Machine Authentication On One Vlan, User authentication on another

I am trying to have my wireless users authenticate the machines on one vlan and then based upon the user id from AD switch to another vlan if required.  I have it working just fine except when the user logs on and ACS forces the new vlan, the IP stack goes to "Limited Access" because the ip address hasn't released and renewed.  Because of this until they turn off and turn the wireless card back on they go no where and log on routines such as scripts and user group policies don't execute.  Any help would be appreciated.                  

Mark,
See if this article helps you resolve your issues, Cisco latest supplicant anyconnect NAM is the supplicant that replaced the CSSC.
http://social.technet.microsoft.com/Forums/en-US/winserverNAP/thread/f68dc3f0-744a-4d0f-b85a-87f8bc531fd0
Thanks,
Tarik Admani
*Please rate helpful posts*

Similar Messages

  • Moving itunes account from one windows user account to another....

    Hello! I really hope some one here can help!
    I use one of two user accounts on my comp, my boyfriend is the "owner" and I have my own. For separate itunes accounts .... Something is messed up with my profile on this user account and an IT friend told me he thinks that I should just delete my whole profile from the OWNER one and start over, saving anything i need beforehand.
    I was about to do that until I realised that my Itunes account would also be gone.
    Is there any way that I can transfer my itunes account to another user account on my computer without losing everything and having to start over???
    Pllllease & thank you!!!

    Well, if all of the music is in My Music\iTunes, then just copy that folder.
    If it isn't:
    If it's in a shared location, such as the root of the drive, and both account are accessing it, then ignore the music, and transfer just the 'iTunes' folder within My Music.
    If it's in an account specific location (like on your desktop), first consolidate it to your My Music, then transfer that folder.
    <hr>
    Consolidating the Music Library

  • ISE 1.3 Why are Windows endpoints defaulting to 802.1x machine authentication in wireless profile and not User or User&Computer

    We are running ISE 1.3 tied to AD with WLC 7.6.130.0.  Our ISE has a GoDaddy (none wildcard) certificate loaded for https and EAP.  We are just running PEAP.  We have a mix of IOS, Android, and Windows 7/8 devices.  IOS and Android devices can self create a wireless profile and after entering credentials can connect without issue.  Our Windows 7/8 devices, when auto creating a wireless profile are selecting 802.1x machine authentication instead of User authentication or the best option which is machine or user authentication.  This is problematic as we do allow for machine authentication but have an authorization rule limiting machine auth to domain controller and ISE connectivity only.  This is to allow domain Windows 7/8 devices to have domain connectivity prior to user sign-in but force user auth to get true network connectivity.  The problem is why are the Windows devices not auto setting to user authentication (as I think they did when we ran ISE1.2), or the best option which is to allow both types of authentication?  I have limited authentication protocols to just EAP CHAP and moved the machine auth profile to the bottom of the list.  Neither have helped.  I also notice that the Windows 7/8 endpoints have to say allow connectivity several times even though we are using a global and should be trusted certificate authority (probably a separate issue).
    Thank you for any help or ideas,

    When connecting a windows device to the ISE enabled SSID when there is not a saved wireless profile on that machine, it will connect and auto create the profile.  In that profile, 802.1x computer authentication option is chosen by windows.  That has to be changed to computer or user for the machine to function correctly on the network.
    On 1.2, this behavior was different.  The Windows device would auto select user authentication by default.  At other customer sites, windows devices auto select user authentication.  This of course needs  to be changed to user or computer in order to support machine auth, but at least the default behavior of user authentication would allow machines to get on the network and functional easily to begin with.

  • Machine Authentication and User Authentication with ACS v5.1... how?

    Hi!
    I'm having trouble setting up Machine Authentication and User Authentication on ACS v5.1 using WinXP SP3 (or SP2) as supplicant.
    This is the goal:
    On wireless (preferably on wired too) networks, get the WinXP to machine authenticate against AD using certificates so the machine is possible to reach via for example ping, and it can also get GPO Updates.
    Then, when the user actually logs in, I need User Authentication, so we can run startup scripts, map the Home Directory and so on.
    I have set up a Windows Sertificate server, and the client (WinXP) are recieving both machine and user certificates just fine.
    I have also managed to set up so Machine Authenticaton works, by setting up a policy rule that checks on certificate only:
    "Certificate Dictionary:Common Name contains .admin.testdomain.lan"
    But to achieve that, I had to set EAP Type in WinXP to Smart Card or other Certificate, and then no PEAP authentication occurs, which I assume I need for User Authentication? Or is that possible by using Certificates too?
    I just don't know how to do this, so is there a detailed guide out there for this? I would assume that this is something that all administrators using wireless and WinXP would like to achieve.
    Thank you.

    Hello again.
    I found out how to do this now..
    What I needed to do was to add a new Certificate Authentication Profile that checks against Subject Alternative Name, because that was the only thing I could find that was the same in both user certificate and machine certificate.
    After adding that profile to the Identity Store Sequences, and making tthe appropriate rule in the policy, it works.
    You must also remember to change the AuthMode option in Windows XP Registry to "1".
    What I really wanted to do was to use the "Was Machine Authenticated" condition in the policies, but I have never gotten that conditon to work, unfortunately.
    That would have plugged a few security holes for me.

