<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE not working with LDAPS for 8021.x Radius Authentication in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-not-working-with-ldaps-for-8021-x-radius/m-p/5362876#M599579</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am configuring 8021.x Radius for Windows 11 Users, and I have integrated ISE 3.4 with Domain controller 2025 by using AD and LDAPS method and both integrated successfully, however when I use AD method then windows clients successfully authenticating, but when I switched Authentication method on ISE to LDAPS then Windows users authentication failing. below are logs from ISE.&lt;/P&gt;
&lt;P&gt;I am using user/password credential from AD/LDAPS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Event 5400 Authentication failed&lt;BR /&gt;Username INVALID\INVALID&lt;BR /&gt;Endpoint Id C4:D6:D3:x.x.x &lt;BR /&gt;Endpoint Profile &lt;BR /&gt;Authentication Policy Wired_Access_Policy &amp;gt;&amp;gt; Wired_802.1X&lt;BR /&gt;Authorization Policy Wired_Access_Policy&lt;BR /&gt;Authorization Result&lt;/P&gt;
&lt;P&gt;Authentication Details&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Policy Server ISE01&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Event 5400 Authentication failed&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Failure Reason: 22064 Authentication method is not supported by any applicable identity store(s)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Resolution: The authentication method that was negotiated with the client was not supported by any of the identity stores specified by the authentication policy. Configure the endpoint client to use a different authentication method or change the authentication policy to allow an identity store that supports that authentication method&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Root cause: Authentication method is not supported by any applicable identity store(s)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Username INVALID\INVALID&lt;BR /&gt;Endpoint Id C4:D6:D3:x.x.x&lt;BR /&gt;Calling Station Id C4-D6-D3-x.x.x&lt;BR /&gt;Audit Session Id 640C0A0A0000003BD6DF3230&lt;BR /&gt;Authentication Method dot1x&lt;BR /&gt;Authentication Protocol PEAP (EAP-MSCHAPv2)&lt;BR /&gt;Service Type Framed&lt;BR /&gt;Network Device Access-SW01&lt;BR /&gt;Device Type All Device Types#Cisco-Catalyst-Switch&lt;BR /&gt;Location All Locations#VIL&lt;BR /&gt;NAS IPv4 Address 10.1.1.10&lt;BR /&gt;NAS Port Id GigabitEthernet1/0/5&lt;BR /&gt;NAS Port Type Ethernet&lt;BR /&gt;Response Time 24 milliseconds&lt;/P&gt;
&lt;P&gt;Other Attributes&lt;BR /&gt;ConfigVersionId 4262&lt;BR /&gt;Device Port 60997&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;RadiusPacketType AccessRequest&lt;BR /&gt;Protocol Radius&lt;BR /&gt;NAS-Port 50104&lt;BR /&gt;Framed-MTU 1468&lt;BR /&gt;State 37CPMSessionID=640C0A0A0000003BD6DF3230;34SessionID=KDD08ISE01/554749706/574;&lt;BR /&gt;NetworkDeviceProfileId b0699505-3150-4215-a80e-6753d45bf56c&lt;BR /&gt;IsThirdPartyDeviceFlow false&lt;BR /&gt;AcsSessionID ISE01/554749706/574&lt;BR /&gt;DetailedInfo Invalid username or password specified&lt;BR /&gt;SelectedAuthenticationIdentityStores LDAPS&lt;BR /&gt;IdentityPolicyMatchedRule Wired_802.1X&lt;BR /&gt;EndPointMACAddress C4-D6-D3-x.x.x&lt;BR /&gt;ISEPolicySetName Wired_Access_Policy&lt;BR /&gt;IdentitySelectionMatchedRule Wired_802.1X&lt;BR /&gt;TotalAuthenLatency 122&lt;BR /&gt;ClientLatency 98&lt;BR /&gt;TLSCipher ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;TLSVersion TLSv1.2&lt;BR /&gt;TLSSupportedGroups secp384r1&lt;BR /&gt;TLSSignatureAlgorithms NONE&lt;BR /&gt;DTLSSupport Unknown&lt;BR /&gt;Network Device Profile Cisco&lt;BR /&gt;Location Location#All Locations#VIL&lt;BR /&gt;Device Type Device Type#All Device Types#Cisco-Catalyst-Switch&lt;BR /&gt;IPSEC IPSEC#Is IPSEC Device#No&lt;BR /&gt;RADIUS Username INVALID\INVALID&lt;BR /&gt;Device IP Address 10.1.1.10&lt;BR /&gt;CPMSessionID 640C0A0A0000003BD6DF3230&lt;BR /&gt;Called-Station-ID 9C:A9:B8:F6:BE:84&lt;BR /&gt;CiscoAVPair service-type=Framed,&lt;BR /&gt;audit-session-id=640C0A0A0000003BD6DF3230,&lt;BR /&gt;method=dot1x,&lt;BR /&gt;client-iif-id=350331839&lt;/P&gt;
&lt;P&gt;Result&lt;BR /&gt;RadiusPacketType AccessReject&lt;/P&gt;
