<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Interface Alias and EAP Cert in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534776#M520555</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again. But please could you confirm if my earlier proposed setup is OK? Also not sure what you mean by&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;"&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Since your ETH0 and 1 on the same subnet, please ensure routing correctly".&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Obviously the NADs would be configured IP address of Eth1 as the Radius Server and the IGP would get the packets to the destination. In the past, in a previous place I worked, I had Eth0 and Eth1 on the same subnet for a Guest PSN in the DMZ and no issues with Guest Redirection on Eth1 and Interface Alias on the Guest PSN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Oct 2017 03:15:36 GMT</pubDate>
    <dc:creator>grabonlee</dc:creator>
    <dc:date>2017-10-24T03:15:36Z</dc:date>
    <item>
      <title>ISE Interface Alias and EAP Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534772#M520548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I fully understand how ISE interface alias works for Portal services on non-Eth0. My question is regarding EAP Cert using Public CA. I will use the following scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE hostname = ise1.company.local&lt;/P&gt;&lt;P&gt;EAP SAN = ise1-aaa.company.com&lt;/P&gt;&lt;P&gt;Interface = Eth1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would an interface alias be required on ISE in addition to the DNS record of ise1-aaa.company.com, as the EAP certificate would be public signed? Or is the DNS record of ise1-aaa.company.com only what is required?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Oct 2017 21:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534772#M520548</guid>
      <dc:creator>grabonlee</dc:creator>
      <dc:date>2017-10-23T21:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Interface Alias and EAP Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534773#M520549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;EAP server certificates do not need interface aliases.&lt;/P&gt;&lt;P&gt;However, Windows client OS has an option to match the RADIUS server names in "&lt;STRONG style="color: #000000; font-family: 'Segoe UI', 'Lucida Grande', Verdana, Arial, Helvetica, sans-serif; font-size: 13px;"&gt;Connect to these servers&lt;/STRONG&gt;" and recent Android client OS needs to fill in the domain name (see below).&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2017-10-23 at 3.27.05 PM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/112451_Screen Shot 2017-10-23 at 3.27.05 PM.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Oct 2017 22:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534773#M520549</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-10-23T22:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Interface Alias and EAP Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534774#M520550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hslai,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for responding. I know about the option in Windows OS, but wouldn't that have to be the PSN FQDN (hostname) or IP addresses and not the SAN such ise1-aaa.company.com? Would I have to specify radius server names or won't it work without specifying any names?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To paint the picture clearer, I have the following setup and requirements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Internal Domain - xyz.local&lt;/P&gt;&lt;P&gt;2. Company domain - company.com&lt;/P&gt;&lt;P&gt;3. Internal Root CA available for only xyz.local but not for company.com. &lt;/P&gt;&lt;P&gt;4. Use Public CA for EAP and Portal Service (Posture only). The Public cert would be Single UC-Multi-Domain&lt;/P&gt;&lt;P&gt;5. Use Internal CA for Admin only - Eth0. Each ISE node would have its Admin Cert&lt;/P&gt;&lt;P&gt;6. Eth1 for others - EAP and Posture&lt;/P&gt;&lt;P&gt;7. There is split-DNS for company.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My thought process is follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Setup ISE cluster with company.com domain hostnames&lt;/P&gt;&lt;P&gt;2. Generate Admin CSR with CN as ise.company.com but put SANs as&amp;nbsp; ise.xyz.local and also ise.company.com&lt;/P&gt;&lt;P&gt;3. Generate Single cert on any ISE node and sign with public CA with multiple SANs pan1.company.com, psn1.company.com and import into all ISE nodes with private key. &lt;/P&gt;&lt;P&gt;4. Eth0 would be for Admin and Eth1 would be for Radius. Both interfaces would be on the same subnet.&lt;/P&gt;&lt;P&gt;5. Use Interface Alias (Eth1) because of Posture redirection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is my proposed setup correct? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the earlier response. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Oct 2017 01:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534774#M520550</guid>
      <dc:creator>grabonlee</dc:creator>
      <dc:date>2017-10-24T01:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Interface Alias and EAP Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534775#M520552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://msdn.microsoft.com/en-us/library/dd759219(v=ws.11).aspx"&gt;Configure Wireless Clients running Windows 7 and Windows Vista for PEAP-TLS Authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;says,&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #2a2a2a; padding-bottom: 15px;"&gt;To specify which Remote Authentication Dial-In User Service (RADIUS) servers your wired access clients must use for authentication and authorization, in &lt;STRONG&gt;Connect to these servers&lt;/STRONG&gt; , type then name of each RADIUS server, &lt;EM style="color: #ff0000;"&gt;exactly as it appears in the subject field of the server certificate&lt;/EM&gt;. Use semicolons to specify multiple RADIUS server names.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is optional.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since your ETH0 and 1 on the same subnet, please ensure routing correctly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Oct 2017 03:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534775#M520552</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-10-24T03:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Interface Alias and EAP Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534776#M520555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again. But please could you confirm if my earlier proposed setup is OK? Also not sure what you mean by&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;"&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Since your ETH0 and 1 on the same subnet, please ensure routing correctly".&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Obviously the NADs would be configured IP address of Eth1 as the Radius Server and the IGP would get the packets to the destination. In the past, in a previous place I worked, I had Eth0 and Eth1 on the same subnet for a Guest PSN in the DMZ and no issues with Guest Redirection on Eth1 and Interface Alias on the Guest PSN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Oct 2017 03:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534776#M520555</guid>
      <dc:creator>grabonlee</dc:creator>
      <dc:date>2017-10-24T03:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Interface Alias and EAP Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534777#M520557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well. The routing, if not taken care of, could be like this:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;NAD -&amp;gt; ISE:ETH1 -&amp;gt; ISE:ETH0 -&amp;gt; NAD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Your proposal looks fine for EAP. Best to test it yourself (in a lab), nonetheless.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Note: &lt;A _jive_internal="true" href="https://community.cisco.com/thread/86500"&gt;CPP and Admin certificate different but on same interface&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Oct 2017 03:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534777#M520557</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-10-24T03:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Interface Alias and EAP Cert</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534778#M520559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would also ask why are you trying to use another interface for EAP Authentication?&amp;nbsp; I prefer to keep my ISE deployments as simple as possible and use only 1 interface on my ISE nodes unless the customer has a guest portal situation requiring the PSNs to have a presence in a DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Oct 2017 13:59:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-interface-alias-and-eap-cert/m-p/3534778#M520559</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2017-10-25T13:59:36Z</dc:date>
    </item>
  </channel>
</rss>