  • ACS 5.2 Machine Authentication and AD user

    I am trying to setup up a rule to allow wireless access only to users in my AD when they use computers from my AD.
    I have Machine authentication working on it's own (computer boots up and connects to wireless - confrimed by ACS logs)
    I have User authentication working
    But when I try to creat the floowing rule:

    I solved it. I seem that you have to have "Machine Access Restrictions" (External Identity Stores > Active Directory) checked. then it works.

  • Anyconnect 802.1x - "switch user" is blocked in machine authentication

    hi all,
    I know this is not a bug its a feature
    that anyconnect blocks user switching disallowing the computer to have them both logged in. Its desirable and understandable
    however
    I have an environment where I use only machine authentication and remote helpdesk needs to connect to these machines using some application then they "switch user" to do their tasks (its important not to logoff cause there are some transactions in the background ...)
    Is there any chance that the new version of anyconnect will have this feature (maybe its already planned on the roadmap ? )
    for machine authentication there should be a checkbox for profile administrator to "allow/disallow users to switch"
    or maybe there is already some trick/configuration step that I missed and it can be done?
    regards
    Przemek

    hi all,
    I know this is not a bug its a feature
    that anyconnect blocks user switching disallowing the computer to have them both logged in. Its desirable and understandable
    however
    I have an environment where I use only machine authentication and remote helpdesk needs to connect to these machines using some application then they "switch user" to do their tasks (its important not to logoff cause there are some transactions in the background ...)
    Is there any chance that the new version of anyconnect will have this feature (maybe its already planned on the roadmap ? )
    for machine authentication there should be a checkbox for profile administrator to "allow/disallow users to switch"
    or maybe there is already some trick/configuration step that I missed and it can be done?
    regards
    Przemek

  • 802.1x Wireless - Enforce user AND machine authentication

    I am using ACS v5.6 and I'd like to confirm that it is not possible to enforce both user and machine authentication against AD before allowing wireless access to Windows 7 clients, using PEAP/MSCHAPv2 and the built-in 802.1x supplicant.
    The only workaround seems to involve MAR (Machine Access Restrictions), which has pretty significant drawbacks.
    I'd rather not have to deploy user and machine certificates.
    All I want to do is allow access to the wireless network only if the device and the user are in AD.
    It's such a simple scenario that I must be missing something.
    Any suggestions are welcome. Thanks in advance for your comments.
    Lucas

    In my opinion, the only solution that works is using NAM and EAP-Chaining with ISE as radius backend, last time i looked in ACS release notes was 5.4, and it didn't have eap-chaining support.
    Using the built-in windows supplicant will only authenticate user or machine at any time, not both. As you discovered, the feature called MAR used to be what was being recommended (mostly because nothing else existed), What most people miss when they say this will work fine with windows supplicant and acs, is the fact that you cannot be sure that when the user authenticates, he is doing it from an authenticated machine, this is mainly due to the shortcomings.of MAR. You should consider migrating to ISE if you are not using any TACACS features on ACS.

  • Enforce AnyConnect client to do machine authentication when user is logged on

    Hi All,
    I want to use AnyConnect as a supplicant to our corporate WLAN and also use Machine Authentication feature on ACS 5.3.
    Is there a way how to enforce AnyConnect client to do machine authentication when user is logged on? Sometimes can happen, when user just hybernate the computer and do not log off and log on. If they don't do this in some period, then they are not allowed to use WLAN.
    Thanks for your help.
    Regards
    Karel

    The problem appears to be if a user hibernate or ACS is reloaded and machine authentication  timer expired and user need to logout and wait or reboot the machine. After that it authenticates and then user can login again.  Anyconnect 3.1 will allow eap chainging and should be able to address that problem.

  • AD Machine Authentication with Cisco ISE problem

    Hi Experts,
    I am new with ISE, I have configured ISE & Domain computers for PEAP authentication. initially machine gets authenticated and then starts going MAB.
    Authentication policy:
    Allowed protocol = PEAP & TLS
    Authorization Policy:
    Condition for computer to be checked in external identity store (AD) = Permit access
    Condition for users to be checked in external identity store (AD) plus WasMachineAuthenticated = permit access
    All of the above policies do match and download the ACL from ISE but computer starts to mab authentication again...
    Switchport configuration:
    ===============================================
    ip access-list extended ACL-DEFAULT
    remark Allow DHCP
    permit udp any eq bootpc any eq bootps
    remark Allow DNS
    permit udp any any eq domain
    permit ip any host (AD)
    permit icmp any any
    permit ip any host (ISE-1)
    permit ip any host  (ISE-2)
    permit udp any host (CUCM-1) eq tftp
    permit udp any host (CUCM-2)eq tftp
    deny ip any any
    ===============================================
    switchport config
    ===============================================
    Switchport Access vlan 10
    switchport mode access
    switchport voice vlan 20
    ip access-group ACL-DEFAULT in
    authentication open
    authentication event fail action next-method
    authentication event server dead action authorize vlan 1
    authentication event server alive action reinitialize
    authentication host-mode multi-domain
    authentication order dot1x mab
    authentication priority dot1x mab
    authentication port-control auto
    authentication periodic
    authentication timer reauthenticate server
    authentication timer inactivity 180
    authentication violation restrict
    mab
    dot1x pae authenticator
    dot1x timeout tx-period 100
    ====================================================
    One more problem about the "authentication open" and default ACL. Once the authentication succeeds and per user is ACL pushed though ISE to the switch. The default ACL still blocks communication on this switchprort.
    Your help will highly appreciated.
    Regards,

