cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1739
Views
5
Helpful
4
Replies

Cisco ISE 3.1 (patch3) speaks with Active directory using ntlmv1

milos_p
Level 1
Level 1

Hi guys,

I am getting logs on DC that there is NTLMv1 communication from ISE server:

I can see this communication happening when Windows computer authenticates to ISE from WiFi network using PEAP (EAP-MSCHAPv2) with computer authentication. Looks like ISE takes MSCHAPv2 information and sends it to domain controller as NTLMv1 request, and I want it to be NTLMv2 due to the company security policy.

part of log: Protocol: Ntlm, IsNtlmV1: True, NtlmV1Count: 1

Apart from settings in Passive ID section to use ntlmv1 or ntlmv2 (ntlmv2 is checked, but we are NOT using passive ID), I cannot find anywhere to specify/force Cisco ISE to use ntlmv2 and not ntlmv1 when it speaks with DC to authenticate users coming from 802.1x networks.

Is there a way to force the use of ntlmv2 towards DCs, for EAP authentications (PEAP EAP-MSCHAPv2 in my case) coming from users?

Thanks a lot in advance!

Milos

 

1 Accepted Solution

Accepted Solutions

Greg Gibbs
Cisco Employee
Cisco Employee

MSCHAPv2 is NTLMv1 based. I'm not aware of a way to 'force' the protocol to use NTLMv2 when used with EAP, hence the known issues caused by MS Defender Credential Guard. Microsoft's recommendation is to use EAP-TLS instead.

View solution in original post

4 Replies 4

Greg Gibbs
Cisco Employee
Cisco Employee

MSCHAPv2 is NTLMv1 based. I'm not aware of a way to 'force' the protocol to use NTLMv2 when used with EAP, hence the known issues caused by MS Defender Credential Guard. Microsoft's recommendation is to use EAP-TLS instead.

Hi Greg,

 

Thanks for clarification, I assumed something like that is happening.

On the other side, although like you said MSCHAPv2 is by default NTLMv1 based, Microsoft enabled possibility in their RADIUS server (NPS) to use strictly NTLMv2 when NPS speaks with DC:

https://docs.microsoft.com/en-US/troubleshoot/windows-server/networking/rras-vpn-connections-fail-ms-chapv2-authentication

 

Is there some possibility like this in ISE, using Active Directory advanced tuning configuration?

Case is, this is big thing from Security Department perspective, as NTLMv1 raise some red flags.

 

Thanks a lot!

Milos

The VPN use case is completely different than the EAP use case, hence, the specific phrasing I used when I said "I'm not aware of a way to 'force' the protocol to use NTLMv2 when used with EAP".

This is a limitation of the protocol and the client supplicant, which is not something any configuration in ISE can change.

Hi Greg,

I really was hoping there is some hidden/advanced parameter that can force ISE to use NTLMv2 for this case.

Thanks again for great explanation and discussion!

 

Regards,

Milos