&lt;P&gt;Session Events&lt;BR /&gt;2026-01-19 19:32:15.37 Authentication failed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;=======================&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Steps&lt;BR /&gt;Step ID Description Latency (ms)&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session 0&lt;BR /&gt;15049 Evaluating Policy Group 0&lt;BR /&gt;15008 Evaluating Service Selection Policy 0&lt;BR /&gt;15048 Queried PIP - Normalised Radius.RadiusFlowType 2&lt;BR /&gt;11507 Extracted EAP-Response/Identity 2&lt;BR /&gt;12500 Prepared EAP-Request proposing EAP-TLS with challenge 0&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 4&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12301 Extracted EAP-Response/NAK requesting to use PEAP instead 0&lt;BR /&gt;12300 Prepared EAP-Request proposing PEAP with challenge 0&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 15&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12302 Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated 0&lt;BR /&gt;34166 Open secure connection with TLS peer 0&lt;BR /&gt;12318 Successfully negotiated PEAP version 0 0&lt;BR /&gt;12800 Extracted first TLS record; TLS handshake started 0&lt;BR /&gt;12805 Extracted TLS ClientHello message 0&lt;BR /&gt;12806 Prepared TLS ServerHello message 1&lt;BR /&gt;12807 Prepared TLS Certificate message 0&lt;BR /&gt;12808 Prepared TLS ServerKeyExchange message 14&lt;BR /&gt;12810 Prepared TLS ServerDone message 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 4&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 5&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 4&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 5&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 9&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12318 Successfully negotiated PEAP version 0 0&lt;BR /&gt;12810 Prepared TLS ServerDone message 0&lt;BR /&gt;12812 Extracted TLS ClientKeyExchange message 1&lt;BR /&gt;12803 Extracted TLS ChangeCipherSpec message 0&lt;BR /&gt;12804 Extracted TLS Finished message 0&lt;BR /&gt;12801 Prepared TLS ChangeCipherSpec message 0&lt;BR /&gt;12802 Prepared TLS Finished message 0&lt;BR /&gt;12816 TLS handshake succeeded 0&lt;BR /&gt;12310 PEAP full handshake finished successfully 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 24&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 1&lt;BR /&gt;12313 PEAP inner method started 0&lt;BR /&gt;11521 Prepared EAP-Request/Identity for inner EAP method 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 5&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;11522 Extracted EAP-Response/Identity for inner EAP method 0&lt;BR /&gt;11806 Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 19&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;11808 Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated 0&lt;BR /&gt;15041 Evaluating Identity Policy 0&lt;BR /&gt;15013 Selected Identity Source - LDAPS 3&lt;BR /&gt;22043 Current Identity Store does not support the authentication method; Skipping it - LDAPS 0&lt;BR /&gt;22064 Authentication method is not supported by any applicable identity store(s) 0&lt;BR /&gt;22058 The advanced option that is configured for an unknown user is used 0&lt;BR /&gt;22060 The 'Continue' advanced option is configured in case of a failed authentication request 0&lt;BR /&gt;11815 Inner EAP-MSCHAP authentication failed 0&lt;BR /&gt;11520 Prepared EAP-Failure for inner EAP method 0&lt;BR /&gt;22028 Authentication failed and the advanced options are ignored 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 3&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;34167 Shutdown secure connection with TLS peer 0&lt;BR /&gt;12307 PEAP authentication failed 0&lt;BR /&gt;11504 Prepared EAP-Failure 0&lt;BR /&gt;11003 Returned RADIUS Access-Reject 0&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jan 2026 16:05:34 GMT</pubDate>
    <dc:creator>hashimwajid1</dc:creator>
    <dc:date>2026-01-19T16:05:34Z</dc:date>
    <item>
      <title>Cisco ISE not working with LDAPS for 8021.x Radius Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-not-working-with-ldaps-for-8021-x-radius/m-p/5362876#M599579</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am configuring 8021.x Radius for Windows 11 Users, and I have integrated ISE 3.4 with Domain controller 2025 by using AD and LDAPS method and both integrated successfully, however when I use AD method then windows clients successfully authenticating, but when I switched Authentication method on ISE to LDAPS then Windows users authentication failing. below are logs from ISE.&lt;/P&gt;