    You need to watch the switch during an authentication, see if the machine is passing authentication and the user may be failing authentication causing the switch to fail to mab.  If your switch configuration is on auth failure continue to next method, then this makes sense.  The question is why is the user failing auth but the machine is passing, could be something in the policy.  Make sure your AD setup has machine authentciation checked or it may not tie the machine and user auth together and the user may be failing because ISE can't make that relationship so the machinewasauth=true is not beeing matched.  Easy way to check is remove that rule from your policy and see if the same thing happens.
    I've also seen this happen when clients want to use EAP-TLS on the wired, machines passes auth, then the user logs into a machine for the first time.  The user auth kicks off before the user gets a cert and fails auth with a null certificate, since this is a auth failure the switchport kicks over to MAB.
    I don't think wasmachineauth=true is that great, I prefer to use EAP-FASTv2 using Cisco Anyconnect NAM with eap-chaining.  This is great because you can do two part authentication.  EAP-FAST outer with EAP-TLS inner for the machine auth, and MSCHAPv2 for the inner of the user auth. You get your EAP-TLS auth for the machine and don't have to worry about a user logging into a machine for the first time and switching to MAB because the user doesn't have a cert yet.  I also do my rule to say if machine pass and user fail, then workstaion policy, if machine and user pass then corp policy.

