<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guest Portal Certificate Conundrum in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871766#M472345</link>
    <description>&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = url-redirect-acl=DNAC_ACL_WEBAUTH_REDIRECT&lt;BR /&gt;cisco-av-pair = url-redirect=&lt;A href="https://10.200.254.11:port/portal/gateway?sessionId=SessionIdValue&amp;amp;portal=5a386de2-15f1-11e9-8d48-b08bcf6d2bcc&amp;amp;daysToExpiry=value&amp;amp;action=cwa" target="_blank" rel="noopener"&gt;https://10.200.254.11:port/portal/gateway?sessionId=SessionIdValue&amp;amp;portal=5a386de2-15f1-11e9-8d48-b08bcf6d2bcc&amp;amp;daysToExpiry=value&amp;amp;action=cwa&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again, the reason for the IP is that we don't have a private DNS server exposed to the guest VN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jun 2019 14:07:29 GMT</pubDate>
    <dc:creator>scsc_tech</dc:creator>
    <dc:date>2019-06-12T14:07:29Z</dc:date>
    <item>
      <title>Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871135#M472329</link>
      <description>&lt;P&gt;So we have our guest portal successfully working, but its using a self signed cert that is causing issues with some clients being able to join (browser cert restrictions)&lt;/P&gt;&lt;P&gt;I updated the portal certificate to a DigiCert publicly signed cert. I thought this would work great, but then realized the guests were hitting the IP of ISE to authenticate. The IP address is not in the SAN of the cert, and Digicert wont let me add an IP SAN.&lt;/P&gt;&lt;P&gt;So then I thought to change the portal URL to be a DNS name rather than IP, but ran into another issue that the guests are using public Umbrella DNS servers and not our internal DNS servers, so the address does not resolve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im not sure how to fix this issue now. I appear to be in a catch 22.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:06:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871135#M472329</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2020-02-21T19:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871154#M472330</link>
      <description>Do you have an internal PKI that you could get a certificate from? If not, you could always use the internal ISE CA to issue a certificate for you guest portal. I would recommend checking this out: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_0111.html#concept_C0EDF372974E459CA8E4A14389853525" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_0111.html#concept_C0EDF372974E459CA8E4A14389853525&lt;/A&gt;</description>
      <pubDate>Tue, 11 Jun 2019 17:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871154#M472330</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-06-11T17:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871159#M472331</link>
      <description>&lt;P&gt;We dont have PKI&lt;/P&gt;&lt;P&gt;Using the internal ISE CA would still present an untrusted cert to the end user, no?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 17:25:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871159#M472331</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-06-11T17:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871164#M472332</link>
      <description>The easiest route is to do a wildcard in the SAN.&lt;BR /&gt;&lt;BR /&gt;Please check the certificate information in the Prescriptive guest guide on &lt;A href="https://cs.co/ise-guest" target="_blank"&gt;https://cs.co/ise-guest&lt;/A&gt; community pages for more information&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Jun 2019 17:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871164#M472332</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-06-11T17:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871168#M472333</link>
      <description>Our digicert SSL is a wildcard cert.&lt;BR /&gt;The issue is the guests navigate to the IP address of ISE when they authenticate to the portal.</description>
      <pubDate>Tue, 11 Jun 2019 17:45:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871168#M472333</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-06-11T17:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871171#M472334</link>
      <description>Yes i wouldn't recommend that at all for a guest portal or any user device facing portals at all unless they are in a corporate domain and you can push the internal chain to the endpoints before hand (useful for posture, sponsor, my devices, certificate provisioning type portals but not for guest or BYOD)</description>
      <pubDate>Tue, 11 Jun 2019 17:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871171#M472334</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-06-11T17:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871172#M472336</link>
      <description>OK don't have them do that? why is that necessary? You can have them go to enroll.cisco.com or any http site</description>
      <pubDate>Tue, 11 Jun 2019 17:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871172#M472336</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-06-11T17:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871173#M472339</link>
