<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 3rd Party Certificate replacement for Admin/EAP Authentication - looking for best practices in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3736893#M488801</link>
    <description>&lt;P&gt;I have seen this question a few times and it would be nice to have a clear and concise document on CCO for easy access.&amp;nbsp; For what it's worth I'll give you my experience and I would like to hear from other's too.&lt;/P&gt;
&lt;P&gt;You're right - the EAP cert is only needed on those nodes (PSN's) that are used for 802.1X - you may have some PSN's that are doing TACACS only - in that case of course you don't need the EAP cert.&amp;nbsp; Install only where needed.&amp;nbsp; BUT - and here is my personal take on this.&amp;nbsp;&amp;nbsp; EVERY node needs a cert of EVERY role, whether it's used or not.&amp;nbsp; ISE does not let you build a node that doesn't have a cert of each kind, albeit a self-signed cert.&amp;nbsp; This means that EAP certs will always expire - and sure, you can leave an expired EAP cert on an Admin node and nothing bad will happen (except alarms and constant syslogs).&amp;nbsp; Therefore I usually create 10 year self-signed certs for those nodes that don't need the cert, but also to avoid the cert expiration issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for renewal.&amp;nbsp; EAP is easy.&amp;nbsp; You click on the install cert, select the node and go!&amp;nbsp; Nothing bad happens (no application restarts).&lt;/P&gt;
&lt;P&gt;Admin certs are more intrusive - and when you install a new admin cert on a node, it will restart processes and cause downtime.&amp;nbsp; I would imagine that this new cert has to have a CA trust relationship to the PAN CA chain, so that when the node restarts, it builds TLS connection to the PAN again.&amp;nbsp; This is easily done if the ISE Admin cert comes from a public CA or your PKI, where the Root CA cert is installed on all nodes.&lt;/P&gt;
&lt;P&gt;As for the order in which to replace certs ... I would start with PSN's, waiting for the restarts to complete of course. And then move to Standby MnT, STandby PAN, and then finally the primary nodes.&amp;nbsp; But I don't know/think it makes too much difference.&amp;nbsp; But keen to know from others.&lt;/P&gt;</description>
    <pubDate>Wed, 31 Oct 2018 22:07:33 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2018-10-31T22:07:33Z</dc:date>
    <item>
      <title>3rd Party Certificate replacement for Admin/EAP Authentication - looking for best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3736875#M488799</link>
      <description>&lt;P&gt;I'm looking for a best practice process for replacing an expiring 3rd party certificate used for Admin/EAP. I inherited a six node deployment and each node has the same Certificate for both roles imported, do all nodes need to have the same Cert for both roles? It seems like the Admin/MnT nodes would only need to have an Admin Cert and the PSN's need both or one?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also is this still the process:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-software/200295-Install-a-3rd-party-CA-certificate-in-IS.html&amp;nbsp;&amp;nbsp;" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-software/200295-Install-a-3rd-party-CA-certificate-in-IS.html&amp;nbsp;&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If only one Certificate is used and imported on each node to replace the existing one, is there a document that shows that replacement process or is the install document the best available?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!!&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 21:36:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3736875#M488799</guid>
      <dc:creator>mitchp75</dc:creator>
      <dc:date>2018-10-31T21:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: 3rd Party Certificate replacement for Admin/EAP Authentication - looking for best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3736893#M488801</link>
      <description>&lt;P&gt;I have seen this question a few times and it would be nice to have a clear and concise document on CCO for easy access.&amp;nbsp; For what it's worth I'll give you my experience and I would like to hear from other's too.&lt;/P&gt;
&lt;P&gt;You're right - the EAP cert is only needed on those nodes (PSN's) that are used for 802.1X - you may have some PSN's that are doing TACACS only - in that case of course you don't need the EAP cert.&amp;nbsp; Install only where needed.&amp;nbsp; BUT - and here is my personal take on this.&amp;nbsp;&amp;nbsp; EVERY node needs a cert of EVERY role, whether it's used or not.&amp;nbsp; ISE does not let you build a node that doesn't have a cert of each kind, albeit a self-signed cert.&amp;nbsp; This means that EAP certs will always expire - and sure, you can leave an expired EAP cert on an Admin node and nothing bad will happen (except alarms and constant syslogs).&amp;nbsp; Therefore I usually create 10 year self-signed certs for those nodes that don't need the cert, but also to avoid the cert expiration issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for renewal.&amp;nbsp; EAP is easy.&amp;nbsp; You click on the install cert, select the node and go!&amp;nbsp; Nothing bad happens (no application restarts).&lt;/P&gt;
&lt;P&gt;Admin certs are more intrusive - and when you install a new admin cert on a node, it will restart processes and cause downtime.&amp;nbsp; I would imagine that this new cert has to have a CA trust relationship to the PAN CA chain, so that when the node restarts, it builds TLS connection to the PAN again.&amp;nbsp; This is easily done if the ISE Admin cert comes from a public CA or your PKI, where the Root CA cert is installed on all nodes.&lt;/P&gt;