  • Machine authentication in Aironet

    i'm trying to authenticate laptops to Active directory before joining wireless AP (aironet 1240A)
    i'm using EAP in AP
    and PEAP with certificates in NPS
    i'm forcing laptops to use "computer authentication" through a GPO
    certificates already deployed to All machines
    policy is configured in NPS with "machine group" condition
    the problem i'm facing that their is some laptops are authenticated successfully while the others are not
    all machines are using windows 7 and located in the same Active Directory OU (same GPO applied)
    here is what i saw in AP after enabling debug radius authentication
    the working machines
    *Mar  4 20:25:34.125: RADIUS/ENCODE(00000009):Orig. component type = DOT11
    *Mar  4 20:25:34.125: RADIUS:  AAA Unsupported Attr: ssid              [265] 9  
    *Mar  4 20:25:34.126: RADIUS:   63 6F 72 70 6F 72 61                             [corpora]
    *Mar  4 20:25:34.126: RADIUS:  AAA Unsupported Attr: interface         [157] 3  
    *Mar  4 20:25:34.126: RADIUS:   32                                               [2]
    *Mar  4 20:25:34.126: RADIUS(00000009): Config NAS IP: X.Y.64.229
    *Mar  4 20:25:34.126: RADIUS/ENCODE(00000009): acct_session_id: 8
    *Mar  4 20:25:34.126: RADIUS(00000009): Config NAS IP: X.Y.64.229
    *Mar  4 20:25:34.126: RADIUS(00000009): sending
    *Mar  4 20:25:34.127: RADIUS(00000009): Send Access-Request to X.Y.64.30:1812 id 1645/8, len 160
    *Mar  4 20:25:34.127: RADIUS:  authenticator AC E6 88 FF CD B5 F3 CE - EA 56 67 37 2F 72 B5 C5
    *Mar  4 20:25:34.127: RADIUS:  User-Name           [1]   23  "host/FADI-LT.domain.com"
    *Mar  4 20:25:34.127: RADIUS:  Framed-MTU          [12]  6   1400               
    *Mar  4 20:25:34.128: RADIUS:  Called-Station-Id   [30]  16  "0027.0c68.1dc0"
    *Mar  4 20:25:34.128: RADIUS:  Calling-Station-Id  [31]  16  "0811.9699.ba30"
    *Mar  4 20:25:34.128: RADIUS:  Service-Type        [6]   6   Login                     [1]
    *Mar  4 20:25:34.128: RADIUS:  Message-Authenticato[80]  18
    *Mar  4 20:25:34.128: RADIUS:   1C 45 ED 5A 5D 1E DA 88 73 E5 D3 16 9F A2 62 A9  [?E?Z]???s?????b?]
    *Mar  4 20:25:34.128: RADIUS:  EAP-Message         [79]  28
    *Mar  4 20:25:34.128: RADIUS:   02 02 00 1A 01 68 6F 73 74 2F 46 41 44 49 2D 4C  [?????host/FADI-L]
    *Mar  4 20:25:34.129: RADIUS:   54 2E 61 64 61 73 69 2E 61 65                    [T.domain.com]
    *Mar  4 20:25:34.129: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    *Mar  4 20:25:34.129: RADIUS:  NAS-Port            [5]   6   263                
    *Mar  4 20:25:34.129: RADIUS:  NAS-Port-Id         [87]  5   "263"
    *Mar  4 20:25:34.129: RADIUS:  NAS-IP-Address      [4]   6   10.10.64.229       
    *Mar  4 20:25:34.129: RADIUS:  Nas-Identifier      [32]  4   "AP"
    *Mar  4 20:25:34.166: RADIUS: Received from id 1645/8 10.10.64.30:1812, Access-Challenge, len 90
    *Mar  4 20:25:34.167: RADIUS:  authenticator 36 94 18 74 91 6F AA 0E - D4 D7 DC 48 A8 53 43 68
    *Mar  4 20:25:34.167: RADIUS:  Session-Timeout     [27]  6   30                 
    *Mar  4 20:25:34.167: RADIUS:  EAP-Message         [79]  8
    *Mar  4 20:25:34.167: RADIUS:   01 03 00 06 0D 20                                [????? ]
    *Mar  4 20:25:34.167: RADIUS:  State               [24]  38
    the non working machines
    *Mar  4 20:26:18.949: RADIUS/ENCODE(0000000A):Orig. component type = DOT11
    *Mar  4 20:26:18.949: RADIUS:  AAA Unsupported Attr: ssid              [265] 9  
    *Mar  4 20:26:18.949: RADIUS:   63 6F 72 70 6F 72 61                             [corpora]
    *Mar  4 20:26:18.949: RADIUS:  AAA Unsupported Attr: interface         [157] 3  
    *Mar  4 20:26:18.949: RADIUS:   32                                               [2]
    *Mar  4 20:26:18.949: RADIUS(0000000A): Config NAS IP: X.Y.64.229
    *Mar  4 20:26:18.950: RADIUS/ENCODE(0000000A): acct_session_id: 9
    *Mar  4 20:26:18.950: RADIUS(0000000A): Config NAS IP: X.Y.64.229
    *Mar  4 20:26:18.950: RADIUS(0000000A): sending
    *Mar  4 20:26:18.950: RADIUS(0000000A): Send Access-Request to X.Y.64.30:1812 id 1645/11, len 150
    *Mar  4 20:26:18.951: RADIUS:  authenticator 17 64 A0 78 8E 49 12 7C - 79 8A 55 17 79 1F D5 A1
    *Mar  4 20:26:18.951: RADIUS:  User-Name           [1]   18  "domain\username"