      <description>We have a self-registration redirect. When someone joins our guest network, it redirects them to the self-registration portal that is hosted on ISE. The redirect takes them to an internal IP of ISE because they only have access to public DNS servers, thus cant use the FQDN of ISE.</description>
      <pubDate>Tue, 11 Jun 2019 17:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871173#M472339</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-06-11T17:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871220#M472341</link>
      <description>You will need to get the IP in the cert or get your DNS to resolve.&lt;BR /&gt;&lt;BR /&gt;Here is a thread on your issue &lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/ise-guest-dns/td-p/3734037" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/ise-guest-dns/td-p/3734037&lt;/A&gt;&lt;BR /&gt;, there might be some others as well&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Jun 2019 19:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871220#M472341</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-06-11T19:00:38Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871402#M472343</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/822473"&gt;@scsc_tech&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to see your Authorization Profile that is used for the re-direction - why the heck would that include an IP address?&amp;nbsp; Portal URL's should never include an IP address.&lt;/P&gt;
&lt;P&gt;In the ISE Authorization Profile, either state the Static FQDN, or leave that field blank, and then ISE will auto-populate with the PSN node's FQDN on the CLI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There's all sorts of shenanigans should can do with DNS etc - but let's check the AuthZ Profile first.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Arne&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 03:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871402#M472343</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-06-12T03:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871766#M472345</link>
      <description>&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;BR /&gt;cisco-av-pair = url-redirect-acl=DNAC_ACL_WEBAUTH_REDIRECT&lt;BR /&gt;cisco-av-pair = url-redirect=&lt;A href="https://10.200.254.11:port/portal/gateway?sessionId=SessionIdValue&amp;amp;portal=5a386de2-15f1-11e9-8d48-b08bcf6d2bcc&amp;amp;daysToExpiry=value&amp;amp;action=cwa" target="_blank" rel="noopener"&gt;https://10.200.254.11:port/portal/gateway?sessionId=SessionIdValue&amp;amp;portal=5a386de2-15f1-11e9-8d48-b08bcf6d2bcc&amp;amp;daysToExpiry=value&amp;amp;action=cwa&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again, the reason for the IP is that we don't have a private DNS server exposed to the guest VN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 14:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871766#M472345</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-06-12T14:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871844#M472347</link>
      <description>I ended up giving guest vn access to our internal DNS servers. Solved the issue.</description>
      <pubDate>Wed, 12 Jun 2019 15:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3871844#M472347</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-06-12T15:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3872177#M472348</link>
      <description>&lt;P&gt;Right, now I get it.&amp;nbsp; The DHCP server was handing out some public DNS server (like OpenDNS) and therefore you had to hard code the ISE IP address into the URL.&amp;nbsp; That's nasty.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So you ended up doing what pretty much every one else does, which is to allow guests to use the internal DNS server.&amp;nbsp; Nothing too wrong with that.&amp;nbsp; In that case you may as well put the FQDN into the URL Authorization Profile (as long as that FQDN lives in the cert (preferably in the Subject Alternative Name as&amp;nbsp; &amp;nbsp;DNS: &amp;lt;FQDN&amp;gt;)&lt;/P&gt;
&lt;P&gt;The ideal case is to either&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use the DNS/DHCP server of the ISE PSN (very cool if your design allows it) or&lt;/LI&gt;
&lt;LI&gt;Use a separate DNS server that only resolves the IP of two PSN FQDNs, and conditionally forwards everything else to an external public facing DNS server&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 13 Jun 2019 06:02:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3872177#M472348</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-06-13T06:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: Guest Portal Certificate Conundrum</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3872650#M472521</link>
      <description>&lt;P&gt;We are using a Cisco Umbrella DNS relay internally, so it decides whether to query our internal DNS servers or public based on domain.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 18:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-portal-certificate-conundrum/m-p/3872650#M472521</guid>
      <dc:creator>scsc_tech</dc:creator>
      <dc:date>2019-06-13T18:49:54Z</dc:date>
    </item>
  </channel>
</rss>

