<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue installing wildcard cert back on Primary PAN (after RMA) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4644475#M575927</link>
    <description>&lt;P&gt;What you describe is not a supported ISE configuration.&amp;nbsp; It is not supported to have Admin+Monitor+PSN on the same ISE node unless it is a two node HA deployment.&amp;nbsp; Although, it might technically work for this particular issue.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That is correct, you would want to restore any backup without including the ADE-OS information (the default behavior anyways).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jul 2022 18:32:41 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2022-07-05T18:32:41Z</dc:date>
    <item>
      <title>Issue installing wildcard cert back on Primary PAN (after RMA)</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4642562#M575880</link>
      <description>&lt;P&gt;I have an ISE deployment with 2 PANs and 2 PSNs.&amp;nbsp; Primary PAN, node A, had to be replaced due to hardware failure.&amp;nbsp; node B was promoted temporarily so I can continue to manage ISE.&amp;nbsp; I need to install the wildcard cert back on the new node A and promote it to be the primary PAN again.&amp;nbsp; Issue is the this wildcard cert won't install on the new server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Node A will take the cert while it is in standalone mode, but cert will disappear or change after node is joined to the deployment.&amp;nbsp; If I export the cert from node B and reinstall it on node A, it will disappear, not install, or change after it is installed.&amp;nbsp; Specifically, the "issued to" field of the cert will change making it unable (e.g. change to FQDN of node A instead of what it shows on nodes B, C, and D).&amp;nbsp; I worked with 5 TAC Engineers over the last 2 month, and tried various methods, some repeatedly, but all failed so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do have 4 "spare" servers I can repurpose.&amp;nbsp; I have configuration backup and the cert and key.&amp;nbsp; One solution maybe to standup a new deployment using these 4 spare servers, and cutover to them from the existing deployment.&amp;nbsp; What is the best way to do that?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jul 2022 18:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4642562#M575880</guid>
      <dc:creator>tachyon05</dc:creator>
      <dc:date>2022-07-01T18:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: Issue installing wildcard cert back on Primary PAN (after RMA)</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4642695#M575883</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320195"&gt;@tachyon05&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;please try to:&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;1st&lt;/STRONG&gt; &lt;U&gt;restore the backup&lt;/U&gt; of &lt;STRONG&gt;Node A&lt;/STRONG&gt; including the &lt;STRONG&gt;ADEOS&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE class="lia-align-justify"&gt;ise/admin# restore CONFIG-DATA.CFG10-&amp;lt;file name&amp;gt;tar.gpg repository &amp;lt;repository&amp;gt; encryption-key plain &amp;lt;password&amp;gt; &lt;STRONG&gt;&lt;U&gt;include-adeos&lt;/U&gt;&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;2nd&lt;/STRONG&gt; check not only if the &lt;STRONG&gt;Certificate&lt;/STRONG&gt; is &lt;STRONG&gt;OK&lt;/STRONG&gt;, but also if the &lt;STRONG&gt;Node A&lt;/STRONG&gt; is working.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Note: at this point if &lt;STRONG&gt;Node A&lt;/STRONG&gt; is "back on business", then try to &lt;STRONG&gt;deregister Node C&lt;/STRONG&gt; (&lt;STRONG&gt;PSN&lt;/STRONG&gt;) from &lt;STRONG&gt;Cluster&lt;/STRONG&gt; and register it to &lt;STRONG&gt;Node A&lt;/STRONG&gt; ... if everything is &lt;STRONG&gt;OK&lt;/STRONG&gt;, continue the process !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;IMPORTANT&lt;/STRONG&gt;: when restoring &lt;STRONG&gt;ADE-OS&lt;/STRONG&gt; you would be restoring &lt;STRONG&gt;OS Level Configuration&lt;/STRONG&gt;. This would include ALL of the &lt;STRONG&gt;OS Configuration&lt;/STRONG&gt; data that is configured when setting up the &lt;STRONG&gt;ISE Node&lt;/STRONG&gt; (like &lt;EM&gt;hostname, IP Addr, NTP, enabling SSH, default gateway and name servers&lt;/EM&gt;). Restoring the &lt;STRONG&gt;ADE-OS&lt;/STRONG&gt; configuration would be used if you want &lt;U&gt;an exact duplicate&lt;/U&gt; of the &lt;STRONG&gt;ISE server&lt;/STRONG&gt; the backup was taken from !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jul 2022 02:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4642695#M575883</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-07-02T02:37:45Z</dc:date>
    </item>
    <item>
      <title>Re: Issue installing wildcard cert back on Primary PAN (after RMA)</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4644434#M575926</link>
