ā05-31-2019 12:39 PM
Solved! Go to Solution.
ā08-11-2021 08:31 AM
Hi Tomasz,
Thank you for your reply. I was talking about the EAP-TEAP with a vendor of our Extreme solutions. They contacted Extreme directly and found out that Extreme NAC does not support EAP-TEAP yet. However, itās in their road map so hopefully somedayā¦
Nevertheless, there should be basically two workarounds. The first one is the one youāre describing in your previous post. I can be done either manually or using the workflow you provided.
The second one is to create two rules. First for machine certificate authentication and second one for identity authentication (credentials in AD). For this option you need to set your Windows supplicant for EAP-TEAP authentication, but I was told, that it does not work very well. However, I havenāt tried it myself, so who knows, it may be the way.
Iām not an expert in AD/GPO myself, but I donāt believe that there is a āuser-friendlyā solution. And even if it was, I would like to assign different VLANs to different groups of users, which wouldnāt be possible, right? The NAC would just let the machine to the network, but Iād have to have a user certificate (which I donāt have) to assign a specific VLAN. With machine certificate only, the NAC would know that the machine is from our company, therefore let it in, but wouldnāt know which user uses it, so I canāt create any user group.
Regards,
Jakub
ā08-05-2021 07:27 AM
Hi everyone.
I came across the same problem as Claudio D'Ascenzo, even though I use wired network. However, after reading all these replies, Iām still not sure, how to configure my Extreme NAC and the Windows supplicant on endpoints in order to validate the machine certificate and then authenticate the user on AD via LDAP. Or if itās even possibleā¦
Do you have any updates on this topic, perhaps a GTAC manual?
Thank you!
Jakub
ā05-20-2020 10:29 PM
Hi
I see it more clear now, thank you!
Regarding caching the machine authentication state, itās something thatās not out of the box (kudos to Clearpass and ISE, hoping we could see this here as well). It can be somehow achieved with additional Workflow (kind of XMC extension that can be provided by anyone): https://github.com/extremenetworks/ExtremeScripting/blob/master/Netsight/oneview_workflows/README.md (āUser authenticated on domain computerā).
I didnāt see how this caching works on Clearpass so itās hard for me to tell how similar it is but sounds like that at first sight (machine auth state being cached - MAC remembered in an end-system group to check during user authorization with EAC rules; but caching for how long?).
Not comparing that to the chaining of course, IMHO itās different and slightly better (so ISE owns in this particular feature Iād say).
Might I ask you for some note on Windows 10 EAP-TEAP support? I donāt see it on my 10.0.18363 under authentication (and now I see some KB is waiting in line, oops...).
Kind regards,
Tomasz
ā05-19-2020 09:51 PM
EAP-TEAP (EAP-Chaining) is not required. However, it IS the best route, and a lot more graceful as EAP-TEAP will submit both sets of creds at once. EAP-TEAP is available in the latest Windows version update.
With that said, I was only pointing out that the supplicant is capable of doing it if the NAC solution provides a machine authentication cache. Extreme Control and Microsoft NPS does not provide this, unfortunately.
You can setup Extreme Control to do the machine login first then have a second rule to do the user authentication. However, this is not the same thing as either will pass if theyāre valid credentials. It is not correlating the machine to the user.
ā05-08-2020 12:58 PM
Hi
Now I think I might have misunderstood
In Extreme Access Control machine can get authenticated at boot or when just plugged to the network using machine-related info/cert and then when this or that user logs in, ultimate policy is applied. But the final network authentication on the switch port and ultimate policy are both based on the last authentication that occured for that MAC address. Does it work differently in Clearpass? Are you able to provide an end-system with a certain policy only if both machine and user authentications were successful, not just user auth?
Kind regards,
Tomasz
ā04-27-2020 06:16 PM
Machine and User auth is definitely possible with Microsoftās supplicant. No third party supplicant is necessary. By default, the Windows supplicant tries a Machine authentication at boot. Once the user logs in, then the User is authenticated.
If Control canāt do it, thatās one thing, but itās definitely possible with other solutions. For instance, Clearpass caches the Machine authentication state. Then when the user logs in, to combines it with the Machine state and provides āfullā access. ISE functions the same way.
The long-term solution is of course EAP-TEAP, or EAP-chaining.