&lt;P&gt;As for the order in which to replace certs ... I would start with PSN's, waiting for the restarts to complete of course. And then move to Standby MnT, STandby PAN, and then finally the primary nodes.&amp;nbsp; But I don't know/think it makes too much difference.&amp;nbsp; But keen to know from others.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 22:07:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3736893#M488801</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-10-31T22:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: 3rd Party Certificate replacement for Admin/EAP Authentication - looking for best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3736961#M488804</link>
      <description>&lt;P&gt;Arne have covered most of the things. You can use following doc which have all info you need the procedure is same for ise 2.x version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-software/200295-Install-a-3rd-party-CA-certificate-in-IS.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-software/200295-Install-a-3rd-party-CA-certificate-in-IS.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Images are missing in the doc but you should be able to understand.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Nov 2018 01:28:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3736961#M488804</guid>
      <dc:creator>pan</dc:creator>
      <dc:date>2018-11-01T01:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: 3rd Party Certificate replacement for Admin/EAP Authentication - looking for best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3737178#M488807</link>
      <description>&lt;P&gt;Great post, great responses. I'll add some additional info. Just copy / paste from a course I took a while back. This doesn't necessarily relate to your question, but is generally good 'rule-of-thumb' info:&lt;/P&gt;
&lt;UL style="margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;ISE Certificates Best Practices&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL style="margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="circle"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Ensure that all certificate CN names can be resolved by DNS&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Use lower case for appliance hostname, DNS name, certificate CN&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;ISE cert CSR: Use format "CN=&amp;lt;FQDN&amp;gt;" for subject name&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Ensure time is synced: use NTP with UTC for all nodes&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Signed by Trusted CD - required for each node&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL style="margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;For external users/guests, certs should be signed by 3rd-party CA&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Install entire certificate chains as individual certs into ISE trust store&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Use PEN, not DER encoding for import/export operations&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;ISE certificates best practices include such recommendations as:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL style="margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="circle"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Correct synced by NTP time on all nodes.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;All certificates for external users/guests must be signed by trusted CA&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;PEM encoding is preferable over DER encoding.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;When running the ISE Setup wizard, use lowercase for hostname.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL style="margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Do not use self-signed certificates in production networks (I break this rule)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Certificates are used for all portal communication and EAP&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL style="margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle;"&gt;&lt;SPAN style="font-family: Calibri; font-size: 11.0pt;"&gt;Using a certificate that is already trusted by most clients is a major benefit, especially for guests or visitors not part of corporate PKI&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 01 Nov 2018 11:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3737178#M488807</guid>
      <dc:creator>anthonylofreso</dc:creator>
      <dc:date>2018-11-01T11:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: 3rd Party Certificate replacement for Admin/EAP Authentication - looking for best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3737958#M488809</link>
      <description>Hi, good info. &lt;BR /&gt;&lt;BR /&gt;You have a small typo: it's PEM not PEN. &lt;BR /&gt;&lt;BR /&gt;Maybe it's worth mentioning that ISE supports multi-SAN certificates as well as wildcard. It can make life easier if you don't mind the security risk.</description>
      <pubDate>Fri, 02 Nov 2018 13:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/3rd-party-certificate-replacement-for-admin-eap-authentication/m-p/3737958#M488809</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-11-02T13:57:14Z</dc:date>
    </item>
  </channel>
</rss>

