<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic configuring CWA in distributed environment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191021#M145582</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Neno for your response....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To implement CWA in distributed environment, we need to add Subject Alternative Names in the Certificate.&lt;/P&gt;&lt;P&gt;I have already gone through the steps given in BYOD design guide, but my concern is if I would by Third party CA certificate for ISE, in that case how would I able to achieve the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://hello%20keith,%20%20greetings%21%20%20this%20is%20regarding%20your%20query%20%22[sac]%20questions%20on%20wireless%20byod/Guest%20Support%20with%20Cisco%20ISE%22%20for%20case%20ID%20#%2066826.%20Following%20is%20the%20answer%20of%20your%20concern-%20%20Question-%20Is%20there%20any%20way%20that%20we%20can%20specify%20the%20redirect%20url%20for%20Guest%20Portal%20Login%20%28still%20using%20Central%20Web%20Authentication%20on%20ISE%29?%20Answer-%20No,%20there%20is%20no%20way%20to%20customize%20the%20URL%20for%20guest%20portal%20and%20moreover%20what%20you%20tried%20is%20completely%20wrong,%20as%20you%20cannot%20directly%20put%20the%20values%20of%20ip%20and%20port%20number%20over%20there,%20those%20things%20are%20automatically%20populated%20by%20the%20node.%20%20Whichever%20node%20provides%20the%20guest%20service,%20it%E2%80%99s%20FQDN%20is%20automatically%20added%20in%20the%20guest%20portal%20URL%20and%20same%20applies%20in%20distributed%20environment.%20%20In%20order%20to%20achieve%20the%20task%20that%20you%20desire%20let%20me%20brief%20something%20about%20ISE%20Distributed%20Implementation%20Design%20Consideration-%20%20ISE%20only%20permits%20a%20single%20certificate%20to%20be%20installed%20for%20management%20purposes.%20%20This%20certificate%20is%20used%20for%20all%20HTTPS%20sessions%20terminating%20on%20ISE,%20including%20guest%20and%20sponsor%20sessions.%20%20The%20Subject%20Name%20of%20the%20certificate%20must%20contain%20the%20Fully%20Qualified%20Domain%20Name%20%28FQDN%29%20of%20the%20ISE%20node;%20all%20guest%20sessions%20will%20need%20to%20be%20redirected%20to%20the%20FQDN%20of%20the%20PSN.%20In%20distributed%20ISE%20deployment,%20one%20needs%20to%20create%20a%20certificate%20for%20ISE%20that%20maps%20to%20multiple%20DNS%20names.%20Otherwise,%20a%20certificate%20error%20will%20occur.%20Creating%20a%20certificate%20with%20multiple%20Subject%20Alternative%20Name%20%28SAN%29%20fields%20enables%20mapping%20to%20multiple%20DNS%20names.%20%20A%20browser%20reaching%20the%20PSN%20using%20any%20of%20the%20listed%20SAN%20names%20will%20accept%20the%20certificate%20without%20any%20error%20as%20long%20as%20it%20trusts%20the%20CA%20that%20signed%20the%20certificate.%20%20Workaround-%20The%20steps%20which%20are%20required%20to%20achieve%20your%20task%20is%20mentioned%20in%20the%20BYOD%20design%20Guide,%20%20http://www.cisco.com/en/US/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/byoddg.html%20%20In%20above%20given%20link%20go%20through%20following%20section,%20wherein%20you%20will%20find%20the%20steps%20to%20accomplish%20your%20desired%20task-%20%20Distributed%20ISE%20Deployment%20ISE%20PSN%20Certificates%20Configure%20Certificates%20for%20PSN%20with%20SAN%20%20%20However%20in%20your%20scenario,%20I%20believe%20you%20have%20to%20contact%20your%20Public%20Certificate%20vendor%20to%20add%20Subject%20Alternative%20Names%20%28SANs%29%20in%20the%20certificate."&gt;http://www.cisco.com/en/US/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/byoddg.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Would I need to ask Certificate vendor to add Subject Alternative Names? Will they do that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Feb 2013 05:17:11 GMT</pubDate>
    <dc:creator>mojuneja</dc:creator>
    <dc:date>2013-02-11T05:17:11Z</dc:date>
    <item>
      <title>configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191016#M145538</link>
      <description>&lt;P&gt;Could you please elaborate the process how CWA works in distributed environment?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:04:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191016#M145538</guid>
      <dc:creator>mojuneja</dc:creator>
      <dc:date>2019-03-11T03:04:19Z</dc:date>
    </item>
    <item>