&lt;P&gt;I am using user/password credential from AD/LDAPS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Event 5400 Authentication failed&lt;BR /&gt;Username INVALID\INVALID&lt;BR /&gt;Endpoint Id C4:D6:D3:x.x.x &lt;BR /&gt;Endpoint Profile &lt;BR /&gt;Authentication Policy Wired_Access_Policy &amp;gt;&amp;gt; Wired_802.1X&lt;BR /&gt;Authorization Policy Wired_Access_Policy&lt;BR /&gt;Authorization Result&lt;/P&gt;
&lt;P&gt;Authentication Details&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Policy Server ISE01&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Event 5400 Authentication failed&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Failure Reason: 22064 Authentication method is not supported by any applicable identity store(s)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Resolution: The authentication method that was negotiated with the client was not supported by any of the identity stores specified by the authentication policy. Configure the endpoint client to use a different authentication method or change the authentication policy to allow an identity store that supports that authentication method&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Root cause: Authentication method is not supported by any applicable identity store(s)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Username INVALID\INVALID&lt;BR /&gt;Endpoint Id C4:D6:D3:x.x.x&lt;BR /&gt;Calling Station Id C4-D6-D3-x.x.x&lt;BR /&gt;Audit Session Id 640C0A0A0000003BD6DF3230&lt;BR /&gt;Authentication Method dot1x&lt;BR /&gt;Authentication Protocol PEAP (EAP-MSCHAPv2)&lt;BR /&gt;Service Type Framed&lt;BR /&gt;Network Device Access-SW01&lt;BR /&gt;Device Type All Device Types#Cisco-Catalyst-Switch&lt;BR /&gt;Location All Locations#VIL&lt;BR /&gt;NAS IPv4 Address 10.1.1.10&lt;BR /&gt;NAS Port Id GigabitEthernet1/0/5&lt;BR /&gt;NAS Port Type Ethernet&lt;BR /&gt;Response Time 24 milliseconds&lt;/P&gt;
&lt;P&gt;Other Attributes&lt;BR /&gt;ConfigVersionId 4262&lt;BR /&gt;Device Port 60997&lt;BR /&gt;DestinationPort 1812&lt;BR /&gt;RadiusPacketType AccessRequest&lt;BR /&gt;Protocol Radius&lt;BR /&gt;NAS-Port 50104&lt;BR /&gt;Framed-MTU 1468&lt;BR /&gt;State 37CPMSessionID=640C0A0A0000003BD6DF3230;34SessionID=KDD08ISE01/554749706/574;&lt;BR /&gt;NetworkDeviceProfileId b0699505-3150-4215-a80e-6753d45bf56c&lt;BR /&gt;IsThirdPartyDeviceFlow false&lt;BR /&gt;AcsSessionID ISE01/554749706/574&lt;BR /&gt;DetailedInfo Invalid username or password specified&lt;BR /&gt;SelectedAuthenticationIdentityStores LDAPS&lt;BR /&gt;IdentityPolicyMatchedRule Wired_802.1X&lt;BR /&gt;EndPointMACAddress C4-D6-D3-x.x.x&lt;BR /&gt;ISEPolicySetName Wired_Access_Policy&lt;BR /&gt;IdentitySelectionMatchedRule Wired_802.1X&lt;BR /&gt;TotalAuthenLatency 122&lt;BR /&gt;ClientLatency 98&lt;BR /&gt;TLSCipher ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;TLSVersion TLSv1.2&lt;BR /&gt;TLSSupportedGroups secp384r1&lt;BR /&gt;TLSSignatureAlgorithms NONE&lt;BR /&gt;DTLSSupport Unknown&lt;BR /&gt;Network Device Profile Cisco&lt;BR /&gt;Location Location#All Locations#VIL&lt;BR /&gt;Device Type Device Type#All Device Types#Cisco-Catalyst-Switch&lt;BR /&gt;IPSEC IPSEC#Is IPSEC Device#No&lt;BR /&gt;RADIUS Username INVALID\INVALID&lt;BR /&gt;Device IP Address 10.1.1.10&lt;BR /&gt;CPMSessionID 640C0A0A0000003BD6DF3230&lt;BR /&gt;Called-Station-ID 9C:A9:B8:F6:BE:84&lt;BR /&gt;CiscoAVPair service-type=Framed,&lt;BR /&gt;audit-session-id=640C0A0A0000003BD6DF3230,&lt;BR /&gt;method=dot1x,&lt;BR /&gt;client-iif-id=350331839&lt;/P&gt;
&lt;P&gt;Result&lt;BR /&gt;RadiusPacketType AccessReject&lt;/P&gt;
&lt;P&gt;Session Events&lt;BR /&gt;2026-01-19 19:32:15.37 Authentication failed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;=======================&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Steps&lt;BR /&gt;Step ID Description Latency (ms)&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session 0&lt;BR /&gt;15049 Evaluating Policy Group 0&lt;BR /&gt;15008 Evaluating Service Selection Policy 0&lt;BR /&gt;15048 Queried PIP - Normalised Radius.RadiusFlowType 2&lt;BR /&gt;11507 Extracted EAP-Response/Identity 2&lt;BR /&gt;12500 Prepared EAP-Request proposing EAP-TLS with challenge 0&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 4&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12301 Extracted EAP-Response/NAK requesting to use PEAP instead 0&lt;BR /&gt;12300 Prepared EAP-Request proposing PEAP with challenge 0&lt;BR /&gt;12625 Valid EAP-Key-Name attribute received 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 