cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
11181
Views
8
Helpful
9
Replies

ISE with LDAP using PEAP or MSCHAPv2

gugonza2
Cisco Employee
Cisco Employee

Hi Team,

I have a customer using LDAP and RADIUS using PEAP and MSCHAPv2 protocols.

They are evaluating ISE but, using ISE with LDAP is not supported PEAP or MSCHAPv2.

The customer is asking us for a reason,  what is the reason why ISE does´t support this protocols ?

Is in roadmap this ?   is going ISE to support them ?

Please your help in this question.

1 Accepted Solution

Accepted Solutions

ldanny
Cisco Employee
Cisco Employee

Its mainly due to planning and priority.

View solution in original post

9 Replies 9

ognyan.totev
Level 5
Level 5

I am not sure ,where you read that LDAP and these protocols are not supported ??

I am not tested this but i think it might work just you must create a New Identity Source Sequence

Where you will use AD and LDAP_AD

And use it in authorization policy . In authentication use protocols that you need for your deployment.

And i saw one more thing https://bst.cloudapps.cisco.com/bugsearch/bug/CSCul55352/?rfs=iqvred

Sorry for confusion in the note,  ISE support LDAP, but ISE will not support PEAP and MSCHAPv2 with LDAP, you can see the Table 2 "Authentication Protocols and Supported External Identity Sources" in the following link:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter…

The customer´s question is Why and if we have any roadmap for that ?

we do not discuss roadmaps in this forum.

please contact your Cisco representative for additional information.

Thanks Danny, sorry for roadmap question,  But, is there any reason why ISE don't´s support specific Authentication protocols such as PEAP and MSCHAPv2 ?

The way I understand it, it's a technical limitation of how the passwords are stored in the LDAP "database".

You can perform ASCII/PAP authentication to an LDAP directory (because the password that is sent in the auth request is simply a string comparison with the plain text password stored in the LDAP directory). But you cannot perform CHAP etc because there is neither a simple password sent by the client, nor is there a simple password stored on the external directory.  E.g. in AD, the client and server perform a handshake protocol, hence the name Challenge-Handshake Authentication Protocol  (I don't completely understand it - google it) and this is where the complexity comes in.

Have a read of this too

Deploying RADIUS: Protocol and Password Compatibility

If you want the real gory details (actually an excellent explanation by a somewhat militant sounding Alan de Kok (FreeRadius dev) then check this out Users - Chap auhtentication against LDAP

Having said that, Aruba Clearpass appears to support this. LDAP Authentication Source Configuration - so maybe the technical argument is an old one.

It's confusing for sure

ldanny
Cisco Employee
Cisco Employee

Its mainly due to planning and priority.

@ldanny  what do you mean by ""its a matter of planning and Priority".i have a similar scenario which a big client who wants global implementation for ISE and have been trying to find the solution

 

@gugonza2  how did you solve your situation

gugonza2
Cisco Employee
Cisco Employee

Thanks Arne, Danny for your answers. 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: