<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Provisioning Issues - Public Certificate &amp; EAP-TLS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118326#M141485</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update2: Cisco have filled a new bug / feature enhancement request:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;After discussions with developers, I Have filled a new bug: &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCue08551" target="_blank"&gt;CSCue08551&lt;/A&gt; -&amp;nbsp; ISE Native Supplicant Provisioning doesn't include CA Cert for EAP TLS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Symptom:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ISE Client Provisioning (NSP) installs only the HTTPS Certificate which cause EAP-TLS authentication to fail.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Conditions:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;EAP and HTTPS Functions on ISE use a different certificate&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Workaround:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Use same certificate for HTTPS and EAP.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This will be treated as an enhancement, as the HTTPs needs to be included since it’s always used to establish the connection between the Wizard and ISE for&amp;nbsp; SCEP Requests. Also, different ISE Policy nodes might have a certificate signed by a different CA. The fix would be to have an option on the NSP Profile to push additional CA Certificates.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps someone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Jan 2013 18:14:52 GMT</pubDate>
    <dc:creator>Kamran Barlas</dc:creator>
    <dc:date>2013-01-17T18:14:52Z</dc:date>
    <item>
      <title>ISE Provisioning Issues - Public Certificate &amp; EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118320#M141441</link>
      <description>&lt;P&gt;Anyone run into the issues similar to the below?:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public Certificate bound for HTTPS&lt;/P&gt;&lt;P&gt;Internal AD Certificate Bound for EAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue is SPW or Native Supplicant will be provisioned with Root CA of Public Cert then SCEP enrolls EAP-TLS with Internal CA however as client device (ipad/iphone/android) doesnt get the Internal Root CA provisioned they will fail EAP-TLS communication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Running ISE 1.1.2 patch2, 2 node-cluster&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Guest Portal being used for Provisioning if AD credentials passed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works a treat if i bind both https &amp;amp; eap on the Internal identity ceritficate (only issue then is Guests/BYOD devices get Certificate Warnings on the portal)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kam&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 02:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118320#M141441</guid>
      <dc:creator>Kamran Barlas</dc:creator>
      <dc:date>2019-03-11T02:57:18Z</dc:date>
    </item>
    <item>
      <title>ISE Provisioning Issues - Public Certificate &amp; EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118321#M141444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kamran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell me where this is failing, i am having a hard time figuring out where you are getting stuck at...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 16:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118321#M141444</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-09T16:00:11Z</dc:date>
    </item>
    <item>
      <title>ISE Provisioning Issues - Public Certificate &amp; EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118322#M141451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the process doesnt fail as such for the onboarding/provisioning on the iphone, however the when entering domain credentials to the guest portal which intiates the onboarding/provisioning process, i notice the root CA certificate is prompted to be installed on the iphone is that of the public certificate instead of the internal root CA, the rest of the user certificate and scep process properly completes however as the root CA for the internal CA wasnt installed i get warnings when connect to our dot1x eap-tls SSID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On other devices this process fails which i can only assume is down to the lack of internal root CA cert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so as per the above im pretty much following this (differentiated access via certificates) : &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/solutions/collateral/ns340/ns414/ns742/ns744/docs/howto_60_byod_certificates.pdf"&gt;http://www.cisco.com/en/US/solutions/collateral/ns340/ns414/ns742/ns744/docs/howto_60_byod_certificates.pdf&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;however my setup is slighlty different as the EAP &amp;amp; HTTPS indentity certificate is not the internal, i have installed a public cert for HTTPS to remove certificate warnings on guest portal (as BYOD devices and guests will only have non-domain machines thus a public cert removes the certificate warnings)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does that clarify anymore?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 16:18:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118322#M141451</guid>
      <dc:creator>Kamran Barlas</dc:creator>
      <dc:date>2013-01-09T16:18:37Z</dc:date>
    </item>
    <item>
      <title>ISE Provisioning Issues - Public Certificate &amp; EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118323#M141464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kamran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is correct, when you authenticate to the guest portal you are using the https interface to pass your credentials not eap. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case this does look like a bug, since most documented use cases show a single https certificate being used for both eap and https interfaces. However If you try to onboard the devices using PEAP do you get the proper certificate installed and does the error go away (my assumption is yes).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you may want to open a tac case and forward your findings over to them, since you would expect when provisioning the supplicant should allow the user to install the eap certificate, or even yet set the supplicant to trust the certificate of the eap interface in the profile. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a search for an open bug and could not track one, I also checked the documentation and it doesnt state this as being a limitation...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post back your results if/when you get a response from TAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 16:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118323#M141464</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-09T16:28:53Z</dc:date>
    </item>
    <item>
      <title>ISE Provisioning Issues - Public Certificate &amp; EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118324#M141469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;onboarding with PEAP works but again the Public Certificate Root CA is delivered to the "onboarding/provisioning" device rather than the local CA (which has EAP "enabled"), and as PEAP only needs server side Cert to work, this works (providing the "trust for TLS" is ticked on Public ROOT Cert)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ideally i would love the EAP-TLS solution as this near enough provides a zero-touch solution for the clients, but&amp;nbsp; needs to work via the provisioning methods else its unmanageble for BYOD devices, if you use local CA certificate your guests will get a Cert warning, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure how people have got both onboarding working with both public and local Certs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW i have logged a TAC call, lets see what they come back with, will update this thread if i get anything&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;kam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 20:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118324#M141469</guid>
      <dc:creator>Kamran Barlas</dc:creator>
      <dc:date>2013-01-09T20:29:30Z</dc:date>
    </item>
    <item>
      <title>ISE Provisioning Issues - Public Certificate &amp; EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118325#M141479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update: Cisco TAC can also replicate this issue in their lab, they have escalated to developers to confirm bug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Meanwhile I'm using peap mschapv2 with the public certificate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 21:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118325#M141479</guid>
      <dc:creator>Kamran Barlas</dc:creator>
      <dc:date>2013-01-10T21:40:10Z</dc:date>
    </item>
    <item>
      <title>ISE Provisioning Issues - Public Certificate &amp; EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118326#M141485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update2: Cisco have filled a new bug / feature enhancement request:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;After discussions with developers, I Have filled a new bug: &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCue08551" target="_blank"&gt;CSCue08551&lt;/A&gt; -&amp;nbsp; ISE Native Supplicant Provisioning doesn't include CA Cert for EAP TLS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Symptom:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ISE Client Provisioning (NSP) installs only the HTTPS Certificate which cause EAP-TLS authentication to fail.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Conditions:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;EAP and HTTPS Functions on ISE use a different certificate&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Workaround:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Use same certificate for HTTPS and EAP.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This will be treated as an enhancement, as the HTTPs needs to be included since it’s always used to establish the connection between the Wizard and ISE for&amp;nbsp; SCEP Requests. Also, different ISE Policy nodes might have a certificate signed by a different CA. The fix would be to have an option on the NSP Profile to push additional CA Certificates.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps someone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 18:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118326#M141485</guid>
      <dc:creator>Kamran Barlas</dc:creator>
      <dc:date>2013-01-17T18:14:52Z</dc:date>
    </item>
    <item>
      <title>ISE Provisioning Issues - Public Certificate &amp; EAP-TLS</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118327#M141509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for following up on this, please mark this thread as resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2013 07:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-provisioning-issues-public-certificate-eap-tls/m-p/2118327#M141509</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-01-18T07:06:01Z</dc:date>
    </item>
  </channel>
</rss>