      <title>Re:configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191017#M145544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cwa is configured at the administration nodes. The policy nodes send the url string to their hostname and perform the authentication and provides services such as guest authentication and my device portal.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Feb 2013 02:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191017#M145544</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-02-10T02:03:23Z</dc:date>
    </item>
    <item>
      <title>configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191018#M145548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mohit-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please elaborate a little more on your question? What exactly are you trying to accomplish? The CWA process is handled by the Policy Services (PDP) node. If you have more than one (distributed) then you can place them behind a load balancer (if L2 adjacent). If the nodes are spread geographically then you specify which which PDP nodes would each NAD client use. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Feb 2013 02:07:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191018#M145548</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2013-02-10T02:07:19Z</dc:date>
    </item>
    <item>
      <title>configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191019#M145551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tarik and Neno for your response........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is if One PSN goes down and my NAD is configured with 2 PSN IPs, so in that situation client request will go to 2nd PSN, and 2nd PSN will provide url-redirect link. So in that condition on client browser which PSN host name would be shown?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my scenario, consider PSN A is primar and PSN B is secondary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And one more thing I want to ask, can we customize the Guest Portal URL, as we have the option for Sponsor and My Device Portal under &lt;STRONG&gt;Guest/Sponsor SSL&lt;/STRONG&gt; settings?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Feb 2013 07:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191019#M145551</guid>
      <dc:creator>mojuneja</dc:creator>
      <dc:date>2013-02-10T07:51:56Z</dc:date>
    </item>
    <item>
      <title>configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191020#M145554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, if one of the PSN goes down the NAD will flag as down. As a result, future AAA messages/functions will be forwarded to the secondary PSN node. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think you can customize the URL for the guest portal. I am not 100% sure though so perhaps Tarik can confirm this. I am not going to be back in my lab for a while now otherwise I was going to test it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Feb 2013 03:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191020#M145554</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2013-02-11T03:28:34Z</dc:date>
    </item>
    <item>
      <title>configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191021#M145582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Neno for your response....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To implement CWA in distributed environment, we need to add Subject Alternative Names in the Certificate.&lt;/P&gt;&lt;P&gt;I have already gone through the steps given in BYOD design guide, but my concern is if I would by Third party CA certificate for ISE, in that case how would I able to achieve the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://hello%20keith,%20%20greetings%21%20%20this%20is%20regarding%20your%20query%20%22[sac]%20questions%20on%20wireless%20byod/Guest%20Support%20with%20Cisco%20ISE%22%20for%20case%20ID%20#%2066826.%20Following%20is%20the%20answer%20of%20your%20concern-%20%20Question-%20Is%20there%20any%20way%20that%20we%20can%20specify%20the%20redirect%20url%20for%20Guest%20Portal%20Login%20%28still%20using%20Central%20Web%20Authentication%20on%20ISE%29?%20Answer-%20No,%20there%20is%20no%20way%20to%20customize%20the%20URL%20for%20guest%20portal%20and%20moreover%20what%20you%20tried%20is%20completely%20wrong,%20as%20you%20cannot%20directly%20put%20the%20values%20of%20ip%20and%20port%20number%20over%20there,%20those%20things%20are%20automatically%20populated%20by%20the%20node.