<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco-ISE, EAP-TLS, remove RootCA from server validation chain in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583918#M573814</link>
    <description>&lt;P&gt;I got it. The problem is that even fragmented the device can´t handle the whole chain due lack of memory. Well, as asked a freind who is ISE expert and he told me not be possible.&amp;nbsp; ISE will send the full chain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2022 14:42:24 GMT</pubDate>
    <dc:creator>Flavio Miranda</dc:creator>
    <dc:date>2022-04-01T14:42:24Z</dc:date>
    <item>
      <title>Cisco-ISE, EAP-TLS, remove RootCA from server validation chain</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583864#M573809</link>
      <description>&lt;P&gt;Hello experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there a possibility to influence the length/number of certificates for server validation in Cisco-ISE?&lt;/P&gt;&lt;P&gt;My tests with Cisco-ISE ver 2.7 and 3.1 have shown that Cisco-ISE always sends out the full chain of trust in the TLS "Hello Server" message&amp;nbsp;to the supplicant for EAP-TLS authentication.&lt;/P&gt;&lt;P&gt;I.e. in only one TLS message everything is transferred from RootCA to server certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a concrete scenario, this message is 9199 Bytes long and is unfortunately a bit too long for an IoT radio modul.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to instruct Cisco-ISE to send a shortened chain for server validation for certain supplicants, without RootCA (and IntermediateCA) certificate for example?&lt;/P&gt;&lt;P&gt;The IoT Radio module has a copy of the server RootCA (and IntermediateCA) certificate in its memory anyway for validation purposes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, I cannot change anything in the existing PKI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 14:15:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583864#M573809</guid>
      <dc:creator>Malex</dc:creator>
      <dc:date>2022-04-01T14:15:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco-ISE, EAP-TLS, remove RootCA from server validation chain</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583872#M573810</link>
      <description>&lt;P&gt;Not a ISE expert here but from the network point of view this should not be a problem. unless you are allowing jumbo frame, there might be fragmentation.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 13:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583872#M573810</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-01T13:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco-ISE, EAP-TLS, remove RootCA from server validation chain</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583888#M573811</link>
      <description>&lt;P&gt;Thank you Flavio.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the network level everything works, as screenshort in the attachment shows (logged in with IPhone).&lt;/P&gt;&lt;P&gt;The problem is that IoT radio module has too small rx buffer to load the whole "hello server" message in one piece.&lt;/P&gt;&lt;P&gt;I need to find a way to shorten "hello server" message.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 14:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583888#M573811</guid>
      <dc:creator>Malex</dc:creator>
      <dc:date>2022-04-01T14:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco-ISE, EAP-TLS, remove RootCA from server validation chain</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583918#M573814</link>
      <description>&lt;P&gt;I got it. The problem is that even fragmented the device can´t handle the whole chain due lack of memory. Well, as asked a freind who is ISE expert and he told me not be possible.&amp;nbsp; ISE will send the full chain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 14:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-eap-tls-remove-rootca-from-server-validation-chain/m-p/4583918#M573814</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-01T14:42:24Z</dc:date>
    </item>
  </channel>
</rss>