    *Mar  4 20:26:18.951: RADIUS:  Framed-MTU          [12]  6   1400               
    *Mar  4 20:26:18.951: RADIUS:  Called-Station-Id   [30]  16  "0027.0c68.1dc0"
    *Mar  4 20:26:18.951: RADIUS:  Calling-Station-Id  [31]  16  "0022.faf1.9258"
    *Mar  4 20:26:18.951: RADIUS:  Service-Type        [6]   6   Login                     [1]
    *Mar  4 20:26:18.951: RADIUS:  Message-Authenticato[80]  18
    *Mar  4 20:26:18.951: RADIUS:   06 FC 55 89 6D 45 AA E5 8A 73 73 2C 82 87 28 BA  [??U?mE???ss,??(?]
    *Mar  4 20:26:18.952: RADIUS:  EAP-Message         [79]  23
    *Mar  4 20:26:18.952: RADIUS:   02 02 00 15 01 41 44 41 53 49 5C 66 61 64 69 2E  [?????domain\user]
    *Mar  4 20:26:18.952: RADIUS:   61 64 6D 69 6E                                   [name]
    *Mar  4 20:26:18.952: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    *Mar  4 20:26:18.952: RADIUS:  NAS-Port            [5]   6   264                
    *Mar  4 20:26:18.952: RADIUS:  NAS-Port-Id         [87]  5   "264"
    *Mar  4 20:26:18.952: RADIUS:  NAS-IP-Address      [4]   6   X.Y.64.229       
    *Mar  4 20:26:18.953: RADIUS:  Nas-Identifier      [32]  4   "AP"
    *Mar  4 20:26:18.980: RADIUS: Received from id 1645/11 X.Y.64.30:1812, Access-Challenge, len 90
    *Mar  4 20:26:18.980: RADIUS:  authenticator 54 84 DD 91 72 03 E9 08 - EA 61 C0 B3 B5 D6 9A 42
    *Mar  4 20:26:18.981: RADIUS:  Session-Timeout     [27]  6   30                 
    *Mar  4 20:26:18.981: RADIUS:  EAP-Message         [79]  8
    *Mar  4 20:26:18.981: RADIUS:   01 03 00 06 0D 20                                [????? ]
    *Mar  4 20:26:18.981: RADIUS:  State               [24]  38
    *Mar  4 20:26:18.981: RADIUS:   15 D3 02 D9 00 00 01 37 00 01 02 00 0A 0A 40 1E  [???????7??????@?]
    *Mar  4 20:26:18.982: RADIUS:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08  [????????????????]
    *Mar  4 20:26:18.982: RADIUS:   55 9E B9 77                                      [U??w]
    *Mar  4 20:26:18.982: RADIUS:  Message-Authenticato[80]  18
    *Mar  4 20:26:18.982: RADIUS:   1A EC 06 E6 E0 46 C4 06 15 87 E9 26 30 49 63 47  [?????F?????&0IcG]
    *Mar  4 20:26:18.983: RADIUS(0000000A): Received from id 1645/11
    *Mar  4 20:26:18.983: RADIUS/DECODE: EAP-Message fragments, 6, total 6 bytes
    *Mar  4 20:26:18.986: RADIUS/ENCODE(0000000A):Orig. component type = DOT11
    *Mar  4 20:26:18.986: RADIUS:  AAA Unsupported Attr: ssid              [265] 9  
    *Mar  4 20:26:18.986: RADIUS:   63 6F 72 70 6F 72 61                             [corpora]
    *Mar  4 20:26:18.987: RADIUS:  AAA Unsupported Attr: interface         [157] 3  
    *Mar  4 20:26:18.987: RADIUS:   32                                               [2]
    *Mar  4 20:26:18.987: RADIUS(0000000A): Config NAS IP: X.Y..64.229
    *Mar  4 20:26:18.987: RADIUS/ENCODE(0000000A): acct_session_id: 9
    *Mar  4 20:26:18.987: RADIUS(0000000A): Config NAS IP: X.Y..64.229
    *Mar  4 20:26:18.987: RADIUS(0000000A): sending
    *Mar  4 20:26:18.988: RADIUS(0000000A): Send Access-Request to 10.10.64.30:1812 id 1645/12, len 173
    *Mar  4 20:26:18.988: RADIUS:  authenticator 37 26 0B EC 12 5D 6A E5 - 22 1A 27 4A B0 5B E2 AA
    *Mar  4 20:26:18.988: RADIUS:  User-Name           [1]   18  "domain\username"
    *Mar  4 20:26:18.988: RADIUS:  Framed-MTU          [12]  6   1400               
    *Mar  4 20:26:18.988: RADIUS:  Called-Station-Id   [30]  16  "0027.0c68.1dc0"
    *Mar  4 20:26:18.988: RADIUS:  Calling-Station-Id  [31]  16  "0022.faf1.9258"
    *Mar  4 20:26:18.988: RADIUS:  Service-Type        [6]   6   Login                     [1]
    *Mar  4 20:26:18.988: RADIUS:  Message-Authenticato[80]  18
    *Mar  4 20:26:18.989: RADIUS:   3D 11 05 D8 6E DF 92 2B 51 EC BA BA FB C4 10 5F  [=???n??+Q??????_]
    *Mar  4 20:26:18.989: RADIUS:  EAP-Message         [79]  8
    *Mar  4 20:26:18.989: RADIUS:   02 03 00 06 03 19                                [??????]
    *Mar  4 20:26:18.989: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    *Mar  4 20:26:18.989: RADIUS:  NAS-Port            [5]   6   264                
    *Mar  4 20:26:18.989: RADIUS:  NAS-Port-Id         [87]  5   "264"
    *Mar  4 20:26:18.989: RADIUS:  State               [24]  38
    *Mar  4 20:26:18.990: RADIUS:   15 D3 02 D9 00 00 01 37 00 01 02 00 0A 0A 40 1E  [???????7??????@?]
