‎03-13-2025 04:36 AM
Hello Community,
We have upgraded from Win 10 to Win 11 and are currently using EAP PEAP as the 802.1x authentication method. I was told this would no longer work with Win 11 and we would need to implement EAP TLS. I understand EAP TLS is not available for the version of XIQ SE we have - 23.4.12.3.
However, I believe later version of XIQ SE support EAP TLS. If this is not the case please let me know. Could anyone let me know which minimum version of XIQ SE supports EAP TLS for XIQ SE and will I need a root certificate to be installed on XIQ SE and the NAC devices?
Is there a guide or similar I could use to Implement EAP TLS?
Currently, we use the built in 802.1x authentication via a LDAP server. This I believe supports MsCHAP, PEAP and EAP-MsCHAPV2 only.
Many Thanks,
Solved! Go to Solution.
‎03-13-2025 05:28 AM - edited ‎03-13-2025 05:30 AM
Hi Asifi,
Any version of XIQ-SE supports EAP-TLS.
If you want EAP-PEAP to be still supported in Windows 11 clients, you will probably need to disable Credential Guard feature.
These links might be useful:
https://extreme-networks.my.site.com/ExtrArticleDetail?an=000100238&q=windows%2011%20802%201x
However, using EAP-TLS is a way better than EAP-PEAP in terms of security.
REGARDS, Robert
Thursday
Hello Everyone,
Apologies for the late reply and thanks to everyone who has replied. I have checked my version of XIQ SE. The version I have ExtremeCloud IQ - Site Engine 23.4.12.3
I believe this version should support EAP-TLS. However, when looking under AAA Rules and Authentication type, I do not have the EAP-TLS option. Am I looking in the wrong place for this? Please see screenshot below.
Thanks,
Thursday
Hi,
Not showing EAP-TLS in the list of conditions for AAA rule does not mean EAP-TLS is not supported.
Sincerely yours
yesterday
@Zdeněk_Pala - Thanks, I have found the option to do this. Can I edit and use an exiting Rule with EAP-TLS after installing the Root certificate on the NAC's or do I need to create a new Rule?
Thanks,
yesterday
Once you change config you need to enforce the settings to Access Control Engines.
There is no need to create or modify new rules due to a certificate change. If you are happy with rule conditions, no need to edit it.