<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Client Using Incorrect Protocol in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479417#M87970</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is some more detail...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One client was attempting to authentication using PEAP but failing due to "12511 Unexpectedly received TLS alert message; treating as a rejection by the&amp;nbsp; client". We're using internally generated certificates here but we of course trust our corporate CA. On top of that, in the supplicant we disable 'validate server certificate'. However, once I followed this article (&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/2518158"&gt;http://support.microsoft.com/kb/2518158&lt;/A&gt;&lt;SPAN&gt;) the client started using EAP-TLS and was successful.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another client, which has the same group policy for the wireless network settings works fine with no changes needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However a third one, which has the same group policy but has not had the modification from the Microsoft article continues to use PEAP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Feb 2014 21:55:34 GMT</pubDate>
    <dc:creator>Mark H</dc:creator>
    <dc:date>2014-02-18T21:55:34Z</dc:date>
    <item>
      <title>Client Using Incorrect Protocol</title>
      <link>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479416#M87969</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After lots of testing with laptops authentication with ISE over wireless using EAP-TLS, we have a few laptops that despite having the same client configuration attempt to use PEAP. This ultimately fails and I'm unsure why they're trying to use PEAP, since I've also disabled PEAP as an applicable protocol within ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas? They're all Windows 7 (x64) using the native supplicant with the Cisco NAC agent for posturing. They're all set to use 'smart card or certificate', not to validate the server certificate and use computer authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:24:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479416#M87969</guid>
      <dc:creator>Mark H</dc:creator>
      <dc:date>2019-03-11T04:24:47Z</dc:date>
    </item>
    <item>
      <title>Client Using Incorrect Protocol</title>
      <link>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479417#M87970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is some more detail...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One client was attempting to authentication using PEAP but failing due to "12511 Unexpectedly received TLS alert message; treating as a rejection by the&amp;nbsp; client". We're using internally generated certificates here but we of course trust our corporate CA. On top of that, in the supplicant we disable 'validate server certificate'. However, once I followed this article (&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/2518158"&gt;http://support.microsoft.com/kb/2518158&lt;/A&gt;&lt;SPAN&gt;) the client started using EAP-TLS and was successful.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another client, which has the same group policy for the wireless network settings works fine with no changes needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However a third one, which has the same group policy but has not had the modification from the Microsoft article continues to use PEAP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Feb 2014 21:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479417#M87970</guid>
      <dc:creator>Mark H</dc:creator>
      <dc:date>2014-02-18T21:55:34Z</dc:date>
    </item>
    <item>
      <title>Client Using Incorrect Protocol</title>
      <link>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479418#M87971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have been able to resolve this, pity I can't mark my own response as the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSIDs are case sensitive. The SSID was defined as "AAA-CORP", but the group policy we have defined "AAA-Corp". It meant it wasn't auto connecting and when people were manually connecting, it obviously found it and tried to connect but failed as it used the default authentication settings within Windows.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 02:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479418#M87971</guid>
      <dc:creator>Mark H</dc:creator>
      <dc:date>2014-02-19T02:16:18Z</dc:date>
    </item>
    <item>
      <title>Client Using Incorrect Protocol</title>
      <link>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479419#M87972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to add FYI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;If you’re configuring your 802.1x settings via Group Policy you’ll see sometimes EAP-PEAP request from clients in your radius server log during booting even if you’ll set EAP-TLS. This error happened in our case with 1/3 of the boots with some models. The error is caused by a timing problem during startup. Sometimes the 802.1x is faster and sometimes the Group Policy is, and if the 802.1x is faster than the default configuration is taken, which is PEAP. Which lead to a EAP-NAK by the radius server.&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Feb 2014 12:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/client-using-incorrect-protocol/m-p/2479419#M87972</guid>
      <dc:creator>Muhammad Munir</dc:creator>
      <dc:date>2014-02-20T12:24:48Z</dc:date>
    </item>
  </channel>
</rss>

