05-29-2020 08:18 AM
We are in the process of rolling out dot1x in a monitoring phase. We have machine and user certificate enrollment setup via gpo/active directory. Machine Certificates seem to working fairly consistently, but I am struggling on new user logins or admin's logging into a computer for the first time troubleshooting something....The NIC will show unauthenticated (the default ACL is currently permit ip any any to not disrupt traffic) and the authentication will fall back to MAB as there is no certificate for the logging in user in the store. Should we add something to the policy for mab/mar combination (I have read the pro's and con's of using mar) or leverage the AD probe to determine that the machine is part of the domain to give an authenticated result? I have struggled with this chicken and the egg scenario and hoping others have some suggestions on how to proceed.
Thanks,
Joe
Solved! Go to Solution.
06-01-2020 08:47 AM
06-01-2020 12:44 PM
I have confirmed that the Windows 10 "2004 May update" includes TEAP support.
05-30-2020 06:53 AM
05-31-2020 04:38 PM
The issue you're experiencing it due to the order of operations that Windows uses for the GPO and 802.1x processes. The certificate enrolment uses the GPO process, but the user 802.1x process kicks in before the user GPO so you run into this catch-22. The diagram below was pulled from an old Cisco document on 802.1x, but is still relevant. This is a common problem with using user auth with certificates.
There's not really an easy fix for this, but there are some options. I'm not sure if MAR will help as you don't really have a user credential to tie the 'was machine authenticated' attribute to (not sure if this will work with a subsequent MAB session).
Some options include:
When you move forward from Monitor Mode, you will need to consider similar issues with the computer auth for PC builds. See this post for further suggestions.
06-01-2020 08:24 AM
I have not found any specific information related to EAP-TEAP being available in the May release, does anyone have documentation or evidence that it is now supported?
I have thought about the CWA to allow for "onboarding", we currently do have CWA for guest access, although most of our guest access is wireless, so we haven't tested much on the wired.
Thanks,
Joe
06-01-2020 08:47 AM
06-01-2020 09:10 AM
Thanks for the link...that is very promising. I have looked at the release notes for Windows 10 Build 2004 and don't see any information on TEAP https://docs.microsoft.com/en-us/windows/whats-new/whats-new-windows-10-version-2004
I have posted this question on the www.ise-support.com site to get more clarity.
Thanks,
Joe
06-01-2020 12:44 PM
I have confirmed that the Windows 10 "2004 May update" includes TEAP support.
06-02-2020 08:01 PM - edited 06-02-2020 08:03 PM
[MS-GPWL]: Group Policy: Wireless/Wired Protocol Extension > 8 Change Tracking shows,
EAP-TEAP method is supported on Windows 10 v2004 and later.
Section |
Description |
Revision class |
---|---|---|
2.2.3.2.1 EapHostConfig Element |
Added Config Format 'EapTeapConnectionPropertiesV1' of method type '55 (EAP-TEAP)' to method implementation configuration formatting table. Also updated behavior note 25 to specify 'EAP-TTLS' method product support and that 'EAP-TEAP method is supported on Windows 10 v2004 and later. |
Major |
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide