<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Renew System Certificate in ISE and end-point in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3676901#M543093</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;My customer has ISE 2.1 and the system certificate which used for EAP will be expired. The certificate is signed CA. Then, the end-point certificate also will be expired, as same as ISE system certificate.&lt;/P&gt;
&lt;P&gt;Actually, I'm not familiar with end-point certificate. I just know that the end-point certificate will be pushed by AD server when it will be expired or have been expired.&lt;/P&gt;
&lt;P&gt;I read the ISE guideline that I should renew the signed certificate before the old one expired. When the new signed certificate installed in ISE, it will inactive because the old one still active until it's expired. When the old one is expired, the new one will be active automatically. Is it correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then, I have 2 questions:&lt;/P&gt;
&lt;P&gt;1. If the AD server push to renew certificate before ISE use new certificate, how to deal it?&lt;/P&gt;
&lt;P&gt;2. If the old certificate in ISE already expired and inactive, ISE uses new certificate and then there is user who haven't renew the end-point certificate but he/she want's to connect to wireless network (which is use X.509) so that the end-point can get new certificate from AD server, is it possible?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 08:47:10 GMT</pubDate>
    <dc:creator>Arie --</dc:creator>
    <dc:date>2019-03-11T08:47:10Z</dc:date>
    <item>
      <title>Renew System Certificate in ISE and end-point</title>
      <link>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3676901#M543093</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;My customer has ISE 2.1 and the system certificate which used for EAP will be expired. The certificate is signed CA. Then, the end-point certificate also will be expired, as same as ISE system certificate.&lt;/P&gt;
&lt;P&gt;Actually, I'm not familiar with end-point certificate. I just know that the end-point certificate will be pushed by AD server when it will be expired or have been expired.&lt;/P&gt;
&lt;P&gt;I read the ISE guideline that I should renew the signed certificate before the old one expired. When the new signed certificate installed in ISE, it will inactive because the old one still active until it's expired. When the old one is expired, the new one will be active automatically. Is it correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then, I have 2 questions:&lt;/P&gt;
&lt;P&gt;1. If the AD server push to renew certificate before ISE use new certificate, how to deal it?&lt;/P&gt;
&lt;P&gt;2. If the old certificate in ISE already expired and inactive, ISE uses new certificate and then there is user who haven't renew the end-point certificate but he/she want's to connect to wireless network (which is use X.509) so that the end-point can get new certificate from AD server, is it possible?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3676901#M543093</guid>
      <dc:creator>Arie --</dc:creator>
      <dc:date>2019-03-11T08:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: Renew System Certificate in ISE and end-point</title>
      <link>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3676963#M543094</link>
      <description>&lt;BLOCKQUOTE&gt;...
&lt;P&gt;I read the ISE guideline that I should renew the signed certificate before the old one expired. When the new signed certificate installed in ISE, it will inactive because the old one still active until it's expired. When the old one is expired, the new one will be active automatically. Is it correct?&lt;/P&gt;
...&lt;/BLOCKQUOTE&gt;
&lt;P&gt;First of all, due to the fix for&amp;nbsp;CSCus84706,&amp;nbsp;either the new certificate replaces the existing ISE system certificate used for EAP or it needs created with a slightly different subject (e.g. by adding field O or OU). If using a different subject name, then both certificates can co-exist as ISE system certificates but only one of them used for EAP. When the existing certificate expires, we have to manually switch over to the newer one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;1. If the AD server push to renew certificate before ISE use new certificate, how to deal it?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;ISE should be trusting the root CA certificate so, as long as the root CA certificate still valid, this is not an issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;2. If the old certificate in ISE already expired and inactive, ISE uses new certificate and then there is user who haven't renew the end-point certificate but he/she want's to connect to wireless network (which is use X.509) so that the end-point can get new certificate from AD server, is it possible?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The endpoint clients should also be trusting the root CA certificate so not an issue at all as long as using the same CA chain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jul 2018 15:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3676963#M543094</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-07-29T15:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Renew System Certificate in ISE and end-point</title>
      <link>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3676966#M543095</link>
      <description>To your question 2... If you do EAP-TLS, you need to find a way to ensure endpoint gets its certificate, such as isolated provision /SSID VLAN, helpdesk, connecting endpoint to wired Ethernet if there is no 802.1x on your wired side, etc.</description>
      <pubDate>Sun, 29 Jul 2018 15:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3676966#M543095</guid>
      <dc:creator>Ping Zhou</dc:creator>
      <dc:date>2018-07-29T15:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Renew System Certificate in ISE and end-point</title>
      <link>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3677087#M543097</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thank you for the answers.&lt;/P&gt;
&lt;P&gt;I'm interesting with the root CA. What should I do if the root CA will be expired?&lt;/P&gt;
&lt;P&gt;If the root CA is expired, then does it need to renew on Cisco ISE and end-point?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jul 2018 03:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3677087#M543097</guid>
      <dc:creator>Arie --</dc:creator>
      <dc:date>2018-07-30T03:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: Renew System Certificate in ISE and end-point</title>
      <link>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3677119#M543098</link>
      <description>&lt;P&gt;Yes, because all the certificates from this root CA will also expire. When the root CA expiring, it needs replaced with a new root CA, in turn with any new intermediate CA, and then re-issuing certificates for all endpoints.&lt;/P&gt;
&lt;P&gt;Independent of the CA chain(s) used by ISE server certificates, ISE may trust a number of different certificate chains as long as the root CA certificates imported into ISE trusted certificates store and marked&amp;nbsp;for their trust purposes. If the peers&amp;nbsp;sending the full certificate chains of their identity certificates to ISE, that would be it. If the peers send only the end-entity certificates, then the intermediate CA certificates also needed in ISE trusted certificate store.&lt;/P&gt;
&lt;P&gt;Please note that if a new certificate has the same subject and the same key pair as the existing certificate, ISE is allowing only one of them, since&amp;nbsp;ISE 1.3. CSCvj31598 is an enhancement request on this issue.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jul 2018 05:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3677119#M543098</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-07-30T05:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Renew System Certificate in ISE and end-point</title>
      <link>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3681449#M543100</link>
      <description>Hi,&lt;BR /&gt;Does it mean I'm unable to create new certificate with same subject on ISE? Or does it mean that only one certificate that can be used if I have new certificate with same subject?&lt;BR /&gt;Thank you</description>
      <pubDate>Sun, 05 Aug 2018 08:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3681449#M543100</guid>
      <dc:creator>Arie --</dc:creator>
      <dc:date>2018-08-05T08:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: Renew System Certificate in ISE and end-point</title>
      <link>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3681566#M543103</link>
      <description>&lt;P&gt;The latter. Please keep in mind that the subject is comprised of&amp;nbsp;other fields than the common name so it's possible to have the same common name but different O or OU, for example.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Aug 2018 20:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/renew-system-certificate-in-ise-and-end-point/m-p/3681566#M543103</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-08-05T20:59:29Z</dc:date>
    </item>
  </channel>
</rss>

