<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Admin Cert in multinode deployment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/admin-cert-in-multinode-deployment/m-p/4391261#M566824</link>
    <description>&lt;P&gt;I would suggest generating a single CSR with all your nodes as SANs, and have that signed by the internal PKI so that it can be installed on all six nodes. This keeps it clean and easy.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The relevant cert contents would look like this where the CN and first SAN are just a friendly name, and the remaining six are the FQDNs of the nodes.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;CN: ise.yourdomain.com&amp;nbsp;&lt;BR /&gt;SAN: ise.yourdomain.com&lt;BR /&gt;SAN: pan1.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: pan2.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: psn1.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: psn2.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: psn3.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: psn4.yourdomain.com&lt;/P&gt;</description>
    <pubDate>Thu, 22 Apr 2021 06:30:32 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2021-04-22T06:30:32Z</dc:date>
    <item>
      <title>Admin Cert in multinode deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-cert-in-multinode-deployment/m-p/4391247#M566823</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have ISE 2.6 with 2 PAN and 4 PSN&lt;/P&gt;&lt;P&gt;I would like to change the admin certificate from the default self signed to one form my PKI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I change it there will be a restart on the node right?&lt;/P&gt;&lt;P&gt;Is it advisable to change it on the PSN also?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Konstantinos&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 06:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-cert-in-multinode-deployment/m-p/4391247#M566823</guid>
      <dc:creator>kostasthedelegate</dc:creator>
      <dc:date>2021-04-22T06:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Cert in multinode deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-cert-in-multinode-deployment/m-p/4391261#M566824</link>
      <description>&lt;P&gt;I would suggest generating a single CSR with all your nodes as SANs, and have that signed by the internal PKI so that it can be installed on all six nodes. This keeps it clean and easy.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The relevant cert contents would look like this where the CN and first SAN are just a friendly name, and the remaining six are the FQDNs of the nodes.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;CN: ise.yourdomain.com&amp;nbsp;&lt;BR /&gt;SAN: ise.yourdomain.com&lt;BR /&gt;SAN: pan1.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: pan2.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: psn1.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: psn2.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: psn3.yourdomain.com&lt;/P&gt;
&lt;P&gt;SAN: psn4.yourdomain.com&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2021 06:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-cert-in-multinode-deployment/m-p/4391261#M566824</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2021-04-22T06:30:32Z</dc:date>
    </item>
  </channel>
</rss>

