<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD credential during de 802.1x wireless SSID connection in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5088755#M271005</link>
    <description>&lt;P&gt;If your users are prompted to trust a certificate, the rest of the security mechanisms are basically useless because this is the number one attack surface for 802.1X. Always make sure that the machine is already trusting your root cert through GPOs or MDM.&lt;/P&gt;
&lt;P&gt;For the rest of the question,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291804"&gt;@Mark Elsen&lt;/a&gt;&amp;nbsp;gave an important hint. Use client certificates. With them, only a user or device with a certificate can connect, and the user password is not used in the authentication process. Using certificates and setting up a CA is one of the most challenging parts of the wireless security setup. Better get someone to help you with that.&lt;/P&gt;</description>
    <pubDate>Fri, 03 May 2024 12:50:17 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2024-05-03T12:50:17Z</dc:date>
    <item>
      <title>AD credential during de 802.1x wireless SSID connection</title>
      <link>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5088586#M271003</link>
      <description>&lt;P&gt;Dear Community.&lt;/P&gt;&lt;P&gt;I configured a SSID for employees to use, then selected the security type of this SSID as 802.1x. I made the necessary configurations on WLC and ISE. Currently, an employee can authenticate and connect to the wireless network through the certificate installed on the computer during Uitrol. In this process, when the employee clicks on the SSID, he does not enter any username or password, he just says trust the certificate and connects to the network.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;My question is this: If someone wants to connect to this SSID with an external device that is not in AD, a screen appears asking for username and password. Here, this network may become vulnerable to attacks such as bruteforce attacks. Is there an effective way to prevent this? When an external device wants to connect to this SSID, is it possible to reject the direct connection request if it does not have a certificate?&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 10:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5088586#M271003</guid>
      <dc:creator>yakp</dc:creator>
      <dc:date>2024-05-03T10:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: AD credential during de 802.1x wireless SSID connection</title>
      <link>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5088727#M271004</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;U&gt;&lt;STRONG&gt;&lt;EM&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;gt;...&lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;SPAN&gt;&lt;U&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;is it possible to reject the direct connection request if it does not have a certificate?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&amp;nbsp; - Essentially not because connecting to&amp;nbsp; an SSID is just like connecting a cable to an outlet , you could probably configure the ISE policy as such that &lt;U&gt;both&lt;/U&gt; &lt;FONT color="#0000FF"&gt;&lt;EM&gt;machine certificate&lt;/EM&gt;&lt;/FONT&gt; and user authentication is required if the latter is tried ,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 12:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5088727#M271004</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-05-03T12:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: AD credential during de 802.1x wireless SSID connection</title>
      <link>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5088755#M271005</link>
      <description>&lt;P&gt;If your users are prompted to trust a certificate, the rest of the security mechanisms are basically useless because this is the number one attack surface for 802.1X. Always make sure that the machine is already trusting your root cert through GPOs or MDM.&lt;/P&gt;
&lt;P&gt;For the rest of the question,&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291804"&gt;@Mark Elsen&lt;/a&gt;&amp;nbsp;gave an important hint. Use client certificates. With them, only a user or device with a certificate can connect, and the user password is not used in the authentication process. Using certificates and setting up a CA is one of the most challenging parts of the wireless security setup. Better get someone to help you with that.&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 12:50:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5088755#M271005</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2024-05-03T12:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: AD credential during de 802.1x wireless SSID connection</title>
      <link>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5104850#M271553</link>
      <description>&lt;P&gt;Thanks for your comment Marce.&amp;nbsp;How can i both &lt;SPAN&gt;configure. I have already machine certiciate configured. For user authentication What should i choose in ISE policy?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 09:50:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ad-credential-during-de-802-1x-wireless-ssid-connection/m-p/5104850#M271553</guid>
      <dc:creator>yakp</dc:creator>
      <dc:date>2024-05-15T09:50:23Z</dc:date>
    </item>
  </channel>
</rss>

