<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: My EAP-PEAP Setup in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574315#M239813</link>
    <description>&lt;P&gt;You sort of answered your own question .. when you use peap .. the client authenticates with username and password, so anyone who has one can join. You have to use something which is unique to laptops owned by your organization and not on personal devices for e.g install a client certificate on your owned laptops and use eap-tls this is also more secure. Or use machine and user authentication both with peap, &amp;nbsp;where the machine name match against the AD domain computer, this condition won’t be matches for personal devices so they won’t connect.&amp;nbsp;&lt;BR /&gt;eap-tls is more secure and a better option but it also requires a CA, and have some management overhead managing the certificates, but again you don’t have to give unique cert to every device you can just give one generic cert to all corporate owned devices, that will get the job done as far as authentication is concerned.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 19 Mar 2022 10:12:30 GMT</pubDate>
    <dc:creator>Ambuj M</dc:creator>
    <dc:date>2022-03-19T10:12:30Z</dc:date>
    <item>
      <title>My EAP-PEAP Setup</title>
      <link>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574279#M239810</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;My EAP-PEAP Setu&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Hello Team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have setup EAP-PEAP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. created one corp-ssid for all the users.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. define setting under the gpo policy which is pushing from AD end to all the laptops.&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. i am broadcasting the SSID from my WLC.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now my concern here that when user using their personal laptop still they can see that Corp-SSID and they know about their AD credentials as well and they are connecting successfully.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i did not get why this is happening or any more configuration over the cisco ise or AD GPO policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please suggest me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;under the cisco ISE authentication Policy -- i only define Wreless_802.1x --- AD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;authorization policy --- wireless_802.1x and SSID name. thats it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;GPO --- there is eap-peap, AES, MSCHAPv2, root certificate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish Jain&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 19 Mar 2022 03:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574279#M239810</guid>
      <dc:creator>jain.manish94</dc:creator>
      <dc:date>2022-03-19T03:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: My EAP-PEAP Setup</title>
      <link>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574315#M239813</link>
      <description>&lt;P&gt;You sort of answered your own question .. when you use peap .. the client authenticates with username and password, so anyone who has one can join. You have to use something which is unique to laptops owned by your organization and not on personal devices for e.g install a client certificate on your owned laptops and use eap-tls this is also more secure. Or use machine and user authentication both with peap, &amp;nbsp;where the machine name match against the AD domain computer, this condition won’t be matches for personal devices so they won’t connect.&amp;nbsp;&lt;BR /&gt;eap-tls is more secure and a better option but it also requires a CA, and have some management overhead managing the certificates, but again you don’t have to give unique cert to every device you can just give one generic cert to all corporate owned devices, that will get the job done as far as authentication is concerned.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Mar 2022 10:12:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574315#M239813</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2022-03-19T10:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: My EAP-PEAP Setup</title>
      <link>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574347#M239814</link>
      <description>&lt;P&gt;I highly recommend you to play with EAP-TLS, for managebility and also for security. This problem you are facing would desaper instantinialy if you were using certificates.&lt;/P&gt;&lt;P&gt;But we all know the burden of certificates.&amp;nbsp; One suggestion I´d like to contribute, besides those already suggested, is to limit the number of device per user. "Employee Registered Devices".&amp;nbsp; That way, users can´t use two notebook on the network at the same time. But, this doesn´t prevent them to log with the personal notebook only. For that, you can use mac filter on the WLC. This is a burden as well cause you will need to register every employee mac address on the WLC and keep it always up to date. But, depending on the size of your company, it may worth it to try.&lt;/P&gt;&lt;P&gt;&amp;nbsp;This will not solve the problem 100% cause users can change notebook mac address, if they have privilege, and bypass this rule but is better then you have today.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Mar 2022 12:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574347#M239814</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-03-19T12:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: My EAP-PEAP Setup</title>
      <link>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574392#M239823</link>
      <description>&lt;P&gt;What does your mean here that every device don need one unique certificate because as per my knowledge if we are using eap TLS we need user certificate and if there are 100 user in that case we need 100 user certificate isn't?&lt;/P&gt;</description>
      <pubDate>Sat, 19 Mar 2022 17:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574392#M239823</guid>
      <dc:creator>jain.manish94</dc:creator>
      <dc:date>2022-03-19T17:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: My EAP-PEAP Setup</title>
      <link>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574512#M239829</link>
      <description>&lt;P&gt;You can use a single generic certificate to authenticate every device, just like you can use a single PSK to authenticate every device. Although it’s not the most recommended way but sometime because of shortage of resource to manage Certificates and certificate authority people do that.&amp;nbsp;&lt;BR /&gt;Let’s say if you did that and a machine with cert is lost or stolen, that machine has access to network, how do you stop it ?? Well you revoke the cert but it was a generic cert so guess what now none of the devices will authenticate .. so ideally you want to have a unique cert per device. You have to access what your team is capable of managing and provisioning.&amp;nbsp;&lt;BR /&gt;there can a lot more reasons but I think you get the idea&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Mar 2022 04:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/my-eap-peap-setup/m-p/4574512#M239829</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2022-03-20T04:08:41Z</dc:date>
    </item>
  </channel>
</rss>

