Allowed Protocols > Authentication Bypass
|
Process Host Lookup
|
Check this check box if you want Cisco ISE to process the Host Lookup request. The Host Lookup request is processed for PAP/CHAP
protocol when the RADIUS Service-Type equals 10 (Call-Check) and the username is equal to Calling-Station-ID. The Host Lookup
request is processed for EAP-MD5 protocol when the Service-Type equals 1 (Framed) and the username is equal to Calling-Station-ID.
Uncheck this check box if you want Cisco ISE to ignore the Host Lookup request and use the original value of the system username
attribute for authentication. When unchecked, message processing is done according to the protocol (for example, PAP).
Note
|
Disabling this option could result in the failure of existing MAB authentications.
|
|
Allowed Protocols > Authentication Protocols
|
Allow PAP/ASCII
|
This option enables PAP/ASCII. PAP uses cleartext passwords (that is, unencrypted passwords) and is the least secure authentication
protocol.
|
Allow CHAP
|
This option enables CHAP authentication. CHAP uses a challenge-response mechanism with password encryption. CHAP does not
work with Microsoft Active Directory.
|
Allow MS-CHAPv1
|
Check this check box to enable MS-CHAPv1.
|
Allow MS-CHAPv2
|
Check this check box to enable MS-CHAPv2.
|
Allow EAP-MD5
|
Check this check box to enable EAP-based MD5 password hashed authentication.
|
Allow EAP-TLS
|
Check this check box to enable EAP-TLS Authentication protocol and configures EAP-TLS settings. You can specify how Cisco
ISE will verify the user identity as presented in the EAP identity response from the end-user client. User identity is verified
against information in the certificate that the end-user client presents. This comparison occurs after an EAP-TLS tunnel is
established between Cisco ISE and the end-user client.
Note
|
EAP-TLS is a certificate-based authentication protocol. EAP-TLS authentication can occur only after you have completed the
required steps to configure certificates.
|
-
Allow authentication of expired certificates to allow certificate renewal in Authorization Policy: Check this check box, if you want to allow users to renew certificates. If you check this check box, ensure that you configure
appropriate authorization policy rules to check if the certificate has been renewed before processing the request any further.
-
Enable Stateless Session Resume: Check this check box to allow EAP-TLS session resumption without requiring the session state to be stored at the server.
Cisco ISE supports session ticket extension as described in RFC 5077. Cisco ISE creates a ticket and sends it to an EAP-TLS
client. The client presents the ticket to ISE to resume a session.
-
Proactive Session Ticket update: Enter the value as a percentage to indicate how much of the Time To Live (TTL) must elapse before the session ticket is
updated. For example, if you enter the value 60, the session ticket is updated after 60 percent of the TTL has expired.
-
Session ticket Time to Live: Enter the time after which the session ticket expires. This value determines the duration that a session ticket remains
active. You can enter the value in seconds, minutes, hours, days, or weeks.
|
Allow LEAP
|
Check this check box to enable Lightweight Extensible Authentication Protocol (LEAP) authentication.
|
Allow PEAP
|
Check this check box to enable PEAP authentication protocol and PEAP settings. The default inner method is MS-CHAPv2.
When you check the Allow PEAP check box, you can configure the following PEAP inner methods:
-
Allow EAP-MS-CHAPv2: Check this check box to use EAP-MS-CHAPv2 as the inner method.
-
Allow Password Change: Check this check box for Cisco ISE to support password changes.
-
Retry Attempts: Specifies how many times Cisco ISE requests user credentials before returning login failure. Valid values are 0 to 3.
-
Allow EAP-GTC: Check this check box to use EAP-GTC as the inner method.
-
Allow Password Change: Check this check box for Cisco ISE to support password changes.
-
Retry Attempts: Specifies how many times Cisco ISE requests user credentials before returning login failure. The valid range is from 0 to
3.
-
Allow EAP-TLS: Check this check box to use EAP-TLS as the inner method.
Check the Allow authentication of expired certificates to allow certificate renewal in Authorization Policy check box, if you want to allow users to renew certificates. If you check this check box, ensure that you configure appropriate
authorization policy rules to check if the certificate has been renewed before processing the request any further.
