ModernCyber Blog

How to Check EAP Settings on Supplicants

Written by Uzi Ahmed | Sep 29, 2025 1:30:00 PM

When performing Cisco ISE certificate renewals or troubleshooting certificate-based authentication issues, checking client supplicant EAP settings is critical.  For example, during certificate renewal, authentication can break if:

  • Client machines have cached old certificate details or thumbprints
  • Certificate validation settings don't match new certificates
  • Subject Alternative Name (SAN) fields don't meet supplicant requirements
  • Windows supplicants have compatibility issues with certificate configurations
  • Certificate chains are incomplete after CA changes

To avoid service disruptions during a certificate renewal procedure, for example, it is therefore helpful to verify how supplicants are configured to handle certificates for EAP.  This quick blog post serves as a guide to obtain essential configuration on both Windows and macOS clients on wired and wireless networks.

Windows Supplicants

Network authentication configuration works a little differently for WiFi and Wired on Windows.  For WiFi, configuration is stored as profiles per SSID (network name).  Whereas for Wired access, configuration applies per interface (e.g., "Ethernet", "DATA", "MGMT").

Wireless Access

View All WiFi Profiles

netsh wlan show profiles

The goal is to identify the name of the profile of interest.  Note that policies can be configured by an organization (i.e., a group policy) or be configured by the local user (i.e., a user policy).

Check Current WiFi EAP Settings

netsh wlan show profile name="YourSSID" key=clear

Look for the <Authentication> and <Encryption> sections to verify these EAP method and certificate settings.

Export WiFi Profile for Detailed Analysis

netsh wlan export profile name="YourSSID" folder=C:\temp

Many advanced EAP certificate settings are not visible in command output and can only be viewed by exporting to XML! This includes detailed certificate validation settings, server certificate requirements, and EAP-specific configurations.  To view these details, export the XML file.  

Wired Access

Viewing settings for Wired Access is very similar to Wireless Access, except that configuration is applied per interface, not per profile.

View all Wired profiles

netsh wlan show profiles

The goal is to identify the name of the interface of interest.

Verify 802.1X Service Status

netsh lan show profile interface="Ethernet 2"

Export Wired Profile

netsh lan export profile folder=C:\temp interface="Ethernet 2" 

As with WiFi, many advanced EAP certificate settings are not visible in command output and can only be viewed by exporting to XML. This includes detailed certificate validation settings, server certificate requirements, and EAP-specific configurations.  To view these details, export the XML file.  

Mac Supplicants

For MacOS, it can be more straightforward to use the GUI for visibility into supplicant 802.1X configuration.

Wireless Access

View All WiFi Profiles

Navigate to System Preferences > Network.  Select Wi-Fi.

Check Current WiFi EAP Settings

Click on Details...

View WiFi Profile for Detailed Analysis

Select the 802.1X menu to view detailed configuration.  Note in this example, an 802.1X configuration is not applied to this SSID.

Wired Access

View All Wired Profiles

Navigate to System Preferences > Network.  Select the appropriate interface.

Check Current Wired EAP Settings

Click on Details...

View Wired Profile for Detailed Analysis

Select the 802.1X menu to view detailed configuration.  Note in this example, an 802.1X configuration is not applied to this interface.

Conclusion

When performing ISE certificate maintenance - in particular, renewing system certificates - it is always a good idea to verify supplicant EAP trust settings.  This is to avoid a situation in which clients fail authentication to ISE because of some kind of configuration mismatch between client and server. 

Please feel free to reach out with any questions/comments you may have.