<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guest access using a different domain in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/guest-access-using-a-different-domain/m-p/4281998#M565110</link>
    <description>&lt;P&gt;That is not only possible, it is also the right way to do it. Your guests should never be presented an internal certificate.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jan 2021 08:01:42 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2021-01-29T08:01:42Z</dc:date>
    <item>
      <title>Guest access using a different domain</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-access-using-a-different-domain/m-p/4281978#M565108</link>
      <description>&lt;P&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Hi Experts,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;&lt;STRONG&gt;Setup&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Two node setup Primary and Secondary&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Two domains, abc.com (internal, where AD resides) and xyz.com (public domain, where websites are hosted)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Setup a guest portal using public domain certificates&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="tahoma,arial,helvetica,sans-serif"&gt;Is this possible, can I have all guest portal using xyz.com. when nodes are running on abc.com?&lt;BR /&gt;&lt;BR /&gt;Any suggestions appreciated!&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 07:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-access-using-a-different-domain/m-p/4281978#M565108</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2021-01-29T07:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access using a different domain</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-access-using-a-different-domain/m-p/4281998#M565110</link>
      <description>&lt;P&gt;That is not only possible, it is also the right way to do it. Your guests should never be presented an internal certificate.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 08:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-access-using-a-different-domain/m-p/4281998#M565110</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2021-01-29T08:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Guest access using a different domain</title>
      <link>https://community.cisco.com/t5/network-access-control/guest-access-using-a-different-domain/m-p/4284681#M565207</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/224506"&gt;@dgaikwad&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325766"&gt;@Karsten Iwen&lt;/a&gt;&amp;nbsp;rightly mentioned, separate DNS domains are the way to do it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Back in the day we may have recommended .local or .net as domains with which to build your ISE nodes - but these TLDs are now sold and should be avoided.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The current best practice is to use your registered domain, and put your servers in a sub-domain. e.g. you might own acme.com and your guest portal might end up being guest.acme.com, whose IP address resolves to a load balancer perhaps. But the ISE PSN nodes on which the ISE Guest portals resides have DNS domains e.g. it.acme.com - and if you had say two PSN's doing guest, and if you didn't have a load balancer, then your ISE Policy results would have to return the FQDNs of the two PSNs - guest1.acme.com and guest2.acme.com - notice that I didn't use it.acme.com because that is the internal DNS domain of the ISE nodes (as seen on the CLI and on the https admin URL). The trick is to use DNS CNAMEs to link guest1.acme.com -&amp;gt; ise01.it.acme.com and guest2.acme.com -&amp;gt; ise02.it.acme.com - the Guest portal certificate only mentions either *.acme.com or the guest1.acme.com and guest2.acme.com&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 20:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/guest-access-using-a-different-domain/m-p/4284681#M565207</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-02-02T20:42:33Z</dc:date>
    </item>
  </channel>
</rss>

