<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924816#M293942</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the problem is more related to your clients, have you configured all the pc's to trust at least the root ca and the ca that ise has gotten it's certificate from ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Apr 2012 21:00:55 GMT</pubDate>
    <dc:creator>jan.nielsen</dc:creator>
    <dc:date>2012-04-24T21:00:55Z</dc:date>
    <item>
      <title>Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct?</title>
      <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924815#M293941</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a distributed ISE deployment with regional intermediate CA, I am getting failed authentication due to " EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain".&amp;nbsp; Client device have only one client certificate issued from regional intermediate CA. When client device goes across the region, they can't authenticate and gets this "unknown” CA error. The admin node has certificates of all intermediate CAs and root CA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One possible solution is to add intermediate CA certificates to all regional Node groups but apparently it is not possible on ISE policy nodes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at the diagram below and let me know you think (Client authentication failure at both location 1 and 3).&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924815#M293941</guid>
      <dc:creator>shoaibkhan</dc:creator>
      <dc:date>2019-03-11T01:59:14Z</dc:date>
    </item>
    <item>
      <title>Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct?</title>
      <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924816#M293942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the problem is more related to your clients, have you configured all the pc's to trust at least the root ca and the ca that ise has gotten it's certificate from ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2012 21:00:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924816#M293942</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2012-04-24T21:00:55Z</dc:date>
    </item>
    <item>
      <title>Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct?</title>
      <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924817#M293943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jan for your reply. I have aised this to cisco TAC and the have checked all ISE config and client configs. they didn't found any configuration error. Cisco TAC has no answer to this problem yet!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Apr 2012 22:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924817#M293943</guid>
      <dc:creator>shoaibkhan</dc:creator>
      <dc:date>2012-04-29T22:25:31Z</dc:date>
    </item>
    <item>
      <title>Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct?</title>
      <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924818#M293944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you installed ALL intermidiate CA certs on all your PSN's in every region ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 May 2012 10:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924818#M293944</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2012-05-01T10:01:07Z</dc:date>
    </item>
    <item>
      <title>Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct?</title>
      <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924819#M293945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jan for reply. And short answer is Yes .... &lt;/P&gt;&lt;P&gt;we have identified the issue and it has been resolved now. It was down to one of the cert corruption on primary admin. &lt;/P&gt;&lt;P&gt;It was only identified after going to debug logs in prrt. Verification was done by export that particular cert and analyzing it. Don't know how it got corrupted but it did. &lt;/P&gt;&lt;P&gt;In CA cert section on primary admin node, it was displaying correct value like issue date etc but when it was exported for analysis, I couldn't open it. &lt;/P&gt;&lt;P&gt;So moral of the story is that the someone thought that they need to put a status field against every cert on ISE and it wasn't decided how to check its status - no offence. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 May 2012 10:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924819#M293945</guid>
      <dc:creator>shoaibkhan</dc:creator>
      <dc:date>2012-05-01T10:17:39Z</dc:date>
    </item>
    <item>
      <title>Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct?</title>
      <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924820#M293946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ... I think i have the same problem. Could you explain what exactly the problem is comparing the certificates ? How was it fixed - didn't get that part &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 08:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924820#M293946</guid>
      <dc:creator>guardian-de</dc:creator>
      <dc:date>2012-06-26T08:22:27Z</dc:date>
    </item>
    <item>
      <title>Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct?</title>
      <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924821#M293947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi just wanting to clarify here that you are essentially utilising multiple issuing CAs on the one ISE deployment? If this is the case how is it configured in that I cannot seem to have multiple certs been trusted for EAP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 22:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924821#M293947</guid>
      <dc:creator>Stephen McBride</dc:creator>
      <dc:date>2012-10-15T22:28:04Z</dc:date>
    </item>
    <item>
      <title>Distributed ISE &amp; Distributed PKI = EAP-TLS issues ... Correct?</title>
      <link>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924822#M293948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Stephen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have as many sub-ca's or root ca's certificates in ISE as you like, and use them to validate and crl check users certs with, however the cert that ise presents to the clients during any kind of EAP negotiation, can only be one specific, which means for EAP-TLS &amp;amp; PEAP, you will need to have that specific root/subca cert installed on all your clients, and trust it in your supplicant settings.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 21:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/distributed-ise-distributed-pki-eap-tls-issues-correct/m-p/1924822#M293948</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2012-11-20T21:10:42Z</dc:date>
    </item>
  </channel>
</rss>

