<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Replacing ISE Admin cert on multi-node deployment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3775327#M486576</link>
    <description>Yep not supported but it works, I did it several times to keep a fresh install.&lt;BR /&gt;Now yes, the safest way would be to shutdown it and backup the vm files.&lt;BR /&gt;</description>
    <pubDate>Tue, 08 Jan 2019 18:17:51 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2019-01-08T18:17:51Z</dc:date>
    <item>
      <title>Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3773854#M486567</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't have the time to test this myself, but has anyone got real world advice when replacing the &lt;U&gt;&lt;STRONG&gt;Admin cert&lt;/STRONG&gt;&lt;/U&gt; of a &lt;STRONG&gt;multi-node&lt;/STRONG&gt; deployment?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The customer is running ISE 2.4 in a 6 node deployment on SNS appliances.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently the Admin cert is a self-signed wildcard cert.&amp;nbsp; This cert was installed on all secondary nodes prior to the nodes being registered to the PAN.&lt;/P&gt;
&lt;P&gt;Customer now wishes to apply a different cert (e.g. public CA cert) to all the nodes used for Admin and possibly also EAP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have some concerns with this.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The node host name domains will need to match the new Admin cert (at least in the SAN field, right?) - if customer has some internal domain like&amp;nbsp;&amp;nbsp; &lt;EM&gt;&lt;STRONG&gt;net.local&lt;/STRONG&gt;&lt;/EM&gt;, then there will be no Public CA that can issue a cert that has this in the SAN field.&amp;nbsp; I suspect we'd have to re-configure all the "ip domain-name" commands in each node prior to even trying to import a public CA cert?&lt;/LI&gt;
&lt;LI&gt;Let's say we have all the domain stuff out of the way, which node do we start with?&amp;nbsp; If we start with the PSN's, will it isolate the PSN from the PAN when installing the new Admin cert?&amp;nbsp; Is there an order in which this should be done?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I am pretty sure that changing the System cert for Admin will cause the application services to restart.&amp;nbsp; The outage is not an issue.&amp;nbsp; The main concern I have is that the ISE cube (cluster) will someone get messed up because of the changing of domains and the importing of certs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any advice appreciated&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 04:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3773854#M486567</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-01-07T04:20:30Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3773868#M486568</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the EAP, you could have the possibility to create a new interface and an alias then your public cert will work.&lt;/P&gt;
&lt;P&gt;However for the admin, it'll only be on the default interface and you have no choice to change the domain name.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then you can import them node by node, i start myself from PSN&amp;nbsp;and finish with PAN. Customers like simplicity and most of them generate 1 cert with multiple SAN and then import the same one on all node. Never had issues here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Issues i had, were mostly after changing domain name. There were weird issues like AD sync/join not working as expected and needed to unlink and link it back sometimes. Also issues with internal CA, the biggest weird issues was that i had to disable, generate new certs for internal ca and re-enable it back (impact on all my byod users).&lt;/P&gt;
&lt;P&gt;Sometimes i also had to deregister the node from the cluster and register it back after domain-name changed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This doesn't mean it never&amp;nbsp;work (most of the time it works good), after an automatic application restart, everything is back to normal.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway when you will do the command ip domain-name, a message will appear to tell you to de register your node from AD before proceeding. I'm not doing it everytime i do these changes because AD people aren't available/communicating with network guys &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When i do the domain name changes, i always start by PSN.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 05:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3773868#M486568</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-01-07T05:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3773869#M486570</link>
      <description>&lt;P&gt;thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt; - very useful advice for sure.&lt;/P&gt;
&lt;P&gt;I will see whether I can convince them to keep the Admin system cert as is (there is no benefit to assigning that to a public CA cert!!).&amp;nbsp; The EAP cert can then be changed to use a public CA cert without rocking the boat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 05:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3773869#M486570</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-01-07T05:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3774689#M486572</link>
      <description>Yes and you can mention that admin will be accessed from internal guy only that will have the internal root cert in their laptop trusted certificate store which means no need to change it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Are these ise servers vm or appliances?&lt;BR /&gt;If VM, you can take a snapshot before proceeding.&lt;BR /&gt;What I did which ended smoothly and without issues is to have a maintenance window and alert that ISE will down during this maintenance. Then remove every node from the cluster, do all domain changes and build up the cluster. Obviously, this can be done in a non critical environment where downtime is acceptable.</description>
      <pubDate>Tue, 08 Jan 2019 04:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3774689#M486572</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-01-08T04:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3774761#M486573</link>
      <description>&lt;P&gt;These are SNS servers.&amp;nbsp; I will fight to not have to change the Admin cert &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 06:01:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3774761#M486573</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-01-08T06:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3775324#M486574</link>
      <description>VM snapshots aren't supported though. Perhaps you mean shutdown the server and clone the VM (unsure if this works either)?</description>
      <pubDate>Tue, 08 Jan 2019 18:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3775324#M486574</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2019-01-08T18:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3775327#M486576</link>
      <description>Yep not supported but it works, I did it several times to keep a fresh install.&lt;BR /&gt;Now yes, the safest way would be to shutdown it and backup the vm files.&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Jan 2019 18:17:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3775327#M486576</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-01-08T18:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3775448#M486579</link>
      <description>&lt;P&gt;Assuming that you have sorted out domain issues means got the&amp;nbsp; cert from&amp;nbsp; publicCA. You can assig new cert in any order as long as Root, Intermediate and Issuing CA cert has been imported in PAN trusted store. It will propogate to all other ISE nodes trusted store. Now even if you take any node and assign this cert for admin and EAP .This node will restart it service but will join the cluster.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 20:49:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3775448#M486579</guid>
      <dc:creator>Parag Mahajan</dc:creator>
      <dc:date>2019-01-08T20:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3802798#M486582</link>
      <description>&lt;P&gt;Are there any issues with using the system&amp;nbsp;certificate for both Admin and EAP authentication? We do not practice this policy but wondered if it is done by others.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 14:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3802798#M486582</guid>
      <dc:creator>mmintz001</dc:creator>
      <dc:date>2019-02-15T14:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3802805#M486585</link>
      <description>&lt;P&gt;It's not best practice, but it's possible and supported. Notice when you add a system cert that you can choose which roles it has per node.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 15:00:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/3802805#M486585</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2019-02-15T15:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing ISE Admin cert on multi-node deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/4549825#M572724</link>
      <description>&lt;P&gt;the trick with changing the domain name of the cluster node is to deregister it from the domain - then DELETE the machine account in the domain - wait for replication to occur in AD (15 mins max) - THEN change the node domain-name and reregister the node to the domain.&amp;nbsp; &amp;nbsp;It's that machine account in the domain that gets wonky - so just smoke the old machine account and create a new one with the proper domain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Feb 2022 18:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-ise-admin-cert-on-multi-node-deployment/m-p/4549825#M572724</guid>
      <dc:creator>MatthewShaw4644</dc:creator>
      <dc:date>2022-02-10T18:39:57Z</dc:date>
    </item>
  </channel>
</rss>

