<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Replacing Self-signed Cert in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479981#M518341</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;self signed certs are baaaad, m'kay &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp; Don't use self signed certs. &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/laugh.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recommend installing a cert in every ISE node (every persona) for the ADMIN role specifically, issued by the customer's own PKI infrastructure.&amp;nbsp; You can either create a CSR and hand that file to your (or the customer's PKI team) and they will return the cert you can then bind to each node.&amp;nbsp; The benefit there is that if the corporate browsers have the PKI CA root cert installed then you won't get browser warnings when administering ISE via GUI.&lt;/P&gt;&lt;P&gt;For the PSN nodes, install a cert for EAP (if doing EAP) so that your supplicants will trust ISE.&amp;nbsp; It may be that the Admin role and the EAP role cert can be the same, if issued by the same issuing CA.&lt;/P&gt;&lt;P&gt;For Sponsor/Guest/Device portals create CSR and submit to public CA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long story short - once a role has a new PKI/public cert, then you can go ahead and delete the self-signed cert (because it's no longer assigned to a role)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Jan 2018 02:27:44 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2018-01-25T02:27:44Z</dc:date>
    <item>
      <title>Replacing Self-signed Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479979#M518336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm bringing up a cluster of ISEs (running ISE 2.3).&amp;nbsp; I believe it would be best practice to replace the built in self-signed certs, however when I try and generate a CSR request I get "You are attempting to generate a CSR whose subject matches the subject of an existing certificate on the same node. This is only permitted when you are replacing a certificate of the same role. Note that the subject is the concatenation of several fields (for example, CN, O, OU, etc.) You can create a unique subject by varying the values in these fields."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First -- Is it appropriate to replace the built in cert?&lt;/P&gt;&lt;P&gt;Second -- Can I delete the existing self-signed cert to avoid this error?&lt;/P&gt;&lt;P&gt;Or -- any other suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jan 2018 00:15:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479979#M518336</guid>
      <dc:creator>kevink707</dc:creator>
      <dc:date>2018-01-25T00:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing Self-signed Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479980#M518338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fill out the CSR request fields and you won't have this error.&amp;nbsp;&amp;nbsp; Put in the O, OU, City, State and Country values.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you should replace the self-signed cert.&amp;nbsp; Usually, you will end up having several certs in an ISE install.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The EAP-TLS/RADIUS DTLS/Admin cert might come from the customer's internal PKI environment.&amp;nbsp; &lt;/P&gt;&lt;P&gt;The default portal cert may be a public cert.&lt;/P&gt;&lt;P&gt;The pxGrid cert is the one issued from ISE's internal CA.&lt;/P&gt;&lt;P&gt;The SAML cert which you can't get rid of (why you ask... who know), just make a self-signed 10-20 year cert so ISE won't complain about it expiring in 2 years.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jan 2018 02:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479980#M518338</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-01-25T02:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing Self-signed Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479981#M518341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;self signed certs are baaaad, m'kay &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp; Don't use self signed certs. &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/laugh.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recommend installing a cert in every ISE node (every persona) for the ADMIN role specifically, issued by the customer's own PKI infrastructure.&amp;nbsp; You can either create a CSR and hand that file to your (or the customer's PKI team) and they will return the cert you can then bind to each node.&amp;nbsp; The benefit there is that if the corporate browsers have the PKI CA root cert installed then you won't get browser warnings when administering ISE via GUI.&lt;/P&gt;&lt;P&gt;For the PSN nodes, install a cert for EAP (if doing EAP) so that your supplicants will trust ISE.&amp;nbsp; It may be that the Admin role and the EAP role cert can be the same, if issued by the same issuing CA.&lt;/P&gt;&lt;P&gt;For Sponsor/Guest/Device portals create CSR and submit to public CA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long story short - once a role has a new PKI/public cert, then you can go ahead and delete the self-signed cert (because it's no longer assigned to a role)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jan 2018 02:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479981#M518341</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-01-25T02:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing Self-signed Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479982#M518342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please follow what Paul and Arne suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that you will not be able to delete the built-in self-signed certificate until another certificate or other certificates present and take over the certificate usages (e.g. admin and eap).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 01:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/replacing-self-signed-cert/m-p/3479982#M518342</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-01-26T01:37:32Z</dc:date>
    </item>
  </channel>
</rss>

