory to re-establish the connection.&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;Three solution here:&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;1. ask users to not use "forget" option, which is prone to failure as users will forget not to use the "forget" option&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;2. use Local Windows Policies to set the configuration permanently use TEAP, via Local Group Policy Editor (&lt;SPAN&gt;gpedit.msc); not scalable option if you have to do this on multiple devices and not the bet way to do it if there are computers that are members of AD&amp;nbsp;&lt;/SPAN&gt;infrastructure; useful only for computers that are not AD members.&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;3. use AD level GPO's to push 802.1x settings with using TEAP&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;Nothing you can do on ISE to address this challenge.&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;Thanks,&lt;/DIV&gt;
&lt;DIV data-subtree="aimfl,mfl" data-processed="true"&gt;Cristian.&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 09:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-rollout-default-profile-enforcement-issue/m-p/5354230#M599269</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2025-12-11T09:01:04Z</dc:date>
    </item>
  </channel>
</rss>

