<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Certificates - Roaming Between Nodes in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4445890#M568915</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Both deployments should work. The main point that you need to have the&lt;BR /&gt;certificate chain in the trusted store of the clients. Whether it's same CA&lt;BR /&gt;or multiple CAs should be fine.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
    <pubDate>Sat, 07 Aug 2021 17:24:30 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2021-08-07T17:24:30Z</dc:date>
    <item>
      <title>ISE Certificates - Roaming Between Nodes</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4442816#M568814</link>
      <description>&lt;P&gt;What is the best method for deploying EAP certificates within a multi-node deployment where users will roam between sites? Each site has an ISE PSN and the Admin and MGMT nodes are in a DC.&lt;/P&gt;&lt;P&gt;The root CA of the certs that are presented to clients during authentication are pushed to the device VIA the MDM solution.&amp;nbsp;If each node is signed individually by the same CA, will the users be able to roam without having to accept another certificate for EAP or is it best to use a multi-node cert with each Node listed as a SAN in the same CSR?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Aug 2021 11:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4442816#M568814</guid>
      <dc:creator>jonhux891</dc:creator>
      <dc:date>2021-08-02T11:32:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates - Roaming Between Nodes</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4442825#M568815</link>
      <description>&lt;P&gt;Same Cert should work for your Roaming solution you looking to deploy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Aug 2021 11:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4442825#M568815</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-08-02T11:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates - Roaming Between Nodes</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4442837#M568816</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;balaji.bandi&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the quick reply, when you say 'same cert'. Do you mean a single cert with each node list as a SAN or each node can have individual certs that are signed by the same CA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 02 Aug 2021 12:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4442837#M568816</guid>
      <dc:creator>jonhux891</dc:creator>
      <dc:date>2021-08-02T12:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates - Roaming Between Nodes</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4445755#M568906</link>
      <description>&lt;P&gt;You have ensured that the root CA cert for the ISE deployment is on each endpoint so they will trust any of the ISE nodes so that is fantastic. This will work regardless of how you do choose to implement you ISE certs - individual ISE node name per cert or a wildcard cert for the entire deployment.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 02:14:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4445755#M568906</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2021-08-07T02:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificates - Roaming Between Nodes</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4445890#M568915</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Both deployments should work. The main point that you need to have the&lt;BR /&gt;certificate chain in the trusted store of the clients. Whether it's same CA&lt;BR /&gt;or multiple CAs should be fine.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Sat, 07 Aug 2021 17:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificates-roaming-between-nodes/m-p/4445890#M568915</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-08-07T17:24:30Z</dc:date>
    </item>
  </channel>
</rss>

