Hi
As mentioned the static host list will for sure work, but the static hosts lists are mostly left in ClearPass due to backward compatibility. The user interface for the static host list is quite user unfriendly, in my opinion. The entries are added in cronological order and it's not possible to search in the list.
Why not have both EAP-PEAP and EAP-TLS in the same service? Eventually you need to modify the AD search query to search for both sAmAccountName and UPN, but if the only difference is the authentication method I would recommend having only one service.
The reason why you can't utilize an AD attribute is that the AD information is read after the actual authentication has taken place. You can also add a custom attribute to the Endpoints repository if you would like to have two services. Endpoints repository is searchable but depending on your administrative delegation of rights the static host list can be a better option if you need to delegate the right to add MAC addresses to a person who is not familiar with ClearPass and you would like to limit the damage they can do.
------------------------------
Best Regards
Jonas Hammarbäck
MVP 2023, ACCX #1335, ACX-Network Security, Aruba SME, ACMP, ACDP , ACEP, ACSA
Aranya AB
If you find my answer useful, consider giving kudos and/or mark as solution
------------------------------
Original Message:
Sent: Aug 03, 2023 04:11 PM
From: hhiggins
Subject: CPPM: Migrate from EAP-MSCHAPv2 to EAP-TLS
Howdy,
We are currently running Windows 10 and using CPPM to perform 802.1X on our WIRED ports for both user and computer accounts. The access switch is a 6300M. Our Windows 10 clients are using EAP-PEAP, EAP-MSCHAPv2.
In testing Windows 11 we have found that this no longer works and are forced to change to a more secure and modern method of EAP-TLS.
We have created a test service to only use EAP-TLS in CPPM and manually added the test Windows 11 machine to the policy and everything works as it should.
The challenge we are facing, and can't seem to find a solution, is how we can target this policy to only Windows 11 machines we are replacing as we don't want to change the Windows 10 machines. Was hoping to use an AD group attribute, but don't see that as an option. Does anyone have any ideas?
Thanks in advance