<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE and public certs for EAP in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3989289#M455414</link>
    <description>&lt;P&gt;What Damien said. You basically should not be using ".local" domain for even internal domains. Instead, you should be using ".net" or something else. With that said, what is done is done &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; So, what you need to do is change the hostname in CLI to a FQDN with the ".com" A few things to keep in mind before doing this:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You will still be able to join your ISE nodes to your ".local" AD (Assuming you are using AD)&lt;/LI&gt;
&lt;LI&gt;You will have to re-issue your wildcard cert&lt;/LI&gt;
&lt;LI&gt;Some DNS changes will be required since your internal hosts will probably need to resolve to "ISE.local" vs guests/BYOD which have to resolve to "ISE.com"&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Nov 2019 04:50:25 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2019-11-26T04:50:25Z</dc:date>
    <item>
      <title>ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3988909#M455412</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our current ISE node is registered as ise.xxx.local&lt;/P&gt;&lt;P&gt;Is it possible to use ise.xxx.com as the EAP certificate?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I presently have the .com wildcard cert used for guest and sponsor portal but I don't think it is setup correctly for EAP.&amp;nbsp; So I wanted to generate a separate .com certificate for EAP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to note when I tried to generate ise.xxx.com as the cname and SAN DNS name, it in ISE, I got the message:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Certificate must contain the FQDN 'ISE.xxx.local' or a matching wildcard as a DNS name in the SubjectAlternativeName (SAN) extension.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Currently on 2.4 patch 10&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 14:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3988909#M455412</guid>
      <dc:creator>BrianPersaud</dc:creator>
      <dc:date>2019-11-25T14:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3989256#M455413</link>
      <description>You're going to want to change the domain name of the ISE deployment. No reputable public CA will sign a certificate with a local tld. Once you move off the local tld you can move past the certificate issues and use the public CA signed certs.</description>
      <pubDate>Tue, 26 Nov 2019 01:51:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3989256#M455413</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-11-26T01:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3989289#M455414</link>
      <description>&lt;P&gt;What Damien said. You basically should not be using ".local" domain for even internal domains. Instead, you should be using ".net" or something else. With that said, what is done is done &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; So, what you need to do is change the hostname in CLI to a FQDN with the ".com" A few things to keep in mind before doing this:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You will still be able to join your ISE nodes to your ".local" AD (Assuming you are using AD)&lt;/LI&gt;
&lt;LI&gt;You will have to re-issue your wildcard cert&lt;/LI&gt;
&lt;LI&gt;Some DNS changes will be required since your internal hosts will probably need to resolve to "ISE.local" vs guests/BYOD which have to resolve to "ISE.com"&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 04:50:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3989289#M455414</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2019-11-26T04:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3990976#M455415</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your statement &lt;EM&gt;"&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;You basically should not be using ".local" domain for even internal domains. Instead, you should be using ".net" or something else"&lt;/EM&gt; is not true. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The FQDN that you assign to an ISE node during installation can be an internal (private) domain name. e.g. ise01.local, ise02.local - this is to allow an organisation to maintain whatever internal naming convention they have. And of course you don't want to expose this to the outside world (e.g. in web portal URLs or certificates)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The fact that you may want to present guest.mycompany.com has nothing at all to do with the FQDN of the PSN nodes. You should be using static FQDN overrides in Sponsor Portal and Authorization Profiles for URL redirection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And also use CNAME DNS records to map guest.mycompany.com to ise01.local - the TCP connection is built on the IP address of the resolved FQDN. If you design this right, then you can separate the host's FQDN from the client presentation layer.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 02:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3990976#M455415</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-11-29T02:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3990985#M455416</link>
      <description>At the end of the day it's been a best practice since about 2013+ to not use ".local" for your domain.  You won't get public certs signed with it, and rfc6762 released in 2013 which began leveraging .local for mdns.</description>
      <pubDate>Fri, 29 Nov 2019 03:18:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3990985#M455416</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-11-29T03:18:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3990997#M455417</link>
      <description>&lt;P&gt;oh I was not implying that your public certs contain a domain of .local - that will never work because a CA cannot create a cert for any private domains.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My point was that we need to separate the transport layer connectivity requirements (FQDN --&amp;gt; IP address) from the presentation layer requirements (cert matching to FQDN)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The easy (lazy) way out is to build ISE nodes using a public domain (e.g. myise01.mycompany.com) - it's convenient to do this because it means that everything else falls into place and you won't need to use static FQDNs for anything. But it's a simplistic design that doesn't always work for all customers. Large customers have complex DNS domains and they like to use internal domains for internal services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 04:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3990997#M455417</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-11-29T04:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3991288#M455418</link>
      <description>&lt;P&gt;Hi Arne-&lt;/P&gt;
&lt;P&gt;Can you elaborate on your "is not true" statement about the usage of .local? Because it has been best practices not to use .local for a many years now with plenty of info about it on the www.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 19:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3991288#M455418</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2019-11-29T19:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3991408#M455419</link>
      <description>&lt;P&gt;I will have to take back what i said. I misinterpreted what &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt;&amp;nbsp;&amp;nbsp;had written and I didn’t consider the distinction of the more recent .local usage. I was not aware the .local had gained a specific usage as a TLD. I don’t use it myself but I have mostly come across customers who use private domains. That was my main objection. And then I had lumped .net and .local into the same category &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Nov 2019 12:46:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3991408#M455419</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-11-30T12:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE and public certs for EAP</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3991567#M455420</link>
      <description>&lt;P&gt;No worries and thank you for the clarification! I wanted to make sure I was not missing something here as well &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 01 Dec 2019 02:55:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-and-public-certs-for-eap/m-p/3991567#M455420</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2019-12-01T02:55:31Z</dc:date>
    </item>
  </channel>
</rss>

