cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
158
Views
0
Helpful
3
Replies

LAPS with Cisco ISE

BlackDiamond71
Level 1
Level 1

I have Cisco ISE setup to use radius via our cisco switches and 802.1X configured on the user's machine. Everything seems to work fine, but when I login with our LAPS user account, LAPSUser (For this example), it won't properly apply the policy set because radius didn't authenticate. If I create an internal user with the same username and password it works, but I would rather not use that as a work around and am wondering if there is a way to do it without using certificates. I know I can setup MAB rules as well but I would rather not set that up for Workstations as well as that is quite tedious.

Example

For the authentication policy I have everything set to default and to just use "Continue" under options and won't work because authentication failed. I then tried to create a policy set if the username is LAPSUser and set everything to "Continue" and the failure reason is "Wrong Password".

Logs

Authentication Methoddot1x
Authentication ProtocolPEAP (EAP-MSCHAPv2)
Service TypeFramed
Event5400 Authentication failed
Failure Reason22063 Wrong password
ResolutionCheck the user credentials. Also check whether the password is wrong.
Root causeWrong password

 

24210Looking up User in Internal Users IDStore - LAPSUser0
 24212Found User in Internal Users IDStore2
 22063Wrong password1
 22057The advanced option that is configured for a failed authentication request is used0
 22060The 'Continue' advanced option is configured in case of a failed authentication request0
 11823EAP-MSCHAP authentication attempt failed0
 12305Prepared EAP-Request with another PEAP challenge0
 11006Returned RADIUS Access-Challenge0
 11001Received RADIUS Access-Request5
 11018RADIUS is re-using an existing session0
 12304Extracted EAP-Response containing PEAP challenge-response0
 11810Extracted EAP-Response for inner method containing MSCHAP challenge-response0
3 Replies 3

Greg Gibbs
Cisco Employee
Cisco Employee

I'm not sure I understand the use case here. LAPS is a unique local username/password in the Windows endpoint itself, so I'm not sure how you intend to use that in conjunction with PEAP(MSCHAPv2). With PEAP(MSCHAPv2), ISE would need a way to successfully authenticate the user using a username/password combination that can be checked against either the ISE internal Network Access Users database (which is not ideal) or an external identity store like AD.

Trying to work around this using the Options in the AuthC Policy to force the session to bypass Authentication after a failed attempt would negate much of the security behind the NAC solution.

You are correct. Technically you could setup an internal user with the same local admin name and change the password to it to authenticate, but that doesn't seem like the best way to do it.

If I used certificate signing and applied a certificate via the machine would that work better?

Again, it's unclear exactly what use case you are trying to implement. We would need more detail about the use case and expected flow to help.

For example, if you're trying to login as a local admin via RDP you will have issues as the Windows supplicant does not initiate an 802.1x user session for RDP.
https://community.cisco.com/t5/network-access-control/unable-to-rdp-to-windows-desktop-after-dot1x-enabled/td-p/4317334