      <description>&lt;P&gt;Thanks Marcelo.&amp;nbsp; Three questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Node A has been non-operational due to cert issues for 2 month even though it has been joined to the deployment for much of that time.&amp;nbsp; If Node B (current primary PAN) dies, we would be in a bad shape without a working secondary PAN.&amp;nbsp; Can I deregister node A, add ADMIN and MONITOR roles to one of the PSNs (node C or D) so they become a secondary PAN to take that pressure off?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All recent backups were taken from current primary PAN node B.&amp;nbsp; Does this mean backups contain ADE-OS info (such as IP and hostname) for node B and can't be used to restore a new node A?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the hardware to build up another deployment and would prefer not touching the production deployment unless I have too.&amp;nbsp; Would it be possible to get a new deployment up and running and then cutover to it with the following steps?&lt;/P&gt;&lt;P&gt;1. Shutdown network ports on node A from production deployment - node A is not working anyways.&lt;/P&gt;&lt;P&gt;2. Restore a configuration backup onto new standalone node A, with the same IP and hostname as production node A.&lt;/P&gt;&lt;P&gt;3. Install certs on new node A in new deployment.&lt;/P&gt;&lt;P&gt;4. Shutdown network ports on node C (PSN) in production deployment.&lt;/P&gt;&lt;P&gt;5. Install ISE on new node C in new deployment using the same hostname and IP as production node C and join it to new deployment.&lt;/P&gt;&lt;P&gt;5. Repeat for nodes B and D.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2022 18:18:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4644434#M575926</guid>
      <dc:creator>tachyon05</dc:creator>
      <dc:date>2022-07-05T18:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Issue installing wildcard cert back on Primary PAN (after RMA)</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4644475#M575927</link>
      <description>&lt;P&gt;What you describe is not a supported ISE configuration.&amp;nbsp; It is not supported to have Admin+Monitor+PSN on the same ISE node unless it is a two node HA deployment.&amp;nbsp; Although, it might technically work for this particular issue.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That is correct, you would want to restore any backup without including the ADE-OS information (the default behavior anyways).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2022 18:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4644475#M575927</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-07-05T18:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Issue installing wildcard cert back on Primary PAN (after RMA)</title>
      <link>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4644909#M575958</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320195"&gt;@tachyon05&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;STRONG&gt;1st&lt;/STRONG&gt; "&lt;EM&gt; ...&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;Can I deregister Node A, add ADMIN and MnT roles to one of the PSNs (Node C or D) so they become a SPAN to take that pressure off? ...&lt;/EM&gt; ", the straight answer is &lt;STRONG&gt;yes&lt;/STRONG&gt;, but always have in mind the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/performance_and_scalability/b_ise_perf_and_scale.html" target="_blank" rel="noopener"&gt;Performance and Scalability Guide for ISE&lt;/A&gt;, search for &lt;STRONG&gt;Different Types of Cisco ISE Deployment&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;2nd&lt;/STRONG&gt; "&lt;EM&gt; ...&amp;nbsp;Does this mean backups contain ADE-OS info (such as IP and hostname) for Node B and can't be used to restore a new node A? ...&lt;/EM&gt; ",&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;a.&lt;/STRONG&gt; whenever you generate a &lt;STRONG&gt;Backup&lt;/STRONG&gt; the &lt;STRONG&gt;ADE-OS&lt;/STRONG&gt; is included&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;b.&lt;/STRONG&gt; you can use the "&lt;STRONG&gt;Node B Backup&lt;/STRONG&gt;" to &lt;STRONG&gt;Restore&lt;/STRONG&gt; the &lt;STRONG&gt;CONFIG-DATA&lt;/STRONG&gt; to &lt;STRONG&gt;Node A&lt;/STRONG&gt; &lt;U&gt;not the&lt;/U&gt; &lt;STRONG&gt;CONFIG-DATA&lt;/STRONG&gt; &lt;U&gt;and&lt;/U&gt; &lt;STRONG&gt;ADE-OS&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="lia-align-justify"&gt;&lt;SPAN&gt;ise/admin# restore &lt;U&gt;CONFIG-DATA&lt;/U&gt;.CFG10-&amp;lt;Date-Hour&amp;gt;tar.gpg repository &amp;lt;repository&amp;gt; encryption-key plain &amp;lt;password&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ise/admin# restore &lt;U&gt;CONFIG-DATA&lt;/U&gt;.CFG10-&amp;lt;Date-Hour&amp;gt;tar.gpg repository &amp;lt;repository&amp;gt; encryption-key plain &amp;lt;password&amp;gt; &lt;U&gt;include-adeos&lt;/U&gt;&lt;/SPAN&gt;&lt;U&gt;&lt;/U&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;3rd&lt;/STRONG&gt; "&lt;EM&gt; ...&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;Would it be possible to get a new deployment up and running and then cutover to it with the following steps? ...&lt;/EM&gt; ", &lt;STRONG&gt;yes&lt;/STRONG&gt; !!!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Note: just adding the following:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3.1 register &lt;STRONG&gt;Node A&lt;/STRONG&gt; to the &lt;STRONG&gt;Cluster&lt;/STRONG&gt; as a &lt;STRONG&gt;SPAN&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;5.1 register &lt;STRONG&gt;Node C&lt;/STRONG&gt; to the &lt;STRONG&gt;Cluster&lt;/STRONG&gt; as a &lt;STRONG&gt;PSN&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hope this helps !!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2022 10:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/issue-installing-wildcard-cert-back-on-primary-pan-after-rma/m-p/4644909#M575958</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-07-06T10:51:46Z</dc:date>
    </item>
  </channel>
</rss>

