03-02-2026 12:21 AM
I have an issue I hope someone could help me with. I am having an issue with 802.1x authentication on ISE. They are using PEAP with certificate computer only authentication and everything appears to be configured correctly but authentication continues to fail on Windows 11 wired clients. Note: They are using the same setup with Windows 10 clients and it works without any issues but with Windows 11 clients it fails on the wired connection but is successful with Windows 11 clients on the wireless connection. Basically it works everywhere correctly with the exception of the Windows 11 wired clients. Do you have any idea of what could be causing the issue?
Solved! Go to Solution.
03-02-2026 08:37 AM
To add to what others have said, take a look at the endpoint logs, they can often direct you into the right direction.
One item I'd like to point out, is that in windows11 there were some changes regarding the server validation.
In win10 and earlier, it used to be enough to have the CA in the trust store if you had server validation enabled/checked, but in some win11 update it became required to specifically select which CA you were going to trust.
One of the signs that people were running into this were that win11 clients failed where older clients worked.
Is it possible that this might be your case, and this might be correctly configured in your wifi GPO but not in the wired group policy?
Again, check the endpoints logs in the event viewer, they can be very valuable in determining why the authentication fails if it's the client refusing to continue the process.
03-02-2026 12:25 AM
@Maurice Ball Windows 11 credentials guard is likely causing the problem as PEAP is insecure and blocked, you'd need to move to certificate authentication EAP-TLS or PEAP-TLS
03-02-2026 12:55 AM
Thanks for the quick reply but the credential guard looks to be disabled. The system account also has full access to the certificate's private key and Windows 11 fast startup is disabled.
03-02-2026 01:05 AM
@Maurice Ball I assume the computers are still in the same OU in the domain and getting the GPO settings with the correct wired 802.1x authentication being applied?
What do the ISE logs give as the reason for failing to authenticate?
03-02-2026 01:11 AM
Correct. I am getting a 5440 error on ISE but it is showing that the handshake was successful.
03-02-2026 01:23 AM
@Maurice Ball usually an endpoint issue, take packet captures and run debugs on the switch.
03-02-2026 08:18 AM
Hi
Have you had a look at this thread regarding Windows 11 using TLS 1.3? It has a link to another thread showing how to disable this on windows 11 clients
hth
Andy
https://community.cisco.com/t5/network-access-control/ise-3-3-802-1x-eap-tls-tls1-3/td-p/5354087
03-02-2026 11:56 PM
I have not checked this so thanks for the information.
03-02-2026 08:37 AM
To add to what others have said, take a look at the endpoint logs, they can often direct you into the right direction.
One item I'd like to point out, is that in windows11 there were some changes regarding the server validation.
In win10 and earlier, it used to be enough to have the CA in the trust store if you had server validation enabled/checked, but in some win11 update it became required to specifically select which CA you were going to trust.
One of the signs that people were running into this were that win11 clients failed where older clients worked.
Is it possible that this might be your case, and this might be correctly configured in your wifi GPO but not in the wired group policy?
Again, check the endpoints logs in the event viewer, they can be very valuable in determining why the authentication fails if it's the client refusing to continue the process.
03-02-2026 11:56 PM
Ok, thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide