<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Guest Portal Certificate Trust in Endpoint in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881230#M471883</link>
    <description>&lt;P&gt;Hi Experts,&lt;/P&gt;
&lt;P&gt;I are deploying guest and BYOD solution for customer and customer has given me certificate for portal which is signed by sub CA.&lt;/P&gt;
&lt;P&gt;Now sub CA is not available in endpoints, however, root CA cert is available in all the endpoints.&lt;/P&gt;
&lt;P&gt;when guest and BYOD user connects to portal they get certificate error because ISE sends certificate of portal only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thus in order to rid off certificate error, can ISE be configured in such a way that ISE will send portal certificate with root or sub CA or CA chain?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jay&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jun 2019 06:17:35 GMT</pubDate>
    <dc:creator>Jay Tiwari</dc:creator>
    <dc:date>2019-06-28T06:17:35Z</dc:date>
    <item>
      <title>ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881230#M471883</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;
&lt;P&gt;I are deploying guest and BYOD solution for customer and customer has given me certificate for portal which is signed by sub CA.&lt;/P&gt;
&lt;P&gt;Now sub CA is not available in endpoints, however, root CA cert is available in all the endpoints.&lt;/P&gt;
&lt;P&gt;when guest and BYOD user connects to portal they get certificate error because ISE sends certificate of portal only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thus in order to rid off certificate error, can ISE be configured in such a way that ISE will send portal certificate with root or sub CA or CA chain?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jay&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 06:17:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881230#M471883</guid>
      <dc:creator>Jay Tiwari</dc:creator>
      <dc:date>2019-06-28T06:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881248#M471884</link>
      <description>&lt;P&gt;Hi Jay&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;have you already installed the entire CA cert chain in your ISE nodes? &amp;nbsp;I thought that ISE always returns the entire CA cert chain if the client requests it. This is the part I am vague on. I think if the client doesn’t have the entire chain then it’s up to the client to request this from the server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 06:51:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881248#M471884</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-06-28T06:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881261#M471885</link>
      <description>&lt;P&gt;Yes, i did import entire CA chain in ISE hwoever when user connects in Guest portal they get error cert can not be validated&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 07:16:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881261#M471885</guid>
      <dc:creator>Jay Tiwari</dc:creator>
      <dc:date>2019-06-28T07:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881266#M471886</link>
      <description>&lt;P&gt;this issue is because of bug CSCut26025.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jay&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 07:34:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881266#M471886</guid>
      <dc:creator>Jay Tiwari</dc:creator>
      <dc:date>2019-06-28T07:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881392#M471887</link>
      <description>&lt;P&gt;Thanks for sharing this wonderful news. Is it fixed in any 2.4 patch? So if I am installing a CA chain I have to restart services on all affected nodes?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 10:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881392#M471887</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-06-28T10:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881395#M471888</link>
      <description>&lt;P&gt;Nope, It doesn't work. I have opened SR#&lt;SPAN style="caret-color: #000000; color: #000000; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none; display: inline !important; float: none;"&gt;687020206. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="caret-color: #000000; color: #000000; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none; display: inline !important; float: none;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="caret-color: #000000; color: #000000; font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none; display: inline !important; float: none;"&gt;Jay&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 10:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881395#M471888</guid>
      <dc:creator>Jay Tiwari</dc:creator>
      <dc:date>2019-06-28T10:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881529#M471889</link>
      <description>&lt;P&gt;I had this issue after upgrading from 2.4 patch 6 to patch 8.&amp;nbsp; Tac was able to direct me to&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp75207/?rfs=iqvred" target="_blank" rel="noopener"&gt;CSCvp75207.&lt;/A&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;I added trust for certificate based admin authentication to the root and intermediate ca that signed the guest portal cert, rebooted the server (standalone lab) and my portals started sending the full chain.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jun 2019 14:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3881529#M471889</guid>
      <dc:creator>CarlCarlson1234</dc:creator>
      <dc:date>2019-06-28T14:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3883872#M471890</link>
      <description>&lt;P&gt;Hi Arne&lt;/P&gt;&lt;P&gt;I've heard that this should be fixed in Patch 10 which is planned to be released around September.&lt;/P&gt;&lt;P&gt;Patch 9 was just released yesterday, and it does not have a fix for it.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 11:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3883872#M471890</guid>
      <dc:creator>stormfidus</dc:creator>
      <dc:date>2019-07-03T11:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3884241#M471891</link>
      <description>&lt;P&gt;CSCut26025 is a doc bug and resolved already by updating ISE CCO docs.&lt;/P&gt;
&lt;P&gt;CSCvp75207 is a tech bug and affecting ISE 2.4 Patch 8 and 9. For workaround, please check the bug info page.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2019 18:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3884241#M471891</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-03T18:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3884535#M471892</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the same/similar issue with a public guest portal. Trying the workarounds described in &lt;SPAN&gt;CSCut26025&amp;nbsp;&lt;/SPAN&gt;and &lt;SPAN&gt;CSCvp75207&amp;nbsp;&lt;/SPAN&gt;did only solve partial for me. Because Windows and Apple Devices trust the cert , but not Android Devices. Check with openssl (i.e. .\openssl.exe s_client -showcerts -connect website.domain.name:port) shows that ISE not delivers the certificate chain anymore (in my case with two different ISE installations). The chain was fully provided/send by ISE with 2.4 Patch 6 but stopped working with Patch 8 (need to rollback, then everything worked as expected again) and also testes in Lab environment with ISE 2.6 Patch 1 (same result). Here is my discussion about that:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/cisco-bug-discussions/cscut26025-doc-ise-certificate-chain-is-not-being-send-till/td-p/3879470" target="_blank"&gt;https://community.cisco.com/t5/cisco-bug-discussions/cscut26025-doc-ise-certificate-chain-is-not-being-send-till/td-p/3879470&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2019 06:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3884535#M471892</guid>
      <dc:creator>randomuser</dc:creator>
      <dc:date>2019-07-04T06:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3884905#M471893</link>
      <description>&lt;P&gt;This particular TAC case is actually due to&amp;nbsp;CSCvp75207, as the workaround has helped.&lt;/P&gt;
&lt;P&gt;CSCut26025 is a very old doc bug. The general workaround in restarting ISE services could have helped different underlying issues, including&amp;nbsp;CSCvk65179.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2019 17:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3884905#M471893</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-04T17:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3905325#M471894</link>
      <description>&lt;P&gt;I had the same issue, ise 2.4 patch 8, and it seemed to be resolved by following the workaround. The issue I'm having now is that the clients keep disconnecting, only my guest client. I have opened tac cases on both sides, nobody seems to know why its happening, all they see is that the phone left the bss which is not true, I'm right underneath the AP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone else seen this, I am planning to roll back to patch 6 during the weekend to see if the issue goes away.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 14:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3905325#M471894</guid>
      <dc:creator>erga</dc:creator>
      <dc:date>2019-08-08T14:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Guest Portal Certificate Trust in Endpoint</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3905329#M471895</link>
      <description>Sounds like a totally unrelated issue to deal with certificate trust. I would suggest a new thread to discuss&lt;BR /&gt;</description>
      <pubDate>Thu, 08 Aug 2019 14:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-guest-portal-certificate-trust-in-endpoint/m-p/3905329#M471895</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-08-08T14:34:59Z</dc:date>
    </item>
  </channel>
</rss>

