<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practices around certificate usage with pxGrid in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3846029#M473708</link>
    <description>&lt;P&gt;Paul,&lt;/P&gt;&lt;P&gt;Thanks for the response, appreciated as always.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought that the certificates used for ISE, DNAC, IoT controller, etc. all had to be issued by the same CA chain and as I understand it DNAC only supports one certificate, so I didn't want to issue it (or for the other systems) from ISE and have problems down the line. The customer wanted to avoid spinning up an internal CA which is the way I've done successful pxGrid integrations before. It looks from Krishnan's response and the DNAC documentation that my assumption was incorrect (and the ISE documentation provides no guidance that I can find!), so I can just use a self-signed cert in ISE, other certs issued to DNAC, IoT, etc. and mutually exchange them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2019 13:49:55 GMT</pubDate>
    <dc:creator>andrew333</dc:creator>
    <dc:date>2019-04-26T13:49:55Z</dc:date>
    <item>
      <title>Best practices around certificate usage with pxGrid</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3841689#M473702</link>
      <description>&lt;P&gt;We are integrating ISE with DNA-C, a Rockwell IoT controller and possibly some other systems for a customer that is using a wildcard SAN certificate from DigiCert for Admin, EAP and portals. What is the best path for pxGrid certificates, in this case as the customer would prefer to avoid using an internal CA? Ideally I'd like to bounce some ideas around with someone like John Eppich.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2019 14:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3841689#M473702</guid>
      <dc:creator>andrew333</dc:creator>
      <dc:date>2019-04-19T14:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices around certificate usage with pxGrid</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3841734#M473704</link>
      <description>&lt;P&gt;They want to avoid using the ISE internal CA for pxGrid?&amp;nbsp; While you can use other CAs for pxGrid I wouldn't recommend it.&amp;nbsp; You are just making the whole administration of pxGrid and pxGrid clients more difficult.&amp;nbsp; pxGrid certificates are used for authenticating access to pxGrid.&amp;nbsp; pxGrid is only internal facing so I am not sure why they would want to another CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also if the wildcard cert has the wildcard in the Common Name field you will probably have 802.1x issues with some clients.&amp;nbsp; I typically don't use wildcard certs for EAP authentication use case, but if the wildcard is in the SAN field it should be okay.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2019 15:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3841734#M473704</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-04-19T15:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices around certificate usage with pxGrid</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3842799#M473707</link>
      <description>&lt;P&gt;Not sure if you still have issues. ISE and DNAC integration guide explains it all.&lt;/P&gt;
&lt;P&gt;Here are the certificate requirement for ISE and DNAC to talk to each other&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 238.513px; top: 788.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.916797);"&gt;* The ISE CLI and GUI user accounts&lt;/SPAN&gt;&lt;SPAN style="left: 495.588px; top: 788.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.865058);"&gt;must use the same username &lt;/SPAN&gt;&lt;SPAN style="left: 689.338px; top: 788.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.880042);"&gt;and password.&lt;/SPAN&gt;&lt;SPAN style="left: 238.513px; top: 820.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.98312);"&gt; * The ISE admin node certificate &lt;/SPAN&gt;&lt;SPAN style="left: 457.622px; top: 820.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.945994);"&gt;must contain &lt;/SPAN&gt;&lt;SPAN style="left: 545.885px; top: 820.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.964461);"&gt;the ISE IPaddress&lt;/SPAN&gt;&lt;SPAN style="left: 669.728px; top: 820.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(1.01486);"&gt;or fully-qualified &lt;/SPAN&gt;&lt;SPAN style="left: 786.658px; top: 820.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.916021);"&gt;domain&lt;/SPAN&gt;&lt;SPAN style="left: 840.048px; top: 820.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.960639);"&gt;name(FQDN)&lt;/SPAN&gt;&lt;SPAN style="left: 249.072px; top: 840.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.923074);"&gt;in either the certificate&lt;/SPAN&gt;&lt;SPAN style="left: 403.388px; top: 840.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.895375);"&gt; subject&lt;/SPAN&gt;&lt;SPAN style="left: 454.705px; top: 840.86px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.909278);"&gt;name or the SAN.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 238.513px; top: 873.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.938756);"&gt;* The DNA Center &lt;/SPAN&gt;&lt;SPAN style="left: 367.922px; top: 873.