Here is a guide to help you build a Cisco ISE lab for securing mobile devices.First the assumption is you have a appliance, Active Directory and other services. The ISE system was synched with AD for three identity groups (employees, contractors and guests).Once groups are added, test AD users in ISE under external identity store, AD, Connect to make sure the AD / ISE integration is working.Next go to Authentication and verify you have a default 802.1x policy.My team built a Cisco Identity Services Engine ISE demo lab designed to secure mobile devices such as i Pads, Androids, etc.We ran into a few snags however in the end got the system to work nicely.Gonzaga University uses WPA2 and the mini10 only has WPA.
I have already gone onto microsoft and updated the software. Typically it would be a Dell 1397, Dell 1510 or Dell 1520.
(It is possible I missed an update, but don't think I did). They are the ones that told me the NIC was too old to support WPA2. You can go here to download the correct driver once you know which one. I have downloaded all the network drivers as well as the software drivers and some other recommended updates.
I guess I'm just hoping there is an update or something that can allow it without having to replace it. I have Windows XP with SP3 (which is supposed to allow WPA2) with a Dell 1397 Wireless Card.
I've opened a support ticket with Apple, but I'm curious if anyone else is seeing something similar. So far I've tried a 15" late 2013, 13" late 16 non touchbar, and a 13" late 16 touchbar all updated to 10.12.5 and was able to sucessfully connect https://support.apple.com/en-us/HT207797 802.1X Available for: mac OS Sierra 10.12.4 Impact: A malicious network with 802.1X authentication may be able to capture user network credentials Description: A certificate validation issue existed in EAP-TLS when a certificate changed.
This issue was addressed through improved certificate validation.