15&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12302 Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated 0&lt;BR /&gt;34166 Open secure connection with TLS peer 0&lt;BR /&gt;12318 Successfully negotiated PEAP version 0 0&lt;BR /&gt;12800 Extracted first TLS record; TLS handshake started 0&lt;BR /&gt;12805 Extracted TLS ClientHello message 0&lt;BR /&gt;12806 Prepared TLS ServerHello message 1&lt;BR /&gt;12807 Prepared TLS Certificate message 0&lt;BR /&gt;12808 Prepared TLS ServerKeyExchange message 14&lt;BR /&gt;12810 Prepared TLS ServerDone message 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 4&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 5&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 4&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 5&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 9&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;12318 Successfully negotiated PEAP version 0 0&lt;BR /&gt;12810 Prepared TLS ServerDone message 0&lt;BR /&gt;12812 Extracted TLS ClientKeyExchange message 1&lt;BR /&gt;12803 Extracted TLS ChangeCipherSpec message 0&lt;BR /&gt;12804 Extracted TLS Finished message 0&lt;BR /&gt;12801 Prepared TLS ChangeCipherSpec message 0&lt;BR /&gt;12802 Prepared TLS Finished message 0&lt;BR /&gt;12816 TLS handshake succeeded 0&lt;BR /&gt;12310 PEAP full handshake finished successfully 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 24&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 1&lt;BR /&gt;12313 PEAP inner method started 0&lt;BR /&gt;11521 Prepared EAP-Request/Identity for inner EAP method 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 5&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;11522 Extracted EAP-Response/Identity for inner EAP method 0&lt;BR /&gt;11806 Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 19&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;11808 Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated 0&lt;BR /&gt;15041 Evaluating Identity Policy 0&lt;BR /&gt;15013 Selected Identity Source - LDAPS 3&lt;BR /&gt;22043 Current Identity Store does not support the authentication method; Skipping it - LDAPS 0&lt;BR /&gt;22064 Authentication method is not supported by any applicable identity store(s) 0&lt;BR /&gt;22058 The advanced option that is configured for an unknown user is used 0&lt;BR /&gt;22060 The 'Continue' advanced option is configured in case of a failed authentication request 0&lt;BR /&gt;11815 Inner EAP-MSCHAP authentication failed 0&lt;BR /&gt;11520 Prepared EAP-Failure for inner EAP method 0&lt;BR /&gt;22028 Authentication failed and the advanced options are ignored 0&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge 0&lt;BR /&gt;11006 Returned RADIUS Access-Challenge 0&lt;BR /&gt;11001 Received RADIUS Access-Request 3&lt;BR /&gt;11018 RADIUS is re-using an existing session 0&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response 0&lt;BR /&gt;34167 Shutdown secure connection with TLS peer 0&lt;BR /&gt;12307 PEAP authentication failed 0&lt;BR /&gt;11504 Prepared EAP-Failure 0&lt;BR /&gt;11003 Returned RADIUS Access-Reject 0&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2026 16:05:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-not-working-with-ldaps-for-8021-x-radius/m-p/5362876#M599579</guid>
      <dc:creator>hashimwajid1</dc:creator>
      <dc:date>2026-01-19T16:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE not working with LDAPS for 8021.x Radius Authentication</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-not-working-with-ldaps-for-8021-x-radius/m-p/5362883#M599580</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/263732"&gt;@hashimwajid1&lt;/a&gt;&amp;nbsp;What you're seeing is expected. Due to security limitations,&amp;nbsp;&lt;SPAN&gt;as these EAP-MSCHAPv2 require complex challenge-handshake mechanisms, LDAP or LDAPS integration lacks this capability.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;Also documented here:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216190-configure-and-troubleshoot-ise-with-exte.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216190-configure-and-troubleshoot-ise-with-exte.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cristian.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2026 16:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-not-working-with-ldaps-for-8021-x-radius/m-p/5362883#M599580</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2026-01-19T16:33:56Z</dc:date>
    </item>
  </channel>
</rss>