    *Mar  4 20:26:18.990: RADIUS:   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08  [????????????????]
    *Mar  4 20:26:18.990: RADIUS:   55 9E B9 77                                      [U??w]
    *Mar  4 20:26:18.990: RADIUS:  NAS-IP-Address      [4]   6   X.Y.64.229       
    *Mar  4 20:26:18.990: RADIUS:  Nas-Identifier      [32]  4   "AP"
    *Mar  4 20:26:18.992: RADIUS: Received from id 1645/12 10.10.64.30:1812, Access-Reject, len 44
    *Mar  4 20:26:18.992: RADIUS:  authenticator 76 30 DF F4 7A 36 AC E7 - 20 AA 83 C1 05 8B 62 EC
    *Mar  4 20:26:18.992: RADIUS:  EAP-Message         [79]  6
    *Mar  4 20:26:18.993: RADIUS:   04 03 00 04                                      [????]
    *Mar  4 20:26:18.993: RADIUS:  Message-Authenticato[80]  18
    *Mar  4 20:26:18.993: RADIUS:   FD 21 74 AF A8 7F A1 A5 9E CE 3A 35 45 DA EA C9  [?!t???????:5E???]
    *Mar  4 20:26:18.993: RADIUS(0000000A): Received from id 1645/12
    *Mar  4 20:26:18.994: RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes
    *Mar  4 20:26:18.994: %DOT11-7-AUTH_FAILED: Station 0022.faf1.9258 Authentication failed
    obviously the machine who send machine name (host\machinename) will be authenticated successfully
    and machines who send username (domain\username) will not be authenticated successfully
    now
    i tested those unsuccessful machines in a wired  dot1x switch using the same NPS policy and they were sending their machine names instead of usernames and they were authenticated successfully
    i suspected that this is maybe because of the AP config
    here it is
    Current configuration : 2662 bytes
    version 12.4
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname AP
    enable secret 5 $1$gtul$Uhe4qVAC8GN0drownggAb0
    aaa new-model
    aaa group server radius rad_eap
     server X.Y.64.30 auth-port 1812 acct-port 1813
    aaa group server radius rad_mac
    aaa group server radius rad_acct
    aaa group server radius rad_admin
    aaa group server tacacs+ tac_admin
    aaa group server radius rad_pmip
    aaa group server radius dummy
    aaa authentication login eap_methods group rad_eap
    aaa authentication login mac_methods local
    aaa authorization exec default local
    aaa accounting network acct_methods start-stop group rad_acct
    aaa session-id common
    ip domain name domain
    dot11 ssid corporate
       vlan 64
       authentication open eap eap_methods
       authentication network-eap eap_methods
       authentication key-management wpa version 2
       mbssid guest-mode
    dot11 network-map
    power inline negotiation prestandard source
    username Cisco password 7 13261E010803
    bridge irb
    interface Dot11Radio0
     no ip address
     no ip route-cache
     encryption mode ciphers aes-ccm
     encryption vlan 64 mode ciphers aes-ccm
     ssid corporate
     mbssid
     station-role root
    interface Dot11Radio0.64
     encapsulation dot1Q 64 native
     no ip route-cache
     bridge-group 1
     bridge-group 1 subscriber-loop-control
     bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding
     bridge-group 1 spanning-disabled
    interface Dot11Radio1
     no ip address
     no ip route-cache
     shutdown
     no dfs band block
     channel dfs
     station-role root
     bridge-group 1
     bridge-group 1 subscriber-loop-control
     bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding
     bridge-group 1 spanning-disabled
    interface FastEthernet0
     no ip address
     no ip route-cache
     duplex auto
     speed auto
    interface FastEthernet0.64
     encapsulation dot1Q 64 native
     no ip route-cache
     bridge-group 1
     no bridge-group 1 source-learning
     bridge-group 1 spanning-disabled
    interface BVI1
     ip address X.Y.64.229 255.255.255.0
     no ip route-cache
    ip default-gateway X.Y.64.1
    ip http server
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip radius source-interface BVI1
    snmp-server community cable RO
    snmp-server enable traps tty
    radius-server attribute 32 include-in-access-req format %h
    radius-server host X.Y.64.30 auth-port 1812 acct-port 1813 key 7 104F0D18161E2D1E0D071538212B213036
    radius-server vsa send accounting
    bridge 1 route ip
    line con 0
    line vty 5 15
    end

