<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,Larry:   I face this issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552467#M89672</link>
    <description>&lt;P&gt;Hi,Larry:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I face this issue same to you. Could you tell me how did you fix this problem? very tks.&lt;/P&gt;&lt;P&gt;Can you send me E-mail for a solution? Email:liuyifeibuai@126.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Jan 2015 16:06:44 GMT</pubDate>
    <dc:creator>Qingxin Yang</dc:creator>
    <dc:date>2015-01-22T16:06:44Z</dc:date>
    <item>
      <title>12511 Unexpectedly received TLS alert message; treating as a rejection by the client</title>
      <link>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552463#M89664</link>
      <description>&lt;P&gt;ISE Version: 1.2.0.899 (Running in VMware)&lt;/P&gt;&lt;P&gt;WLC: 5508 ver 7.6.100.0&lt;/P&gt;&lt;P&gt;I have a WLAN created that uses dot1x authentication. The WLAN points to ISE for RADIUS AAA. I cannot get any windows computer to connect to it (7,8 or 8.1 tested), but android, ios and osx are all able to connect. I have a 3rd party cert (GoDaddy) installed in my local store in ISE, which is valid and not expired. I do not understand why windows machines are failing.&lt;/P&gt;&lt;P&gt;I am migrating to this new ISE server and my old ISE server has the same configuration (as far as I can tell) for this WLAN and it works for all devices, including windows. The difference is that it is on a different domain (the reason for the migration is we changed domains).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the ISE error:&lt;/P&gt;&lt;P&gt;Event: 5400 Authentication failed&lt;/P&gt;&lt;P&gt;Failure Reason: 12511 Unexpectedly received TLS alert message; treating as a rejection by the client&lt;/P&gt;&lt;P&gt;Resolution: Ensure that the ISE server certificate is trusted by the client, by configuring the supplicant with the CA certificate that signed the ISE server certificate. It is strongly recommended to not disable the server certificate validation on the client!&lt;/P&gt;&lt;P&gt;Root cause: While trying to negotiate a TLS handshake with the client, ISE received an unexpected TLS alert message. This might be due to the supplicant not trusting the ISE server certificate for some reason. ISE treated the unexpected message as a sign that the client rejected the tunnel establishment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the WLC error:&lt;/P&gt;&lt;P&gt;AAA Authentication Failure for UserName:Domain\User User Type: WLAN USER&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the windows event viewer error:&lt;/P&gt;&lt;P&gt;Source:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Microsoft-Windows-Security-Auditing&lt;BR /&gt;Event ID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5632&lt;/P&gt;&lt;P&gt;Description:&lt;BR /&gt;A request was made to authenticate to a wireless network.&lt;/P&gt;&lt;P&gt;Subject:&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Security ID:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;NULL&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Account Name:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;User&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Account Domain:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;Domain&lt;/P&gt;&lt;P&gt;Network Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Name (SSID):&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;IT-Test&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Reason Code:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;Explicit Eap failure received (0x50005)&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Error Code:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;0x80420014&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;EAP Reason Code:&amp;nbsp;&amp;nbsp; &amp;nbsp;0x80420100&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;EAP Root Cause String:&amp;nbsp;&amp;nbsp; &amp;nbsp;Network authentication failed\nThe user certificate required for the network can't be found on this computer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;EAP Error Code:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;0x80420014&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the ISE server that is working you are presented with a window that asks you to connect or terminate based on the certificate not being validated. I don't know why that isn't happening with this new ISE server, it just fails without prompting the user to connect or terminate. Both certs are from GoDaddy.&lt;/P&gt;&lt;P&gt;A difference between the certs is the old has a cert that was generated through ISE and the new server has an imported wildcard cert.&lt;/P&gt;&lt;P&gt;Anyway, I hope that is enough information to understand the issue. I appreciate the time anyone takes in assisting me with this issue. I did setup a copy of the WLAN so that I can test as needed and not have to wait for a maintenance window.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552463#M89664</guid>
      <dc:creator>Larry Bernard</dc:creator>
      <dc:date>2019-03-11T04:50:32Z</dc:date>
    </item>
    <item>
      <title>Some endpoint devices</title>
      <link>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552464#M89666</link>
