<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EAP-TLS and PEAP certificates in ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883375#M558150</link>
    <description>&lt;P&gt;To clarify. We have smartphones and laptops, the phones will have a CA1 and Laptops will have CA2, both with the same RootCA. I should be able to import both CAs and the RootCA and have these check which CA is valid for authentication. Correct?&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jul 2019 17:42:10 GMT</pubDate>
    <dc:creator>alex.fana1</dc:creator>
    <dc:date>2019-07-02T17:42:10Z</dc:date>
    <item>
      <title>Re: EAP-TLS and PEAP certificates in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883345#M558148</link>
      <description>&lt;P&gt;Someone has told me that you can't use multiple subCA for EAPTLS authentication. Is this true?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 16:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883345#M558148</guid>
      <dc:creator>alex.fana1</dc:creator>
      <dc:date>2019-07-02T16:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS and PEAP certificates in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883367#M558149</link>
      <description>This question is rather vague. If you have clients (endpoints) with different certificates issued from different subCAs that will be used for eap-tls auth you will need to import both certificate chains into ISE trusted certificates and ensure they are trusted for authentication within ISE.</description>
      <pubDate>Tue, 02 Jul 2019 17:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883367#M558149</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-07-02T17:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS and PEAP certificates in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883375#M558150</link>
      <description>&lt;P&gt;To clarify. We have smartphones and laptops, the phones will have a CA1 and Laptops will have CA2, both with the same RootCA. I should be able to import both CAs and the RootCA and have these check which CA is valid for authentication. Correct?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 17:42:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883375#M558150</guid>
      <dc:creator>alex.fana1</dc:creator>
      <dc:date>2019-07-02T17:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS and PEAP certificates in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883378#M558151</link>
      <description>&lt;P&gt;Yes.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 17:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3883378#M558151</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2019-07-02T17:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS and PEAP certificates in ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3884629#M558152</link>
      <description>&lt;P&gt;It’s always useful to specify which cert is being discussed. Server cert (in ISE) or client cert (from client). The original post question may have heard/read that ISE only supports a single EAP server cert. that is true. ISE will always identify itself using the one and only EAP server cert. in most cases this is fine. But for customers who have mergers and acquisitions, having more than one server cert in the RADIUS server is handy. Clearpass 6.7 introduced that feature not too long ago.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2019 09:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/re-eap-tls-and-peap-certificates-in-ise/m-p/3884629#M558152</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-07-04T09:24:07Z</dc:date>
    </item>
  </channel>
</rss>

