<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Rahul, in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050244#M24326</link>
    <description>&lt;P&gt;Yes. this is right. thank you&lt;/P&gt;</description>
    <pubDate>Sat, 28 Jan 2017 15:01:27 GMT</pubDate>
    <dc:creator>Alitay1983</dc:creator>
    <dc:date>2017-01-28T15:01:27Z</dc:date>
    <item>
      <title>Cisco Ise distributed deployment Certificate management</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050239#M24308</link>
      <description>&lt;P&gt;Case:&lt;/P&gt;
&lt;P&gt;I have an ISE deployment with two nodes&lt;/P&gt;
&lt;P&gt;domain name: ise.publicdomain.com&lt;/P&gt;
&lt;P&gt;Node 1: hostname: psn-1. admin primary, monitoring secondary, PSN&lt;/P&gt;
&lt;P&gt;Node 2: hostname: psn-2. admin secondary, monitoring primary, PSN&lt;/P&gt;
&lt;P&gt;I am planing to sign the certificate by a public CA such as Godaddy&amp;nbsp;for guest, BYOD, EAP-TLS, and admin portals.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question:&lt;/P&gt;
&lt;P&gt;If i generated a wildcard certificate CSR from the primary node and sign it by public trusted CA with FDQN as CN and SANs:&lt;/P&gt;
&lt;P&gt;ise.publicdomain.com, psn-1.ise.publicdomain.com, aaa.ise.publicdomain.com, *.ise.publicdomain.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Do I need to generate a second CSR from the second node and sign it by the public trusted CA with FQDN as CN and SANs:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ise.publicdomain.com, psn-2.ise.publicdomain.com, aaa.ise.publicdomain.com, *.ise.publicdomain.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;what is a valid senario ? could it be done one certificate CSR ? does the public CA's charge us for securing two certificate ? Does any one h&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050239#M24308</guid>
      <dc:creator>Alitay1983</dc:creator>
      <dc:date>2019-03-11T07:23:44Z</dc:date>
    </item>
    <item>
      <title>Yes, it should work with one</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050240#M24311</link>
      <description>&lt;P&gt;Yes, it should work with one CSR.&lt;/P&gt;
&lt;H2&gt;Best practice of using a generic hostname for the CN field of the subject, and insert both the same generic hostname and the wildcard value into the SAN Field.&lt;/H2&gt;
&lt;P&gt;There are a few ways to import a wildcard certificate into ISE version 1.2.&amp;nbsp; This procedure will follow what we expect to be the most common approach, which is to create the Certificate Signing Request (CSR) within the ISE administrative interface and submit that CSR to the signing Certificate Authority (CA).&amp;nbsp; The resulting signed public key will be bound to the CSR on ISE.&lt;/P&gt;
&lt;P&gt;The final private and public key-pair will be exported from the first ISE node, and imported on the other nodes in the deployment.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Let’s Create the Certificate Signing Request (CSR)&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;From the first ISE node, navigate to the certificates section of the administrative GUI.&amp;nbsp; For dedicated Policy Services Nodes, the path will be “Administration &amp;gt; Server Certificates”.&amp;nbsp; If the node is also an administrative node, the path will be “Administration &amp;gt; Certificates &amp;gt; Local Certificates”.&lt;/P&gt;
&lt;P&gt;Step 1 Click Add &amp;gt; Generate Certificate Signing Request&lt;/P&gt;
&lt;P&gt;Step 2 In the Certificate Subject enter the generic FQDN for the ISE PSNs.&lt;/P&gt;
&lt;P&gt;Step 3 Select at least two DNS Names under the Subject Alternative Name (SAN) section&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;One of the DNS Names must match the CN= value from Step 2.&lt;/LI&gt;
&lt;LI&gt;The other DNS Name should be the wildcard value.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Step 4 Ensure the “Allow Wildcard Certificates” check box is selected.&lt;/P&gt;
&lt;P&gt;Step 5 Click Submit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.networkworld.com/article/2225032/infrastructure-management/what-are-wildcard-certificates-and-how-do-i-use-them-with-ciscos-ise.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After reading the above document, you will get to know the best practice.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Gagan&lt;/P&gt;
&lt;P&gt;PS: rate if it helps!!!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2017 23:58:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050240#M24311</guid>
      <dc:creator>Gagandeep Singh</dc:creator>
      <dc:date>2017-01-24T23:58:07Z</dc:date>
    </item>
    <item>
      <title>I have used 1 certificate in</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050241#M24315</link>
      <description>&lt;P&gt;I have used 1 certificate in my customer deployments with the following characteristics:&lt;/P&gt;
&lt;P&gt;Subject name: ise.domain.com&lt;/P&gt;
&lt;P&gt;Subject Alternate names (SAN): *.domain.com, ise1.domain.com, ise2.domain.com, mydevices.domain.com,portal.domain.com&lt;/P&gt;
&lt;P&gt;You generate 1 CSR, receive the cert from CA and install on primary node. Then export same certificate (along with private key) and import it on to the secondary. Once this is done, change the ISE admin, EAP and portal certificate to the new cert. This will restart services and start using new cert after that.&lt;/P&gt;
&lt;P&gt;One suggestion is to to identify what SAN's that you need the public CA certificate for before requesting from CA. This will allow you to do all of the above in one go rather than multiple times.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2017 00:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050241#M24315</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-25T00:34:58Z</dc:date>
    </item>
    <item>
      <title>Thx Rahul for the above.</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050242#M24318</link>
      <description>&lt;P&gt;Thx Rahul for the above.&lt;/P&gt;
&lt;P&gt;what happens if ise1 fails and ise2 has to administer the guest and byod portals.&lt;/P&gt;
&lt;P&gt;if the dns records for portal.domain.com resolve to ise1, how could we redirect clients to ise2 portals ?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2017 18:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050242#M24318</guid>
      <dc:creator>Alitay1983</dc:creator>
      <dc:date>2017-01-25T18:10:40Z</dc:date>
    </item>
    <item>
      <title>Guest and BYOD portals are</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050243#M24322</link>
      <description>&lt;P&gt;Guest and BYOD portals are usually handled by a redirect ACL from the PSN handling the Auth request. So if ISE1 fails, WLC talks to ISE2 and it should send the redirect ACL to the WLC. The redirect url usually has the FQDN of the ISE servicing the request.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 17:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050243#M24322</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-26T17:26:47Z</dc:date>
    </item>
    <item>
      <title>Hi Rahul,</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050244#M24326</link>
      <description>&lt;P&gt;Yes. this is right. thank you&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jan 2017 15:01:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050244#M24326</guid>
      <dc:creator>Alitay1983</dc:creator>
      <dc:date>2017-01-28T15:01:27Z</dc:date>
    </item>
    <item>
      <title>If you are provisioning certs</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050245#M24330</link>
      <description>&lt;P&gt;If you are provisioning certs, you are most likely using EAP-TLS (or a similar variant) for your Wireless access. For a user who has left the organization, all you need to do is revoke the certificate issued to them via ISE. This will block the users entry as the certificate revocation will be checked during network access by the supplicant. If you don't revoke the cert, the user will still be able to access the network - even if he is no longer present in the AD. There is no username/password authentication that happens during this process.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2017 13:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-distributed-deployment-certificate-management/m-p/3050245#M24330</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-29T13:53:19Z</dc:date>
    </item>
  </channel>
</rss>

