View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

SEC0186 - ISE 1.3 Wireless 802.1X with EAP-TLS and PEAP (Part 1)

Rating: 
5
Average: 5 (1 vote)
Difficulty Level: 
0
Lab Document: 
<Please login to see the content>
The video walks you through configuration of wireless 802.1X using EAP-TLS and PEAP on Cisco ISE 1.3. By leveraging AD integration from the previous video, we will configure authentication and authorization policies to support both user and machine authentications and enforce Machine Access Restriction (MAR). Here we assume user and machine certificate are already installed. We will perform testing on both domain computer, and iPad, and observe authentication results.

Part 1 of this video focuses on ISE authentication and authorization policies configuration.

Topic: 

  • Network Device and Group
  • Policy Set
  • Certificate Profile (Common Name)
  • Identity Source Sequence
  • User and Machine Authentication with EAP-TLS and PEAP
  • Policy Element Result
    • Authorization (Downloadable ACL)
    • Authorization (Authorization Profile)
  • Authentication Policy
  • Authorization Policy

 

About Author

Metha Chiewanichakorn, CCIE#23585 (Ent. Infra, Sec, SP), is a Cisco networking enthusiast with years of experience in the industry. He is currently working as a consulting engineer for a Cisco partner. As a founder of and an instructor at labminutes.com, Metha enjoys learning and challenges himself with new technologies.

14 comments

Hello,

I purchased the ISE 1.3 video bundle but noticed additional videos were posted this week as part 1 and 2 that I don't have added within my bundle. Are you able to add them please?

Thanks

This video is identical to "SEC0186 - ISE 1.3 Wireless 802.1X with EAP-TLS and PEAP" in the ISE 1.3 bundle. It is just being splitted into two parts here.

i`m using profile editor to create profile for EAP-Fast, the issue is that the profile i created not shown in the connection list. kindly help me,
i put the xml file in the correct location
C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Network Access Manager\newConfigFiles
in windows 7.
it is shown in saved network but not shown in the connection list.
kindly help.

If you create everything correctly, it should. Did you try restarting the computer. Can you check out the video below if not already?

http://www.labminutes.com/sec0048_ise_1_1_user_machine_authentication_ea...

i restarted the PC and also tried anyconnect version 4 and profile eidtor version 4 but the same
not appear in the connection list. also i saw the video.

The way it usually works is you save the configuration.xml file under the "newConfigFiles" directory and the file will get move to the "system" directory. If that does not work for you, you might want to try saveing the file under "system" directory directly.

Hi can you please tell me if there is a way we can use certificates for machine authentication and user/pass authentication for user? can we use both types at the same time?

Not with the current Windows native supplicant, even Windows 8 I believe. You will need to use Cisco NAM to achieve that.

Hi Metha,

I have a problem, ISE configured only for User authentication (machine not joined domain)
I'm already import GeoTrust Certificate and Private Key to ISE's "System Certificates" for Admin and EAP authentication

When Windows7 clients connect to SSID, they notice that this SSID using GeoTrust Certificate, but they seem not to trust (http://s18.postimg.org/vf2w18wqx/Windows7.png)

I don't know why, do you have any ideas?

Thanks

Please check the wireless802.1x profile on Windows 7 client and make sure you that have GeoTrust root CA cert trusted under the Verify server certificate section

I'm using a vWLC and all my access points are in FlexConnect mode for Data and Central for AuthC.
as I'm supporting multiple VLANs, the switch port where the AP's are connected are setup as Trunk.
the Port mentioned is configured for dot1x so I can authenticate the AP's and prevent someone from unpligun the AP's and connect a laptop.
problem I'm facing is when user authenticates, ISE push the Full access DACL, however when the users tried to send data, the switch catches that traffic and tried to authenticated the user again, and since the users in not on wire, the users doesn't reply, making the connection to drop for aither dot1x and MAB.
any idea how we can get around a trunk port ?

You can try 'mode multi-host' so the first host is authenticated (ie. AP) and the subsequence hosts (ie. Wireless client) are automatically authorized.

I can try that, however, with the multi-auth, a non authorized user can disconnect the AP and connect a phone to the the phoen full access, then if the user connects a computer behind the phone, full access without authentication will be granted.

You are correct so it's probably a good idea to make sure the phone only get limited access DACL just to allow phone traffic. This is still better than disabling .1X on the port altogether after all.