    Hi,
    You will need o be more specific so we can help you.
    What exactly is happening/not working?
    Please keep in mind that with MAR, the PC needs to do machine authentication prior to user login, as the ACS will only allow users to login from previously authenticated machines.
    Is your PC doing machine authentication?
    HTH,
    Tiag
    If  this helps you and/or answers your question please mark the question as  "answered" and/or rate it, so other users can easily find it.

  • Machine authentication using certificates

    Hi,
    I am facing this error while machine authenticates agaist AD for wireless users. My requirement is users with corporate laptop get privileged vlan and BYOD should get normal vlan.I am using Cisco ISE 1.1.1 and configured authentication policies to diffrenciate clients based on corp asset and BYOD. Authentication policy result is identity sequnce which uses certificate profile and AD. All corp laptops should be authenticated using certificates and then followed by AD user and pass. when I configure XP users to validate server certificate this error comes in ISE log "Authentication failed : 11514 Unexpectedly received empty TLS message; treating as a rejection by the client" and if I disable validate sewrver certificate then this error "Authentication failed : 22049 Binary comparison of certificates failed".
    Any help??
    Thanks in advance.

    Hi [answers are inline]
    I  have tried using Cisco Anyconnect NAM on Wondows XP for machine and  user authentication but EAP-chaining feature is not working as expected.  I am facing few challenges. I have configured NAM to use eap-fast for  machine and user authentication and ISE is configured with required  authorisation rule and profiles/results. when machine boots up it sends  machine certificate and gets authenticated against AD and ISE matches  the authorisation rule and assigns authZ profile without waiting for  user credentials.
    This is expected for machine authentication, since the client hasnt logged in machine authentication will succeed so the computer has connectivity to the domain.
    Now when a user logs on using AD user/pass,  authentication fails as the VLAN assigned in AuthZ profile does not have  access to AD. ISE should actually check with their external database  but Its not.
    Do you see the authentication report in ISE? Keep in mind that you are authenticating with a client that has never logged into the workstation before. I am sure you are looking for the feature which starts the NAM process before the user logs in. Try checking this option here:
    http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/administration/guide/ac04namconfig.html#wp1074333
    Note the section below:
    –Before  User Logon—Connect to the network before the user logs on. The user  logon types that are supported include user account (Kerberos)  authentication, loading of user GPOs, and GPO-based logon script  execution.
    If you choose Before User Logon, you also get to set Time to Wait Before Allowing a User to Logon:
    Time to Wait Before Allowing User to Logon—Specifies the maximum (worst  case) number of seconds to wait for the Network Access Manager to make a  complete network connection. If a network connection cannot be  established within this time, the Windows logon process continues with  user log on. The default is 5 seconds.
    Note If the Network Access Manager is configured to manage wireless connections, set Time to wait before allowing user to logon to 30 seconds or more because of the additional time it may take to  establish a wireless connection. You must also account for the time  required to obtain an IP address via DHCP. If two or more network  profiles are configured, you may want to increase the value to cover two  or more connection attempts.
    You will have to enable this setting to allow the supplicant to connect to the network using the credentials you provide, the reason for this is you are trying to authenticate a user that has never logged into this workstation before. Please make changes to the configuration.xml file, and then select the repair option on the anyconnect client and test again.
    Interestingly, if I login with an AD user which is local to  the machine its gets authenticated and gets correct AuthZ  profile/access level. If I logoff and login with different user, Windows  adapter gets IP address and ISE shows successful authentication /authz  profile but NAM agent prompts limited connectivity. Any help??
    Please make the changes above and see if the error message goes away.
    Thanks,
    Tarik Admani
    *Please rate helpful posts*

  • Machine Authentication

    Currently my clients (XP/SP2/latest MS hotfix) are logging onto the wireless network using WPA/TKIP/PEAP. They are configured for both machine authentication (needed to download correct profile from server) and user authentication. I notice that for each logon there are multiple machine authentications showing up in the ACS (anywhere from 3 - 15) This varies and is random. Anyone know why I am seeing this many machine authentications and if there is something I can do to eliminate them? My clients are not consistently logging onto the network and I am thinking this may have something to do with it. I do not see any errors on AP or ACS when clients fail.

    So you only ever see one machine authentication.
    Do you use the windows wireless client software for client configuration? I do.
    WPA
    TKIP
    PEAP
    Check authenticate as computer when info is available
    Have acs server and certificate authority entered
    Enable fast reconnect (client and server)
    Automatically use windows login information.
    I have the autologon setup so once the client boots up the information is passed to the wireless client to the radius server.
    How is the SSID configured on the AP?
    I have the TKIP cipher selected for encryption
    I have OPEN with EAP, NETWORK EAP selected
    I select KEY Exchange mandatory, CCKM and WPA.
    Any information on your particular setup would be appreciated.

  • Machine authentication with Windows 7

    Version: ISE 1.2p12
    Hello,
    I'm doing user and machine authentication with ISE.
    I use a first authorization rule to authenticate the machine against the AD. If it's part computers of the domain.
    Then I use an authorization rule to check if the user's group in AD with the credential he used to open the session + "Network Access:WasMachineAuthenticated = True"
    Things seems to be working and I see my switch port is "Authz Success" but shortly after the Windows 7 machine is behaving like 802.1X authentication fails. The little computer on the bottom right has a cross on it.
    If I disable and enable again the network card of that windows machine it works.
    Does any one of you have an idea about this problem ? something to tweak on Windows 7 like timers...
    Thank you

    Hi Mika. My comments below:
    a) You told me that MAR ("Network Access:WasMachineAuthenticated = True") has some drawbacks. When hibernation is used it can cause problems since the MAC address could have been removed from the cache when the user un-hibernate its computer. Then why not increasing the MAR cache to a value of 7 days then ? Regarding the roaming between wire and wireless it's a problem indeed.
    NS: I don't believe that the MAR cache would be affected by a machine hibernating or going to sleep. There are some dot1x related bug fixes that Massimo outlined in his first pos that you should look into. But yes, you can increase the MAR timer to a value that fits your environent
    b) You suggest to use one authorization rule for the device which should be part of the AD and one authorization rule for the user with the extra result "IdentityAccessRestricted = False". By the was, are we really talking about authorization rules here ? I will try this but it's difficult for me to imagine how it would really work.
    NS: Perhaps there is some confusion here but let me try to explain this again. The "IdentityAccessRestricted" is a check that can be done against a machine or a user account in AD. It is an optional attribute and you don't have to have it. I use it so I can prevent terminated users from gaining access to the network by simply disabling their AD account. Again, that account can be either for a "user" or for a "machine"
    z) One question I was asking myself for a long time. All of us want to do machine+user authentication but Windows write Machine OR User Authentication. This "OR" is very confusing.
    NS: At the moment, the only way you can accomplish a true machine+user authentication is to use the Cisco AnyConnect supplicant. The process is also known as "EAP-Chaining" and/or "EAP-TEAP." In fact there is an official RFC (RFC 7170 - See link below). Now the question is when and if Microsoft, Apple, Linux, etc will start supporting it:
    https://tools.ietf.org/html/rfc7170
    Thank you for rating helpful posts!

  • ISE machine authentication timeout

    Hi all,
    We have a ISE infrastructure and we have enabled user and machine authentication through EAP-TLS.
    Everything is working fine except that every 1 hour user must log off and login again because machine authentication has, I think, expired!
    As you can imagine this is unacceptable. I saw that the machine restriction age is only 1 hour and changed it to 8 hours.
    My question is if machine restarts at 7 hours past first successful authentication will the timer reset or after an hour will be kicked and have to log off and in again?
    How have you bypassed the timeout of mar cache?
    My ISE version is 1.2 with 2 patches installed
    Thank you
    Sent from Cisco Technical Support iPad App

    Hi
    Cisco ISE contains a Machine Access Restriction (MAR) component that provides an additional means of controlling authorization for Microsoft Active Directory-authentication users. This form of authorization is based on the machine authentication of the computer used to access the Cisco ISE network. For every successful machine authentication, Cisco ISE caches the value that was received in the RADIUS Calling-Station-ID attribute (attribute 31) as evidence of a successful machine authentication.
    Cisco ISE retains each Calling-Station-ID attribute value in cache until the number of hours that was configured in the "Time to Live" parameter in the Active Directory Settings page expires. Once the parameter has expired, Cisco ISE deletes it from its cache.
    When a user authenticates from an end-user client, Cisco ISE searches the cache for a Calling-Station-ID value from successful machine authentications for the Calling-Station-ID value that was received in the user authentication request. If Cisco ISE finds a matching user-authentication Calling-Station-ID value in the cache, this affects how Cisco ISE assigns permissions for the user that requests authentication in the following ways:
    • If the Calling-Station-ID value matches one found in the Cisco ISE cache, then the authorization profile for a successful authorization is assigned.
    • If the Calling-Station-ID value is not found to match one in the Cisco ISE cache, then the authorization profile for a successful user authentication without machine authentication is assigned.

  • Apple macosx machine authentication with ISE using EAP-TLS

    Hello,
    On a ongoing setup we are using eap-tls authentication with account validation against AD. We have our own CA (microsoft based). ISE version 1.2.1 patch 1.
    With windows machines all is working well. We are using computer authentication only.
    Now the problem is that we wish to do the same with MAC OSX machines.
    We are using casper software suite and are able to push certificates into macosx, and are doing machine authentication.
    in ISE the certificate authentication profile is being set to look at the subject alternative name - DNS name of the machines. Whenever we set it to the UPN (hostname$) windows accounts are not found in ad.
    When MAC OSX authenticate as machines (they have a computer account in AD) they present themselves with RADIUS-Username = hostname$ instead of host/hostname.
    The consequence is that by lacking the host/, ISE considers that this is a user authentication, instead of a computer one, and when it sets off to find the account, it searches in User class instead of Computer - which obviously returns no results.
    Is anybody aware of any way to force MAC OSX to present a host/hostname RADIUS-Username when authenticating?
    Any similar experiences of authenticating MAC OSX with ISE and machine/computer authentication are welcome.
    Thanks
    Gustavo Novais

    Additional information from the above question.
    I have the following setup;
    ACS 3.2(3) built 11 appliance
    -Cisco AP1200 wireless access point
    -Novell NDS to be used as an external database
    -Windows 2003 enterprise with standalone Certificate Authorithy Services Installed
    -Windows XP SP2 Client
    My Goal is to use Windows XP Native Wlan Utility to connect to AP using EAP-TLS authentication against Novell NDS.
    Tried to connect using Cisco compatible wlaN utility and authenticate using EAP-GTC against Novell NDS for for users, it works fine and perfectly.
    When connecting using EAP-TLS, I am getting an error from ACS failed attempt "Auth type Not supported by External DB". But in the ACS documentation says that it supports EAP-TLS. How true is this? Is there anybody have the same problem? Do I need to upgrade my ACS? What should I do? What other authentication type could be used to utilize native WinXP Wlan Utility?
    Please help...
    Thanks

Maybe you are looking for

  • Calling stored proc through JDBC

    Hello all, What I am doing is calling a stored proceedure in this manner... CallableStatement stmt = dbB.getConn().prepareCall ("call LDPKG.LDGetData(?, ?)");  //dbB is a conn Class I made, it works fine and getConn obviously jsut returns teh Connect

  • Solaris 8 upgrade

    I am running an older version of Solaris 8 and need to upgrade to solaris 8 02/04. I have downloaded the sw and was wondering if this upgrade can be done remotely from a telnet or xterm session or do I have to burn Cd's and upgrade the server hands o

  • Vendor reminder letter by email

    Hi all, I want reminder letters to be sent to vendors automatically by email, till he supplies all the qty of PO. Pls guide for the complete pro. Have configured the system til MAHN output type. Regards,

  • Does anyone know how to solve a problem about the ...

    Hi there, I recently bought a N73 from t-mobile and it has the latest copilot on it. the problem comes when I go on Copilot it exits itself automatically and the signal does not come? why does this happen and how can you fix this? P.S. I told T-Mobil

  • Enhancement in PB10

    Hi, While entering initial data of an applicant in PB10 , we need to capture the following.     a) Joining Time if selected.     b) Details of reference(external for reference check) provided by the candidate. Is there any possibility of enhancement