<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ise certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078282#M24217</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;I was using an internal ca for certificates .Unfortunately it is crahed and cannot recoverable . &lt;BR /&gt;Using EAP and web authntication ( for guest portal) &lt;BR /&gt;Need to add the certificate from the new CA .&lt;BR /&gt;Do I need to break the cluster first ?&lt;BR /&gt;Or what is the procedure &lt;BR /&gt;if yes how&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 07:24:52 GMT</pubDate>
    <dc:creator>muhsi_2015</dc:creator>
    <dc:date>2019-03-11T07:24:52Z</dc:date>
    <item>
      <title>ise certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078282#M24217</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I was using an internal ca for certificates .Unfortunately it is crahed and cannot recoverable . &lt;BR /&gt;Using EAP and web authntication ( for guest portal) &lt;BR /&gt;Need to add the certificate from the new CA .&lt;BR /&gt;Do I need to break the cluster first ?&lt;BR /&gt;Or what is the procedure &lt;BR /&gt;if yes how&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078282#M24217</guid>
      <dc:creator>muhsi_2015</dc:creator>
      <dc:date>2019-03-11T07:24:52Z</dc:date>
    </item>
    <item>
      <title>No need to break the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078283#M24218</link>
      <description>&lt;P&gt;No need to break the deployment to add the new certificate. You can follow the steps below:&lt;/P&gt;
&lt;P&gt;1) Generate CSR on all nodes and send to CA. IF you are using a wildcard, generate CSR on one node and send it to CA.&lt;/P&gt;
&lt;P&gt;2) Obtain the issued cert and install it on all nodes. Do NOT replace the old cert yet.&lt;/P&gt;
&lt;P&gt;3) Import the new CA certificate in the Trusted store on the primary node in deployment alone.&lt;/P&gt;
&lt;P&gt;4) Change the system cert to new cert on all other nodes. This will force a restart of the services. Wait till they come back up successfully in the deployment.&lt;/P&gt;
&lt;P&gt;5) Change the system cert of primary node. This will also cause restart of services. Once it comes back all nodes in your deployment should have new cert.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 13:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078283#M24218</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-31T13:15:04Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078284#M24219</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Now the certificate hierarchy has changed&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Root , subordinate CA ,then certificate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ROOT-CA&lt;BR /&gt; INTERNAL-CA&lt;BR /&gt;certificate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Before there was only rootca (microsoft ).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How to accomodate this change&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 16:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078284#M24219</guid>
      <dc:creator>muhsi_2015</dc:creator>
      <dc:date>2017-01-31T16:21:55Z</dc:date>
    </item>
    <item>
      <title>Install both Root and</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078285#M24221</link>
      <description>&lt;P&gt;Install both Root and subordinate CA certs into the Trusted cert store. Nothing else should change.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 16:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078285#M24221</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-31T16:28:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078286#M24223</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;" 1) Generate CSR on all nodes and send to CA. IF you are using a wildcard, generate CSR on one node and send it to CA. "&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I don't have the import or export option in secondary node for exporting or importing certificates . And No option for CSR in the secondary .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;IMG src="http://i.imgur.com/WJqrjEe.png" alt="" width="989" height="317" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Second thing , the above step is same If I am changing from self signed certificate to internal CA&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 11:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078286#M24223</guid>
      <dc:creator>muhsi_2015</dc:creator>
      <dc:date>2017-02-02T11:20:41Z</dc:date>
    </item>
    <item>
      <title>Sorry, I should have been</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078287#M24224</link>
      <description>&lt;P&gt;Sorry, I should have been more clear. The export and import functionality for all nodes is available only on the the primary node. Check the new primary admin wildcard cert and click Export. Click on import and select the secondary node to import to that node.&lt;/P&gt;
&lt;P&gt;Same goes with CSR, you have to generate CSR for all nodes using the GUI of the primary node.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 12:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate/m-p/3078287#M24224</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-02T12:46:25Z</dc:date>
    </item>
  </channel>
</rss>