%20%20Whichever%20node%20provides%20the%20guest%20service,%20it%E2%80%99s%20FQDN%20is%20automatically%20added%20in%20the%20guest%20portal%20URL%20and%20same%20applies%20in%20distributed%20environment.%20%20In%20order%20to%20achieve%20the%20task%20that%20you%20desire%20let%20me%20brief%20something%20about%20ISE%20Distributed%20Implementation%20Design%20Consideration-%20%20ISE%20only%20permits%20a%20single%20certificate%20to%20be%20installed%20for%20management%20purposes.%20%20This%20certificate%20is%20used%20for%20all%20HTTPS%20sessions%20terminating%20on%20ISE,%20including%20guest%20and%20sponsor%20sessions.%20%20The%20Subject%20Name%20of%20the%20certificate%20must%20contain%20the%20Fully%20Qualified%20Domain%20Name%20%28FQDN%29%20of%20the%20ISE%20node;%20all%20guest%20sessions%20will%20need%20to%20be%20redirected%20to%20the%20FQDN%20of%20the%20PSN.%20In%20distributed%20ISE%20deployment,%20one%20needs%20to%20create%20a%20certificate%20for%20ISE%20that%20maps%20to%20multiple%20DNS%20names.%20Otherwise,%20a%20certificate%20error%20will%20occur.%20Creating%20a%20certificate%20with%20multiple%20Subject%20Alternative%20Name%20%28SAN%29%20fields%20enables%20mapping%20to%20multiple%20DNS%20names.%20%20A%20browser%20reaching%20the%20PSN%20using%20any%20of%20the%20listed%20SAN%20names%20will%20accept%20the%20certificate%20without%20any%20error%20as%20long%20as%20it%20trusts%20the%20CA%20that%20signed%20the%20certificate.%20%20Workaround-%20The%20steps%20which%20are%20required%20to%20achieve%20your%20task%20is%20mentioned%20in%20the%20BYOD%20design%20Guide,%20%20http://www.cisco.com/en/US/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/byoddg.html%20%20In%20above%20given%20link%20go%20through%20following%20section,%20wherein%20you%20will%20find%20the%20steps%20to%20accomplish%20your%20desired%20task-%20%20Distributed%20ISE%20Deployment%20ISE%20PSN%20Certificates%20Configure%20Certificates%20for%20PSN%20with%20SAN%20%20%20However%20in%20your%20scenario,%20I%20believe%20you%20have%20to%20contact%20your%20Public%20Certificate%20vendor%20to%20add%20Subject%20Alternative%20Names%20%28SANs%29%20in%20the%20certificate."&gt;http://www.cisco.com/en/US/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/byoddg.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Would I need to ask Certificate vendor to add Subject Alternative Names? Will they do that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Feb 2013 05:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191021#M145582</guid>
      <dc:creator>mojuneja</dc:creator>
      <dc:date>2013-02-11T05:17:11Z</dc:date>
    </item>
    <item>
      <title>configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191022#M145599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the delayed reply Mohit!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I am sure public CAs will be willing to sell you a SAN certificate, however, my guess is that it will be expensive. If you are only dealing with a couple of PDP nodes, then I would recommend that the you get two separate public certificates instead of the SAN type. The ony time I would bother with SAN certificates is if I am dealing with a lot of nodes and/or when I put the PDPs behind a load balancer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating!&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 17:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191022#M145599</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2013-02-20T17:15:57Z</dc:date>
    </item>
    <item>
      <title>configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191023#M145609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much Nano for your answer.. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2013 01:48:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191023#M145609</guid>
      <dc:creator>mojuneja</dc:creator>
      <dc:date>2013-02-21T01:48:44Z</dc:date>
    </item>
    <item>
      <title>configuring CWA in distributed environment</title>
      <link>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191024#M145634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a way to get the Authorization profile to send one of the different SAN names within the certificate instead of the actual hostname?&amp;nbsp; Maybe with Cisco AV Pair?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 18:51:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/configuring-cwa-in-distributed-environment/m-p/2191024#M145634</guid>
      <dc:creator>JHILL2</dc:creator>
      <dc:date>2013-03-01T18:51:29Z</dc:date>
    </item>
  </channel>
</rss>

