12-06-2018 01:46 AM
I have a five year old deployment running 2.4 patch 4. When I built ISE I originally wanted domain computers to authenticate using EAP-TLS. For reasons I can't remember I could not get that working and I settled for MAB for machine authentication and PEAP-MSCHAPv2 for user authentication.
Yesterday I started to work with EAP-TLS authentication again and I got a wired authentication working for EAP-TLS. The problem is that I had several machines drop their sessions and try to use EAP-TLS. This totally locked their authentication and I was forced to turn of my EAP-TLS rule. The problem was that I created a whole new rule for EAP-TLS, but I made the mistake of putting the rule above my PEEP rule. I have since moved the EAP-TLS below PEAP, but my test machine stops at the PEAP rule with the error saying that I had a computer using a rule for authentication using username and password, but the machine is configured for certificate authentication.
I need some assistance with an authentication rule that will allow both EAP methods to live together without interference of each other. I'm wondering if under the PEAP and EAP-TLS authentication rules if I need to set the advanced options i.e. "if authentication failes" set it to "continue" rather than "reject" or something like that. Since I am making headway on EAP-TLS I would like to continue to get this working for wireless so I can have it complete to where all I have to do is set the GPO to pull the machine/user certificate and go live. Any assistance would be great. Thank you.
Solved! Go to Solution.
12-06-2018 02:58 AM
12-06-2018 01:55 AM
12-06-2018 02:13 AM
12-06-2018 02:58 AM
12-06-2018 03:13 AM
12-06-2018 04:46 AM
That's appears to have worked, but I will probably take this up with TAC. I would really like to see the individual authentication methods used in the live logs rather than having to expand the authentication detail. At any rate, thanks for your input.
12-06-2018 04:50 AM
You can do that without expanding the Authentication details. PFA the screenshot.
Just check those check boxes and drag them up or down to place the column where you want and this will help you check the auth method/protocol without opening live logs.
12-06-2018 03:06 AM
The way I do this is to create one Policy Set called Wireless 802.1X (or Wired 802.1X) and then in the allowed protocols you select PEAP and EAP-TLS only.
In the Authentication Rules you have one Rule for EAP-TLS where you specify your certificate profile, and for EAP-PEAP you can use whatever Identity Source Sequence that applies to you (e.g. AD Join Points etc.)
In Authorization you can perform all the necessary checks - again have one Rule per EAP Method.
12-06-2018 03:14 AM
12-06-2018 03:30 AM
12-06-2018 03:32 AM
12-06-2018 03:17 AM
12-06-2018 03:31 AM
12-06-2018 03:37 AM
12-06-2018 11:49 AM
The authentication protocol is listed in the live logs Authentication Protocol column. Also if you have a good naming convention on your authorization profiles you should know exactly what happened:
Wired_Dot1x_EAP-TLS_Domain_Computer
I have no questions when I see that in my logs.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide