<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TEAP + PEAP &amp;lt;&amp;gt; Multiple domains in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367578#M599718</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hello Cristian,&lt;BR /&gt;&lt;BR /&gt;Thanks for the clear explanation regarding SSID.&lt;BR /&gt;&lt;BR /&gt;So I guess need to create two rules. The first rule checks that the machine is authenticated but the user is not. The&lt;BR /&gt;second rule verifies that both the user and the machine are authenticated -- This for the &lt;STRONG&gt;domain X&lt;/STRONG&gt; where I guess nothing needs to be additionally declared in the authorization policy.&lt;BR /&gt;&lt;BR /&gt;As for other supplicants on &lt;STRONG&gt;Domain Y&lt;/STRONG&gt; using PEAP with MSCHAP-v2 --&amp;nbsp;&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;AD_Domain&lt;/STRONG&gt;-ExternalGroups EQUALS &lt;STRONG&gt;AD_Domain&lt;/STRONG&gt;/Users/Domain Users&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;Note that the &lt;STRONG&gt;AD_Domain&lt;/STRONG&gt; is the active directory domain that I joined the ISE into , &lt;STRONG&gt;which is the same as Domain X ,&lt;/STRONG&gt; the domain controllers showing on the ISE dashboard are the ones for domain X.&lt;BR /&gt;&lt;BR /&gt;but&amp;nbsp;surprisingly (for me and the customer lol) the allowed domains tab showed two, I have not created the authorization polices yet , but when I tested a &lt;A href="mailto:User@domainY.com" target="_blank"&gt;User@domainY.com&lt;/A&gt;&amp;nbsp;through lookup option the ISE was able to fetch it from other domain controllers hosted on their sister company site (not listed on ISE dashboard) the company had VPN tunnel with.&lt;BR /&gt;&lt;BR /&gt;As for Network Access Protoolcs both of TEAP - EAP chaining + PEAP - MSCHAP-v2 should be allowed with ease.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Will check and let you know of the outcome, appreciate your help and reply Cristian.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Ryan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Feb 2026 18:41:59 GMT</pubDate>
    <dc:creator>Ryan2K</dc:creator>
    <dc:date>2026-02-04T18:41:59Z</dc:date>
    <item>
      <title>TEAP + PEAP &lt;&gt; Multiple domains</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367361#M599712</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I have a cisco ISE implementation for a customer, Once the ISE server connected to the AD it Showed two domains, Domain X and Domain Y.&lt;BR /&gt;&lt;BR /&gt;Domain X has an internal CA with endpoints having User + machine certificate and they are willing to go with TEAP authentication.&lt;BR /&gt;&lt;BR /&gt;Domain Y users want to go with PEAP as the current IT team do not have any visibly on Y domain controllers .&lt;BR /&gt;&lt;BR /&gt;I do not want to have a separate SSIDs or something, is this feasible?&lt;BR /&gt;&lt;BR /&gt;Appreciate your help.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 07:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367361#M599712</guid>
      <dc:creator>Ryan2K</dc:creator>
      <dc:date>2026-02-04T07:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP + PEAP &lt;&gt; Multiple domains</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367377#M599713</link>
      <description>&lt;P&gt;If technically that should work, I have not tested it; I have never come across this requirement, but it's good to know the outcome of this scenario.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As I understand it, SSID itself (Layer 2) does not care about the authentication method. Cisco ISE can differentiate between these two domains and their preferred protocols (TEAP vs. PEAP) within the&amp;nbsp;Policy Set&amp;nbsp;logic that needs to be applied to each one, I guess. and authorisation policy for each one to meet the requirement based on the domain.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 08:08:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367377#M599713</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2026-02-04T08:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP + PEAP &lt;&gt; Multiple domains</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367412#M599714</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1968077"&gt;@Ryan2K&lt;/a&gt;&amp;nbsp;Yes, absolutely. From WiFi perspective, it's just EAP authentication which is redirected via RADIUS to ISE server, so WiFi infrastructure is completely agnostic to whatever happen at the authentication side, WLC only cares to receive via RADIUS an Access-Accept (successful authentication) alongside with possible authorisations to be applied, or an Access-Reject (failed authentication).