05-31-2019 12:39 PM
Solved! Go to Solution.
08-11-2021 08:31 AM
Hi Tomasz,
Thank you for your reply. I was talking about the EAP-TEAP with a vendor of our Extreme solutions. They contacted Extreme directly and found out that Extreme NAC does not support EAP-TEAP yet. However, it’s in their road map so hopefully someday…
Nevertheless, there should be basically two workarounds. The first one is the one you’re describing in your previous post. I can be done either manually or using the workflow you provided.
The second one is to create two rules. First for machine certificate authentication and second one for identity authentication (credentials in AD). For this option you need to set your Windows supplicant for EAP-TEAP authentication, but I was told, that it does not work very well. However, I haven’t tried it myself, so who knows, it may be the way.
I’m not an expert in AD/GPO myself, but I don’t believe that there is a “user-friendly” solution. And even if it was, I would like to assign different VLANs to different groups of users, which wouldn’t be possible, right? The NAC would just let the machine to the network, but I’d have to have a user certificate (which I don’t have) to assign a specific VLAN. With machine certificate only, the NAC would know that the machine is from our company, therefore let it in, but wouldn’t know which user uses it, so I can’t create any user group.
Regards,
Jakub
08-11-2021 09:09 PM
Hi Jakub,
I’d love to see this being delivered in some future update.
For the time being, we could try to collect MAC addresses of corporate devices and have this end-system group as an additional criteria for AD users to be AAA’d successfully. This would not help however regarding users logging in from other corp stations than their own ones. It wouldn’t help for MAC spoofing either, but neither 802.1X is resilient against MitM. It’s a matter of risk assessment IMHO.
Wouldn’t there be an attribute that could be applied to corporate devices in AD so they can be verified for this or that VLAN assignment? We can do End-system Group of type “LDAP Host Group” and lookup some attributes for hosts same way as for users in User Group of type “LDAP User Group” (the real difference is this or that section of LDAP connection configuration that is used to pull data).
Hope that helps,
Tomasz
08-11-2021 08:31 AM
Hi Tomasz,
Thank you for your reply. I was talking about the EAP-TEAP with a vendor of our Extreme solutions. They contacted Extreme directly and found out that Extreme NAC does not support EAP-TEAP yet. However, it’s in their road map so hopefully someday…
Nevertheless, there should be basically two workarounds. The first one is the one you’re describing in your previous post. I can be done either manually or using the workflow you provided.
The second one is to create two rules. First for machine certificate authentication and second one for identity authentication (credentials in AD). For this option you need to set your Windows supplicant for EAP-TEAP authentication, but I was told, that it does not work very well. However, I haven’t tried it myself, so who knows, it may be the way.
I’m not an expert in AD/GPO myself, but I don’t believe that there is a “user-friendly” solution. And even if it was, I would like to assign different VLANs to different groups of users, which wouldn’t be possible, right? The NAC would just let the machine to the network, but I’d have to have a user certificate (which I don’t have) to assign a specific VLAN. With machine certificate only, the NAC would know that the machine is from our company, therefore let it in, but wouldn’t know which user uses it, so I can’t create any user group.
Regards,
Jakub
08-09-2021 08:18 PM
Hi Jakub,
Windows 10 hosts started supporting EAP-TEAP a bit ago but I didn’t play with it yet.
Besides, XMC can provide you a workflow that was linked above. It’s about EAC storing the authenticated host MAC address and verify if the user auth happens from a verified host.
I’d love to see further progress on that. BTW, I’m not that deep in AD/GPO, wouldn’t it be possible to prevent unwanted users from logging in to the laptop, and thus only having to focus on the machine auth on the network side?
Kind regards,
Tomasz
08-05-2021 12:56 PM
Hi all,
there are two showstoppers:
We are looking for that since long time ago when Trapeze had that in their wifi solution !!
Yes, it´s possibly working with caching the authenticated device (TLS) and use this behaviour for user authentication (PEAP)…Windows is in this case not a reliable platform with all the dependencies.
Changing the order and start with PEAP (user auth) and validate the device in AD device group is another option.
At the end of the day, using TLS is the best and most reliable way for secure authentication of a device.
btw: Cisco is using EAP-TEAP for EAP chaining….
br
Volker