Hi Mig,
Thanks for responding.
Apologies in advance if there is a misunderstanding in my interpretation, appreciate the feedback as it opens the discussion, so these are just my thoughts....
If I take that example and connect any PC with the Windows supplicant enabled for PEAP to the wired or wireless network, I would be presented with a bubble that allows me to input a AD username and password.
Based on the rule for 'User is in GROUP-XXX' authentication would pass on a valid username and password, and authorisation would also pass based on being in GROUP-XXX; I've now connected my non Corporate PC to the network.
This is the problem.
The machine rule would still take place prior using rule 'End-system is in Group-YYY'. Well in fact I would actually configure an NTLM based authentication on this machine in AD because an actual password is stored in AD, and then do an authorisation based on the 'End-system is in Group-YYY'. That's fine, machine is then authenticated, no other machine can connect that way, but its separate to user auth, its not in addition from what I understand - so a simple user auth with PEAP will get you on based on those rules regardless of the machine.
TLS fixes that because its certificate based, and along with GPO and PKI it can be automated. Its secure in part because the issuing of certs is controlled by the root thats controlled by the organisation.
I have solutions working in this way, with machine and user certs. Problem is the supporting infrastructure can be complicated, difficult to manage and diagnose, with PEAP being much simpler but less secure.
Appreciate the trade offs, and well, you want more security comes the complication. The ability to do machine AND user authentication either with just PEAP or machine certs AND user with PEAP would be the perfect answer.
I believe this can be done with custom supplicants, but without an Extreme one available I wondered if there where any other Extreme alternatives or off the shelf ones anyone has used?
Many thanks.