-
Require Cryptobinding TLV: Check this check box if you want both the EAP peer and the EAP server to participate in the inner and outer EAP authentications
of the PEAP authentication.
-
Allow PEAPv0 Only for Legacy Clients: Check this check box to allow PEAP supplicants to negotiate using PEAPv0. Some legacy clients do not conform to the PEAPv1
protocol standards. To ensure that such PEAP conversations are not dropped, check this check box.
|
Allow EAP-FAST
|
Check this check box to enable EAP-FAST authentication protocol and EAP-FAST settings. The EAP-FAST protocol can support multiple
internal protocols on the same server. The default inner method is MS-CHAPv2.
When you check the Allow EAP-FAST check box, you can configure EAP-FAST as the inner method:
-
Allow EAP-MS-CHAPv2
-
Allow Password Change: Check this check box for Cisco ISE to support password changes.
-
Retry Attempts: Specifies how many times Cisco ISE requests user credentials before returning login failure. Valid values are 0-3.
-
Allow EAP-GTC
Allow Password Change: Check this check box for Cisco ISE to support password changes.
Retry Attempts: Specifies how many times Cisco ISE requests user credentials before returning login failure. Valid values are 0-3.
-
Use PACs: Choose this option to configure Cisco ISE to provision authorization Protected Access Credentials (PAC) for EAP-FAST clients.
Additional PAC options appear.
-
Don't Use PACs: Choose this option to configure Cisco ISE to use EAP-FAST without issuing or accepting any tunnel or machine PACs. All requests
for PACs are ignored and Cisco ISE responds with a Success-TLV without a PAC.
When you choose this option, you can configure Cisco ISE to perform machine authentication.
-
Allow EAP-TLS: Check this check box to use EAP-TLS as the inner method.
Check the Allow authentication of expired certificates to allow certificate renewal in Authorization Policy check box, if you want to allow users to renew certificates. If you check this check box, ensure that you configure appropriate
authorization policy rules to check if the certificate has been renewed before processing the request any further.
-
Enable EAP Chaining: Check this check box to enable EAP chaining.
EAP chaining allows Cisco ISE to correlate the results of user and machine authentication and apply the appropriate authorization
policy using the EAPChainingResult attribute.
EAP chaining requires a supplicant that supports EAP chaining on the client device. Choose the User and Machine Authentication
option in the supplicant.
EAP chaining is available when you choose the EAP-FAST protocol (both in PAC based and PAC less mode).
For PAC-based authentication, you can use user authorization PAC or machine authorization PAC, or both to skip the inner method.
For certificate-based authentication, if you enable the Accept Client Certificate for Provisioning option for the EAP-FAST
protocol (in the Allowed Protocol service), and if the endpoint (AnyConnect) is configured to send the user certificate inside the tunnel, then during tunnel establishment, ISE authenticates the user
using the certificate (the inner method is skipped), and machine authentication is done through the inner method. If these
options are not configured, EAP-TLS is used as the inner method for user authentication.
After you enable EAP chaining, update your authorization policy and add a condition using the NetworkAccess:EapChainingResult
attribute and assign appropriate permissions.
|
Allow EAP-TTLS
|
Check this check box to enable EAP-TTLS protocol.
You can configure the following inner methods:
-
Allow PAP/ASCII: Check this check box to use PAP/ASCII as the inner method. You can use EAP-TTLS PAP for token and OTP-based authentications.
-
Allow CHAP: Check this check box to use CHAP as the inner method. CHAP uses a challenge-response mechanism with password encryption.
CHAP does not work with Microsoft Active Directory.
-
Allow MS-CHAPv1: Check this check box to use MS-CHAPv1 as the inner method.
-
Allow MS-CHAPv2: Check this check box to use MS-CHAPv2 as the inner method.
-
Allow EAP-MD5: Check this check box to use EAP-MD5 as the inner method.
-
Allow EAP-MS-CHAPv2: Check this check box to use EAP-MS-CHAPv2 as the inner method.
-
Allow Password Change: Check this check box for Cisco ISE to support password changes.
