<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1X self signed certificates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4014300#M454551</link>
    <description>Yes we are only testing and I dont have access to PKI certs at the moment so thats why I asked if I could give it a run with the 509 type certs.&lt;BR /&gt;And allow me to say this it was a pure joy reading your post, best post one could read to start their day, bless ya.</description>
    <pubDate>Mon, 20 Jan 2020 01:49:43 GMT</pubDate>
    <dc:creator>networker4424</dc:creator>
    <dc:date>2020-01-20T01:49:43Z</dc:date>
    <item>
      <title>802.1X self signed certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4013140#M454457</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are testing ISE and so far we've successfully tried authentication using username and password but now we want to test certificate based authentication. Will self signed certificates be ok for dot1x authentication between a windows client and ISE.&lt;/P&gt;&lt;P&gt;The version of ISE i'm using is 2.4, any suggestion or documentation in this regard will help a lot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2020 03:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4013140#M454457</guid>
      <dc:creator>networker4424</dc:creator>
      <dc:date>2020-01-17T03:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X self signed certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4013157#M454547</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;What do you mean by self signed certificate between client and ise?&lt;BR /&gt;Who will sign the certificate of your clients?&lt;BR /&gt;</description>
      <pubDate>Fri, 17 Jan 2020 03:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4013157#M454547</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-01-17T03:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X self signed certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4013534#M454549</link>
      <description>&lt;P&gt;Self-signed certificates would work just fine as long as each side trusts each other.&amp;nbsp; If you are using self-signed certificates on ISE for EAP Authentication, then you would need to ensure that the ISE certificate is loaded on the client side in the certificate trust list.&amp;nbsp; Just import the ISE certificate into the Root or Intermediate CA certificates list.&lt;/P&gt;&lt;P&gt;If the client's certificate will be self-signed, then you would need to install that certificate into the ISE certificate trust list and make sure to check the option "Trust for client authentication".&lt;/P&gt;&lt;P&gt;But this is only for testing!&amp;nbsp; I do not recommend self-signed certificates for production.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2020 15:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4013534#M454549</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-01-17T15:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X self signed certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4014300#M454551</link>
      <description>Yes we are only testing and I dont have access to PKI certs at the moment so thats why I asked if I could give it a run with the 509 type certs.&lt;BR /&gt;And allow me to say this it was a pure joy reading your post, best post one could read to start their day, bless ya.</description>
      <pubDate>Mon, 20 Jan 2020 01:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4014300#M454551</guid>
      <dc:creator>networker4424</dc:creator>
      <dc:date>2020-01-20T01:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X self signed certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4079089#M560121</link>
      <description>&lt;P class="lia-align-justify"&gt;Why are&amp;nbsp;&lt;SPAN&gt;self-signed certificates for production not recommended?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 16:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4079089#M560121</guid>
      <dc:creator>Lynda_D</dc:creator>
      <dc:date>2020-05-04T16:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X self signed certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4079226#M560123</link>
      <description>&lt;P&gt;A certificate is like an ID card.&amp;nbsp; It proves that you are who you say you are.&amp;nbsp; Some places check IDs and some places don't.&amp;nbsp; Some have strict requirements for ID's like in the US now where TSA at the airport won't accept a driver's license unless it has a gold star on it (Federal REAL ID Act).&amp;nbsp; Some places like bar may just want you to flash it in front of them but don't really verify the authenticity of the ID.&amp;nbsp; That is the same with server certificates.&lt;/P&gt;&lt;P&gt;The burden is on the client side to verify that the server is trusted and that it has a certificate (ID card) that was issued by a trusted third party such as Verisign.&amp;nbsp; If the client side detects a problem with the certificate, it presents a warning to the user but the user can choose to continue.&amp;nbsp; So for lab testing or internal-only systems, a self-signed certificate will work.&amp;nbsp; It would work in production as well but the user would be prompted each time saying the server is potentially unsafe.&amp;nbsp; So that is an impact to your organization's reputation or brand.&lt;/P&gt;&lt;P&gt;The other concern is that if you use self-signed certificates, you are conditioning your users to just click accept/continue when presented with a warning.&amp;nbsp; So when they actually do hit a rogue server, they will likely just click accept/continue and be compromised.&amp;nbsp; I personally don't want to condition any users to do that.&amp;nbsp; Users are already vulnerable enough.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 20:09:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4079226#M560123</guid>
      <dc:creator>Colby LeMaire</dc:creator>
      <dc:date>2020-05-04T20:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X self signed certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4079726#M560142</link>
      <description>Thanks for the explanation!</description>
      <pubDate>Tue, 05 May 2020 14:00:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/802-1x-self-signed-certificates/m-p/4079726#M560142</guid>
      <dc:creator>Lynda_D</dc:creator>
      <dc:date>2020-05-05T14:00:56Z</dc:date>
    </item>
  </channel>
</rss>

