<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE BYOD Migration Question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567981#M540429</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I recalled, ok to have two configuration profiles named differently but with the same Wi-Fi network ID. &lt;SPAN style="font-size: 10pt;"&gt;I've not recently tested it because we have been using the same name. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Feb 2016 00:36:14 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2016-02-23T00:36:14Z</dc:date>
    <item>
      <title>ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567974#M540324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Hey Guys,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Customer is building a new fresh ISE 2.0 (previous ISE 1.3) environment and are curious how BYOD clients will handle this migration. The new ISE environment will be fresh (new certs/config/IP's) but will connect to the same internal PKI/AD infrastructure. I would assume the only issue for BYOD clients would be the need to trust the new PSNs when they hit them since they have not seen that certificate before. Any other foreseen issues for these BYOD clients?&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2016 15:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567974#M540324</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2016-02-22T15:40:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567975#M540359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Shouldn't be an issue if you're using public certs for portals and as you've already called out, some clients will require the user to trust the new PSN the first time they see it.&amp;nbsp; Other than that, shouldn't be an issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2016 16:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567975#M540359</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2016-02-22T16:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567976#M540380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the customer is using ISE internal CA, added in ISE 1.3, then we would need to export the Internal CA store from the old ISE 1.3 primary PAN and later import it to the new 2.0 deployment. ISE admin CLI "application configure ise", option 7 for export and option 8 for import.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the EAP certificates of the new and old PSNs are signed by the same CA chain, authentications should continue to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the customer also uses certificate renewal and has different admin certificates for the new and old PSNs, Apple iOS endpoints need remove the existing configuration profile manually and go through BYOD again during the renewal.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2016 16:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567976#M540380</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-02-22T16:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567977#M540405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tim. Customer is using Public certificates for the portals but internal CA for the EAP authentication so from the sounds of it should be good. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2016 17:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567977#M540405</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2016-02-22T17:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567978#M540411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hslai can you elaborate on your last point? The admin certificates will be new and customer does have rules for certificate redirect to portal for expiring certificates. They are using their Microsoft CAs and not the internal ISE CA for handing out certificates. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2016 17:37:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567978#M540411</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2016-02-22T17:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567979#M540417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Apple iOS devices do not allow installing another configuration profile with the same name if the payload is changed. &lt;SPAN style="font-size: 10pt;"&gt;The configuration profile on Apple iOS devices is signed by the admin certificate of ISE PSN, which authenticated and performed the BYOD, so that this admin certificate is part of the payload.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround is to use a single wild-card of UCC certificate for all ISE PSNs for the same set of network devices.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2016 00:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567979#M540417</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-02-23T00:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567980#M540423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so if I understand this correctly since this is a fresh environment will all new PSNs/Certificates only two options would be to delete old profile and re-enroll or change profile name. This will only affect them when they come to renew the certificate for Apple iOS devices correct? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2016 00:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567980#M540423</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2016-02-23T00:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567981#M540429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I recalled, ok to have two configuration profiles named differently but with the same Wi-Fi network ID. &lt;SPAN style="font-size: 10pt;"&gt;I've not recently tested it because we have been using the same name. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2016 00:36:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567981#M540429</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-02-23T00:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567982#M540433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!!! I guess my only concern would be how iOS would prioritize profiles. If it kept trying to use the old profile ISE would redirect to client to the BYOD provisioning portal. Guess only option is really to delete that old profile. Interesting I have not seen this caveat called out in any documentation. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2016 00:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567982#M540433</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2016-02-23T00:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567983#M540438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Found it. Thanks guys for all the help!!!&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_01000.html#reference_534A7FA4F17A400894C35751AAB36F1C" title="http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_01000.html#reference_534A7FA4F17A400894C35751AAB36F1C"&gt;Cisco Identity Services Engine Administrator Guide, Release 1.3 - Manage Certificates [Cisco Identity Services Engine] …&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2016 00:45:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567983#M540438</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2016-02-23T00:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567984#M540441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey guys one last question. Any way to migrate the registered endpoints? I don't think this has any effect on users authenticating since we are just checking the cert but obviously without it they would have no way to list a device as lost. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Feb 2016 17:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567984#M540441</guid>
      <dc:creator>gsheppar</dc:creator>
      <dc:date>2016-02-25T17:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE BYOD Migration Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567985#M540443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For endpoint group static assignments, we may use CSV export of endpoints from ISE 1.3 and then import to ISE 2.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If needing portalUser, then use &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/ise/2-0/api_ref_guide/api_ref_book/ise_api_ref_ers2.html#pgfId-1114611"&gt;ISE endpoint API from ISE ERS&lt;/A&gt;&lt;SPAN&gt;. The on-line doc @ &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://" rel="nofollow" target="_blank"&gt;https://&lt;/A&gt;&lt;SPAN&gt;&amp;lt;ISE-PPAN-IP-or-FQDN&amp;gt;:9060/ers/sdk will have more info, once ERS is enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Feb 2016 21:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-byod-migration-question/m-p/3567985#M540443</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-02-25T21:20:59Z</dc:date>
    </item>
  </channel>
</rss>