-
Retry Attempts: Specifies how many times Cisco ISE requests user credentials before returning login failure. Valid values are 0 to 3.
|
Allow TEAP
|
Check this check box to enable the Tunnel Extensible Authentication Protocol (TEAP) and configure the TEAP settings. TEAP
is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security
(TLS) protocol to establish a tunnel. The type-length-value (TLV) objects are used within the TEAP tunnel to transport authentication-related
data between the EAP peer and the EAP server.
You can configure the following inner methods for TEAP:
-
Allow EAP-MS-CHAPv2: Check this check box to use EAP-MS-CHAPv2 as the inner method.
-
Allow Password Change: Check this check box for Cisco ISE to support password changes.
-
Retries: Enter the number of times that Cisco ISE will allow a user to enter the credentials before returning a login failure message.
The valid range is from 0 to 3.
-
Allow EAP-TLS: Check this check box to use EAP-TLS as the inner method.
-
Allow Authentication of Expired Certificates to Allow Certificate Renewal in Authorization Policy: Check this check box if you want to allow a user to renew certificates. If you enable this option, ensure that you configure
the appropriate authorization policy rules to verify whether the certificates have been renewed, before processing the authorization
request further.
-
Allow Downgrade to MSK: Check this check box if the inner method supports the Extended Master Session Key (EMSK), but the client device provides
only the Master Session Key (MSK). Note that while EMSK is more secure than MSK, some client devices might not support EMSK.
-
Accept Client Certificate during Tunnel Establishment: Check this check box if you want Cisco ISE to request for a client certificate during TEAP tunnel establishment. If the
certificate is not provided, Cisco ISE uses the configured inner methods for authentication.
-
Enable EAP Chaining: Check this check box to enable EAP chaining. EAP chaining allows Cisco ISE to run both the inner methods for user and machine
authentication inside the same TEAP tunnel. This enables Cisco ISE to correlate the authentication results and apply the appropriate
authorization policy, using the EAPChainingResult attribute.
After you enable EAP chaining, update your authorization policy, add a condition using the NetworkAccess:EapChainingResult
attribute, and assign the appropriate permissions.
Note
|
When EAP chaining is enabled, ensure that the user and machine certificates are copied in the supplicant if you want to do
both user and machine authentication.
|
Note
|
-
If EAP chaining is enabled in Cisco ISE, both the primary and secondary authentication method must be configured for the Microsoft
supplicant.
-
If EAP chaining is disabled in Cisco ISE, only the primary authentication method must be configured for the Microsoft supplicant.
-
If both the primary and secondary authentication method are configured as None, EAP negotiation might fail with the following
message:
Supplicant stopped responding to ISE
|
|
Preferred EAP Protocol
|
Check this check box to choose your preferred EAP protocols from any of the following options: EAP-FAST, PEAP, LEAP, EAP-TLS,
EAP-TTLS, and EAP-MD5. If you do not specify the preferred protocol, EAP-TLS is used by default.
|
EAP-TLS L-bit
|
Check this check box to support legacy EAP supplicants that expect length-included flag (L-bit flag) by default in TLS Change
Cipher Spec message and Encrypted Handshake message from ISE.
|
Allow Weak Ciphers for EAP
|
If this option is enabled, legacy clients are allowed to negotiate using weak ciphers (such as RSA_RC4_128_SHA, RSA_RC4_128_MD5).
We recommend that you enable this option only if your legacy clients support only weak ciphers.
This option is disabled by default.
Note
|
Cisco ISE does not support EDH_RSA_DES_64_CBC_SHA and EDH_DSS_DES_64_CBC_SHA.
|
|
Require Message Authenticator for all RADIUS Requests
|
If this option is enabled, Cisco ISE verifies whether the RADIUS Message Authenticator attribute is present in the RADIUS
message. If the message authenticator attribute is not present, the RADIUS message is discarded.
Enabling this option provides protection from spoofed Access-Request messages and RADIUS message tampering.
The RADIUS Message Authenticator attribute is a Message Digest 5 (MD5) hash of the entire RADIUS message.
Note
|
EAP uses the Message Authenticator attribute by default and does not require that you enable it.
|
|
Allow 5G
|
Check this check box to enable Cisco Private 5G in Cisco ISE.
Note
|
You must already have Cisco Private 5G deployed in your network, prior to enabling 5G as a Service (5GaaS) in Cisco ISE
|
|