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;On ISE side, ensure the two domains are in a forest, or there's mutual trust in between, so that ISE can read the AD schema structure from both domains. After, you configure your authentication profiles to allow both PEAP and TEAP (or built separate ones, one for each method) and configure separate authorization profiles where on each one you must match on the EAP method (the inner method) so that you can apply different authorizations for TEAP vs. PEAP clients; if you don't perform any (not at all) specific or differentiated authorizations between TEAP and PEAP clients, you don't need separate authtoziation profiles.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 09:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367412#M599714</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2026-02-04T09:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP + PEAP &lt;&gt; Multiple domains</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367570#M599717</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks for replying balaji, I will look into it and keep you posted&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 18:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367570#M599717</guid>
      <dc:creator>Ryan2K</dc:creator>
      <dc:date>2026-02-04T18:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP + PEAP &lt;&gt; Multiple domains</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367578#M599718</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello Cristian,&lt;BR /&gt;&lt;BR /&gt;Thanks for the clear explanation regarding SSID.&lt;BR /&gt;&lt;BR /&gt;So I guess need to create two rules. The first rule checks that the machine is authenticated but the user is not. The&lt;BR /&gt;second rule verifies that both the user and the machine are authenticated -- This for the &lt;STRONG&gt;domain X&lt;/STRONG&gt; where I guess nothing needs to be additionally declared in the authorization policy.&lt;BR /&gt;&lt;BR /&gt;As for other supplicants on &lt;STRONG&gt;Domain Y&lt;/STRONG&gt; using PEAP with MSCHAP-v2 --&amp;nbsp;&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;AD_Domain&lt;/STRONG&gt;-ExternalGroups EQUALS &lt;STRONG&gt;AD_Domain&lt;/STRONG&gt;/Users/Domain Users&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;Note that the &lt;STRONG&gt;AD_Domain&lt;/STRONG&gt; is the active directory domain that I joined the ISE into , &lt;STRONG&gt;which is the same as Domain X ,&lt;/STRONG&gt; the domain controllers showing on the ISE dashboard are the ones for domain X.&lt;BR /&gt;&lt;BR /&gt;but&amp;nbsp;surprisingly (for me and the customer lol) the allowed domains tab showed two, I have not created the authorization polices yet , but when I tested a &lt;A href="mailto:User@domainY.com" target="_blank"&gt;User@domainY.com&lt;/A&gt;&amp;nbsp;through lookup option the ISE was able to fetch it from other domain controllers hosted on their sister company site (not listed on ISE dashboard) the company had VPN tunnel with.&lt;BR /&gt;&lt;BR /&gt;As for Network Access Protoolcs both of TEAP - EAP chaining + PEAP - MSCHAP-v2 should be allowed with ease.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Will check and let you know of the outcome, appreciate your help and reply Cristian.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Ryan.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 18:41:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367578#M599718</guid>
      <dc:creator>Ryan2K</dc:creator>
      <dc:date>2026-02-04T18:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: TEAP + PEAP &lt;&gt; Multiple domains</title>
      <link>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367686#M599719</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1968077"&gt;@Ryan2K&lt;/a&gt;&amp;nbsp;Here's a guide you use for TEAP:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/216510-eap-chaining-with-teap.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Here's a guide you can use for PEAP, although using older version of ISE / GUI, settings are still the same you'll figure it out:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/201044-802-1x-authentication-with-PEAP-ISE-2-1.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/201044-802-1x-authentication-with-PEAP-ISE-2-1.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Be aware of the Microsoft Credential Guard preventing EAP-MSCHAPv2 to work if used with native Windows supplicant. In same following location you'll find a plethora of ISE related configuration guides:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-berg/ta-p/5041171" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/ise-berg/ta-p/5041171&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 23:33:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/teap-peap-lt-gt-multiple-domains/m-p/5367686#M599719</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2026-02-04T23:33:10Z</dc:date>
    </item>
  </channel>
</rss>

