<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Certificate import/export in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3849634#M473444</link>
    <description>Sorry for not being clear, I was referring to endpoint certificate generated using internal ISE CA.</description>
    <pubDate>Fri, 03 May 2019 06:38:45 GMT</pubDate>
    <dc:creator>wileong</dc:creator>
    <dc:date>2019-05-03T06:38:45Z</dc:date>
    <item>
      <title>ISE Certificate import/export</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3847746#M473438</link>
      <description>&lt;P&gt;What is the best way to import/export all certificate including ISE signed certificate to another ISE cluster?&lt;/P&gt;
&lt;P&gt;Backup/Restore does not includes ISE signed identity certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Wing Churn&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2019 07:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3847746#M473438</guid>
      <dc:creator>wileong</dc:creator>
      <dc:date>2019-04-30T07:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate import/export</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3847857#M473439</link>
      <description>You shouldn’t be using self-signed as there is likely no way to get them off. You should generate certificates that are known to the endpoints. Either from an internal CA or well known root. This way you have them and can apply them to another system&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Apr 2019 10:35:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3847857#M473439</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-04-30T10:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate import/export</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3848985#M473440</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/411842"&gt;@wileong&lt;/a&gt;&amp;nbsp; - are you referring to the client certs that the internal ISE CA has generated?&amp;nbsp; &amp;nbsp;if so then you are correct, these are not contained in the config backup - you need to export those via the CLI&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;see option 7 below (export Internal CA Store)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ise01/admin# application configure ise

Selection configuration option
[1]Reset M&amp;amp;T Session Database
[2]Rebuild M&amp;amp;T Unusable Indexes
[3]Purge M&amp;amp;T Operational Data
[4]Reset M&amp;amp;T Database
[5]Refresh Database Statistics
[6]Display Profiler Statistics
[7]Export Internal CA Store
[8]Import Internal CA Store
[9]Create Missing Config Indexes
[10]Create Missing M&amp;amp;T Indexes
[11]Enable/Disable ACS Migration
[12]Generate Daily KPM Stats
[13]Generate KPM Stats for last 8 Weeks
[14]Enable/Disable Counter Attribute Collection
[15]View Admin Users
[16]Get all Endpoints
[17]Enable/Disable Wifi Setup
[18]Reset Config Wifi Setup
[19]Establish Trust with controller
[20]Reset Context Visibility
[21]Synchronize Context Visibility With Database
[22]Generate Heap Dump
[23]Generate Thread Dump
[24]Force Backup Cancellation
[0]Exit
&lt;/PRE&gt;
&lt;P&gt;If on the other hand, you are referring to the ISE System Certificates (Admin/EAP/Portal/DTLS etc) then&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;&amp;nbsp; is spot on - those you should not export - it's bad practice.&amp;nbsp; Rather have system cert created for your ISE nodes via a PKI (public or internal).&amp;nbsp; You can of course export them but it's not recommended, unless the cert is a wildcard cert, or a cert that has a SAN that allows the cert to be re-used elsewhere.&amp;nbsp; But again, in the case of self-signed certs, this should be avoided.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 11:27:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3848985#M473440</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-05-02T11:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate import/export</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3849100#M473441</link>
      <description>Some links with more info&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_0111.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_0111.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/upgrade_guide/b_ise_upgrade_guide_24/b_ise_upgrade_guide_24_chapter_00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/upgrade_guide/b_ise_upgrade_guide_24/b_ise_upgrade_guide_24_chapter_00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 02 May 2019 14:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3849100#M473441</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-05-02T14:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate import/export</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3849634#M473444</link>
      <description>Sorry for not being clear, I was referring to endpoint certificate generated using internal ISE CA.</description>
      <pubDate>Fri, 03 May 2019 06:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3849634#M473444</guid>
      <dc:creator>wileong</dc:creator>
      <dc:date>2019-05-03T06:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate import/export</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3849635#M473445</link>
      <description>Thanks for the info.</description>
      <pubDate>Fri, 03 May 2019 06:39:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3849635#M473445</guid>
      <dc:creator>wileong</dc:creator>
      <dc:date>2019-05-03T06:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate import/export</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3850192#M473448</link>
      <description>&lt;P&gt;Endpoint cert should be part of config backup. But, even if it is not present on the new deployment, as part of PKI trust you can authenticate endpoints as long as your new ISE deployment trusts old CA for EAP. Only feature you will lose will be ability to revoke certificates.&lt;/P&gt;</description>
      <pubDate>Sat, 04 May 2019 02:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-import-export/m-p/3850192#M473448</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-05-04T02:00:15Z</dc:date>
    </item>
  </channel>
</rss>

