<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Policy-Access Mobility Express in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3884024#M203905</link>
    <description>Normally, if the users makes a fresh connection to the SSID (assuming you are talking about wireless), they get asked if the certificate is correct and if they agree to that, they have wireless access. This is completely normal on Windows and SSIDs with a certificate authentication. Only way around that is to have managed devices and push the wireless configuration via Group Policy, including the certificate.&lt;BR /&gt;&lt;BR /&gt;The idea about showing and accepting the certificate is to avoid man in the middle attacks. Only if the correct certificate (thumbprint) is shown, the user should connect.</description>
    <pubDate>Wed, 03 Jul 2019 14:26:54 GMT</pubDate>
    <dc:creator>patoberli</dc:creator>
    <dc:date>2019-07-03T14:26:54Z</dc:date>
    <item>
      <title>Security Policy-Access Mobility Express</title>
      <link>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3882911#M203904</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured my ISE running version 2.6 to authenticate wireless clients.Users coming in from Android,Apple and linux machines&amp;nbsp; can authenticate correctly and have access to the network,but with regards to windows clients this is not possible.This comes as error 5400 and i googled the error from other forums and it was pointing to certificate issue.So i had to manually accept the certificate on my windows test machine in windows and sharing centre an it worked perfectly.Now the questions is i have thousands of users and i cant go one after to update.If i use a supplicant like anyconnect it works fine.Do we have another route other than the mentioned above to solve this issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 17:38:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3882911#M203904</guid>
      <dc:creator>tandemike</dc:creator>
      <dc:date>2021-07-05T17:38:36Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy-Access Mobility Express</title>
      <link>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3884024#M203905</link>
      <description>Normally, if the users makes a fresh connection to the SSID (assuming you are talking about wireless), they get asked if the certificate is correct and if they agree to that, they have wireless access. This is completely normal on Windows and SSIDs with a certificate authentication. Only way around that is to have managed devices and push the wireless configuration via Group Policy, including the certificate.&lt;BR /&gt;&lt;BR /&gt;The idea about showing and accepting the certificate is to avoid man in the middle attacks. Only if the correct certificate (thumbprint) is shown, the user should connect.</description>
      <pubDate>Wed, 03 Jul 2019 14:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3884024#M203905</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2019-07-03T14:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy-Access Mobility Express</title>
      <link>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3885254#M203906</link>
      <description>Hi patoberli&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Through further digging i found out that the problem is between ISE and CIS server(LDAP) is not supporting PEAP and MSCHAPv2.Any workaround on this&lt;BR /&gt;</description>
      <pubDate>Fri, 05 Jul 2019 13:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3885254#M203906</guid>
      <dc:creator>tandemike</dc:creator>
      <dc:date>2019-07-05T13:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy-Access Mobility Express</title>
      <link>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3885289#M203907</link>
      <description>I don't know the product CIS and haven't used ISE so far for wireless.&lt;BR /&gt;Make sure that TLS1.0 is enabled though, some modern radius servers might have that disabled, but at least for Windows 7 and some OS X clients this is required when using PEAP with MSCHAPv2.</description>
      <pubDate>Fri, 05 Jul 2019 13:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/security-policy-access-mobility-express/m-p/3885289#M203907</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2019-07-05T13:38:25Z</dc:date>
    </item>
  </channel>
</rss>