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.878088);"&gt;system &lt;/SPAN&gt;&lt;SPAN style="left: 418.338px; top: 873.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.935202);"&gt;certificate &lt;/SPAN&gt;&lt;SPAN style="left: 488.988px; top: 873.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.907324);"&gt;must contain &lt;/SPAN&gt;&lt;SPAN style="left: 578.705px; top: 873.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.929493);"&gt;the DNA Center &lt;/SPAN&gt;&lt;SPAN style="left: 692.005px; top: 873.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.896468);"&gt;appliance &lt;/SPAN&gt;&lt;SPAN style="left: 759.938px; top: 873.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.947797);"&gt;IP or FQDN&lt;/SPAN&gt;&lt;SPAN style="left: 846.505px; top: 873.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.914641);"&gt;in either the &lt;/SPAN&gt;&lt;SPAN style="left: 249.072px; top: 893.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.935202);"&gt;certificate &lt;/SPAN&gt;&lt;SPAN style="left: 319.722px; top: 893.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.895375);"&gt;subject&lt;/SPAN&gt;&lt;SPAN style="left: 371.038px; top: 893.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.909278);"&gt;name or the SAN.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 371.038px; top: 893.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.909278);"&gt;Not sure what version of DNAC and ISE you are using.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 371.038px; top: 893.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.909278);"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/1-1/install/b_dnac_install_1_1_0P2/b_dnac_install_1_1_0P2_chapter_010.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/1-1/install/b_dnac_install_1_1_0P2/b_dnac_install_1_1_0P2_chapter_010.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 371.038px; top: 893.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.909278);"&gt;DNAC and ISE talks to each other using few different ways( SSH, PxGrid, APIs).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 371.038px; top: 893.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.909278);"&gt;So it is not a typical PxGrid peer like others. This is to keep in mind. Please make sure your NTP is synced and DNS works for the integration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="left: 371.038px; top: 893.36px; font-size: 16.6667px; font-family: sans-serif; transform: scaleX(0.909278);"&gt;-Krishnan&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 02:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3842799#M473707</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2019-04-23T02:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices around certificate usage with pxGrid</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3846029#M473708</link>
      <description>&lt;P&gt;Paul,&lt;/P&gt;&lt;P&gt;Thanks for the response, appreciated as always.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought that the certificates used for ISE, DNAC, IoT controller, etc. all had to be issued by the same CA chain and as I understand it DNAC only supports one certificate, so I didn't want to issue it (or for the other systems) from ISE and have problems down the line. The customer wanted to avoid spinning up an internal CA which is the way I've done successful pxGrid integrations before. It looks from Krishnan's response and the DNAC documentation that my assumption was incorrect (and the ISE documentation provides no guidance that I can find!), so I can just use a self-signed cert in ISE, other certs issued to DNAC, IoT, etc. and mutually exchange them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 13:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/3846029#M473708</guid>
      <dc:creator>andrew333</dc:creator>
      <dc:date>2019-04-26T13:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices around certificate usage with pxGrid</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/4063104#M559512</link>
      <description>&lt;P&gt;So the self-sign cert in DNAC cannot be used?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current cert name:&lt;/STRONG&gt; CN=kong&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issuer:&lt;/STRONG&gt; CN=kube-ca&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Authority:&lt;/STRONG&gt; Self signed&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Expire:&lt;/STRONG&gt; xx-yy-zzzz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 23:23:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/4063104#M559512</guid>
      <dc:creator>rkhan786</dc:creator>
      <dc:date>2020-04-09T23:23:10Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices around certificate usage with pxGrid</title>
      <link>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/4087949#M560485</link>
      <description>&lt;P&gt;It can be used as long as the node IP addresses are in the SAN field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 15:35:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/best-practices-around-certificate-usage-with-pxgrid/m-p/4087949#M560485</guid>
      <dc:creator>Aileron88</dc:creator>
      <dc:date>2020-05-18T15:35:41Z</dc:date>
    </item>
  </channel>
</rss>