      <description>&lt;P&gt;&lt;BR /&gt;Some endpoint devices (Windows OS)&amp;nbsp; have issues with wildcard cert when CN contains * (start) as wildcard&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt; the PEAP authentication fails due to "12511 Unexpectedly received TLS alert message; treating as a rejection by the client"&lt;BR /&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &amp;lt;B&amp;gt;Conditions:&amp;lt;/B&amp;gt;&lt;BR /&gt;&amp;gt; when the&amp;nbsp; wildcard cert&amp;nbsp; contains&amp;nbsp; * (start) as wildcard in CN&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt; &amp;lt;B&amp;gt;Workaround:&amp;lt;/B&amp;gt;&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt; create wildcard with * (start)&lt;BR /&gt;&amp;gt; e.g. CN= aaa.cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 03:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552464#M89666</guid>
      <dc:creator>Saurav Lodh</dc:creator>
      <dc:date>2014-07-01T03:40:45Z</dc:date>
    </item>
    <item>
      <title>Thanks for your prompt reply.</title>
      <link>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552465#M89668</link>
      <description>&lt;P&gt;Thanks for your prompt reply. If I understand you correctly, the workaround is to essentially NOT use a wildcard certificate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is another thing. In the certificate operations section I moved EAP to the self-signed certificate and the behavior is the same, but the error is different. The self-signed cert isn't a wildcard and it still fails on windows only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISE Error:&lt;/P&gt;&lt;P&gt;Event: 5400 Authentication failed&lt;BR /&gt;Failure Reason: 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate&lt;BR /&gt;Resolution: Check whether the proper server certificate is installed and configured for EAP in the Local Certificates page ( Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Local Certificates ). Also ensure that the certificate authority that signed this server certificate is correctly installed in client's supplicant. Check the previous steps in the log for this EAP-TLS conversation for a message indicating why the handshake failed. Check the OpenSSLErrorMessage and OpenSSLErrorStack for more information.&lt;BR /&gt;Root cause: PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obviously the self-signing CA isn't in the local machines store.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 15:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552465#M89668</guid>
      <dc:creator>Larry Bernard</dc:creator>
      <dc:date>2014-07-01T15:17:17Z</dc:date>
    </item>
    <item>
      <title>Nevermind, I get it now. I</title>
      <link>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552466#M89670</link>
      <description>&lt;P&gt;Nevermind, I get it now. I found the answer spelled out right here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_man_cert.html#pgfId-1171626&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 15:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552466#M89670</guid>
      <dc:creator>Larry Bernard</dc:creator>
      <dc:date>2014-07-01T15:41:41Z</dc:date>
    </item>
    <item>
      <title>Hi,Larry:   I face this issue</title>
      <link>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552467#M89672</link>
      <description>&lt;P&gt;Hi,Larry:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I face this issue same to you. Could you tell me how did you fix this problem? very tks.&lt;/P&gt;&lt;P&gt;Can you send me E-mail for a solution? Email:liuyifeibuai@126.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jan 2015 16:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552467#M89672</guid>
      <dc:creator>Qingxin Yang</dc:creator>
      <dc:date>2015-01-22T16:06:44Z</dc:date>
    </item>
    <item>
      <title>I noticed you said it was</title>
      <link>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552468#M89674</link>
      <description>&lt;P&gt;I noticed you said it was godaddy. &amp;nbsp;They by default replace the CN with the wildcard SAN&lt;/P&gt;
&lt;P&gt;This will not work because the CN needs to be a host for Windows machines. &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CSR Example:&lt;/P&gt;
&lt;P&gt;CN: ise01.ise.example.com&lt;/P&gt;
&lt;P&gt;SAN: ise01.ise.example.com , *.ise.example.com&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;CERTIFICATE GIVEN:&lt;/P&gt;
&lt;P&gt;CN: *.ise.example.com&lt;/P&gt;
&lt;P&gt;SAN:&amp;nbsp;&lt;SPAN&gt;*.ise.example.com,&amp;nbsp;ise.example.com&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 20:13:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552468#M89674</guid>
      <dc:creator>ndemers</dc:creator>
      <dc:date>2015-12-03T20:13:28Z</dc:date>
    </item>
    <item>
      <title>This is because the client</title>
      <link>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552469#M89675</link>
      <description>&lt;P&gt;This is because the client cannot verify the certificate chain (roots ca) of ISE. &amp;nbsp;Basically ask yourself this. &amp;nbsp;(This is all just an example) If you someone shows you an ID you, in theory, should be able to&amp;nbsp;validate that ID&amp;nbsp;via a 3rd party. &amp;nbsp;You cant trust the ID&amp;nbsp;until you verify with a seperate 3rd party that says you can trust it.&lt;/P&gt;
&lt;P&gt;The root ca is itself so its as if some shady guy said, " Dude, you can trust me."&lt;/P&gt;
&lt;P&gt;The only way this would work is if you took the ISE root ca cert (itself) and imported it onto the client under trusted root ca.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 20:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/12511-unexpectedly-received-tls-alert-message-treating-as-a/m-p/2552469#M89675</guid>
      <dc:creator>ndemers</dc:creator>
      <dc:date>2015-12-03T20:21:45Z</dc:date>
    </item>
  </channel>
</rss>

