01-23-2023 05:50 PM
Hello All,
We need some assistance and guidance as we are trying to test EAP chaining using EAP TEAP on ISE 3.1 P5 for windows 10 laptops with latest updates . We followed the following documents for EAP-TEAP configuration and pushing GPO for TEAP
We notice that we are not able to get the user and machine authentication successful in one session , on ISE we only see machine authentication with host/machine name . Even though the user logs in successful there is no log on ISE. On Switch side , we do not see the actual username coming from endpoint, it is only anonymous which we see.
We checked the radius live log and we see a statement ' supplicant decline the inner EAP method' , we followed the GPO settings on Cisco community forum. Please note we never used wired802.1x using certs so not sure if user certificate is needed as we only have rootCA on machine. Please advise which inner EAP method is talked about here, I tried to allow all protocols under " allowed protocols" but nothing worked
There are zero hitcounts on user and machine succeeded policy and all logs are for user failed and machine successful
Please suggest, we also had a TAC case but no relevant information.
Regards
Mehnaz
01-23-2023 07:28 PM
TEAP is an outer EAP method that uses either EAP-TLS or MSCHAPv2 as an inner method to provide credentials. If you are configuring the supplicant the same as the referenced documentation (authentication mode is 'User or computer authentication' and EAP method 'Smart card or other certificate'), then the supplicant is using TEAP(EAP-TLS) and you would need both a Computer and User certificate enrolled on the computer. If you do not have a User certificate, the supplicant is unable to provide a credential for User authentication.
01-23-2023 08:24 PM
Hello MehnazKhan2492, I hope you are doing well, I would suggest, if you are using native supplicant of windows, to configure it manually, without GPOs, this will allow you to play more with the settings and do test for the authentications using TEAP, with the different options and inner methods, once you make it work, with the easier way which is MSCHAPv2, then you can move to EAP-TLS where you'll require auto-enrollment and provide a certificate(separate process from MSFT CA), once you finish and feel comfortable with those tests and the successful authentications I'd recommend you to go ahead with the GPO.
01-25-2023 09:09 AM
Thanks for the suggestion,
is there a document in Cisco Repository which talks about enrolling user certificates + TEAP as explained in https://community.cisco.com/t5/security-knowledge-base/teap-for-windows-10-using-group-policy-and-ise-teap/ta-p/4134289
The above link does not add the user certificate using GPO.
Regards,
Mehnaz
01-26-2023 01:36 PM
Information on creating Group Policy to auto-enroll User certificates with your Microsoft PKI (AD Certificate Services) is provided by Microsoft.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide