<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Behavor differtent user  Ise certificates in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734365#M578709</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;The ISE Error detail gives a hint about the client perhaps not trusting the ISE EAP certificate. The clients MUST have all the CA certificates that were used in signing the ISE EAP System certificate installed.&lt;/P&gt;&lt;P&gt;Have you checked that all of the PSNs have the correct and expected EAP System certificate (signed by the PKI CA that the clients can trust? Each PSN can have its own EAP System cert ... if you have many PSNs then it's easy to not notice that at first glance)&lt;/P&gt;&lt;P&gt;I am checking again it is increible I am seeing same node diferent name who it is possible&amp;nbsp; wha is the propuse to have it this way oh my good&lt;/P&gt;&lt;P&gt;I created a CSR with name of&amp;nbsp; node ISE i belive it was the problem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It is incredible, so I'm checking it again everything . I notice the same node with a different name; what is the proposed for it ? I can not uderstand it .Oh, goodness&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I am seeeing a certificate with this name state ? without check any&amp;nbsp; opcion&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this&amp;nbsp; certificate I am watching the opcion uncheck&amp;nbsp; do you thhink if I ccheck the opcions admin and EAP authentificacion it will works&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;///&lt;BR /&gt;I believed the issue was the node ISE, thus I established a CSR with that name ABTLPC02. I am making a dnslookup and the result for this&amp;nbsp; ise node is a diferent IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 12 Feb 2023 18:11:32 GMT</pubDate>
    <dc:creator>athan1234</dc:creator>
    <dc:date>2023-02-12T18:11:32Z</dc:date>
    <item>
      <title>Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4727957#M578502</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Someone please explain the issue with Eap-Tls.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 11:42:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4727957#M578502</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-03-13T11:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4728251#M578506</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/159821"&gt;@athan1234&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;How did you configure workstation? Have you hardcoded that it should use certificate or username/password? Have you hardcoded it to use user or machine identity?&lt;/P&gt;
&lt;P&gt;Your last screenshot, ISE Authorization policy is not visible, so I don't see the condition you setup. Based on your successfull tests, and given both PEAP and EAP-TLS are successfull and a fact that same authorization rule is being hit, I would assume that authorization policy does not restrict one or another.&lt;/P&gt;
&lt;P&gt;Also, in the authentication policy, &lt;STRONG&gt;Continue&lt;/STRONG&gt; condition is normally used for MAB, not for 802.1x scenario.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 19:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4728251#M578506</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-25T19:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4728700#M578514</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/330320"&gt;@Milos_Jovanovic&lt;/a&gt;&amp;nbsp;, I appreciate your response.&lt;/P&gt;&lt;P&gt;I didn't put up the workstation in the department that set up the certificates and machines anthe they will&amp;nbsp;&amp;nbsp;using Microsoft's Intune for deploy .&lt;/P&gt;&lt;P&gt;Although I have access to a machine for testing ( name prueba)&amp;nbsp;I can change the workstation setup and see how it is configured. The previous time , I set up the workstation with use certificates and user and machine authentication. Maybe I should choose a user instead of a machine. Only a user certificate, not any machine certificates, have been configured by my client. What could therefore be the issue?&lt;/P&gt;&lt;P&gt;I will be able to make a test tomorrow. Please let me know if you want me to perform a particular test or if you want me to investigate the error. I can attach the test on the post&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 21:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4728700#M578514</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2022-11-27T21:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4728979#M578518</link>
      <description>&lt;P&gt;Unless you strictly define what you want to be permitted, there are no guarantees what will be used. For example, by default, Windows machine is using user or machine identity, depending if user is logged on or not. This way, you can't be sure what you will see and use in this scenario. Also, what is configured on one device is not neccessarily same thing that is configured on another device, so this might be a reason why you see both PEAP and EAP-TLS authentications. You need to define what exactly you want to use, and to configure workstation accordingly.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 08:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4728979#M578518</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-28T08:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730603#M578575</link>
      <description>&lt;P&gt;hi, &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/69120"&gt;@Milos Jovanovic&lt;/a&gt;&lt;BR /&gt;I agree with you completely.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;my clients needs connect using user certificate authentication over EAP-TLS.&lt;BR /&gt;It will be deploy via Microsoft Intune.&lt;BR /&gt;I am first trying different domain users without intune deploy.&lt;BR /&gt;I can set up the ssid user cert and eap-tls authentication user.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I struggle to understand in various circumstances:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;how is it possible for a user to connect to an SSID without a certificate using user domain credentials ?&lt;/P&gt;&lt;P&gt;On the ise logs, I notice EAP-TLS (MSCHAV2), which I have never seen before.&lt;BR /&gt;The concept is to connect using a trusted certificate no user domain name and password .&lt;/P&gt;&lt;P&gt;Other tester was the user's certificate, without a user domain and pasword , in this way I am able to establish EAP-TLS performance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I occasionally find this message in the logs.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm reading this article right now as I consider configuring Windows Intune.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-cisco-ise-mdm-with-microsoft-intune/ta-p/4187375" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-integrate-cisco-ise-mdm-with-microsoft-intune/ta-p/4187375&lt;/A&gt;&lt;/P&gt;&lt;P&gt;will i need to install the certificate in ISE?&lt;/P&gt;&lt;P&gt;Include DigiCert Global Root G2 on their list of reliable CAs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 11:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730603#M578575</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-03-13T11:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730794#M578581</link>
      <description>&lt;P&gt;I believe it is due to &lt;STRONG&gt;Continue&lt;/STRONG&gt; option you placed under 802.1x authentication rule. If user is not found, it would still proceed to authorization, and I assume something there is permitting him/her, regardless of authentication method. As already stated, this option is used only for MAB - if MAC address is not found, still proceed with authorization where redirection is happening.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 08:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730794#M578581</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-12-01T08:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730880#M578585</link>
      <description>&lt;P&gt;Yes you are right .&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE AUTEN.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/169619iDD75FBA059E645CD/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE AUTEN.png" alt="ISE AUTEN.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just changed it for reject .Is better reject&amp;nbsp; isen´it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 11:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730880#M578585</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2022-12-01T11:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730897#M578586</link>
      <description>&lt;P&gt;I just created a test.&lt;BR /&gt;I receive the same message with a certificate.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8021x-1.png" style="width: 695px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/169624i399C2E60CD68393D/image-size/large?v=v2&amp;amp;px=999" role="button" title="8021x-1.png" alt="8021x-1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 11:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730897#M578586</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-03-13T11:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730998#M578587</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/159821"&gt;@athan1234&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;On ISE, under Trusted Certificates, go and check if your internal Root/Intermediate CA has selected option that it will trust certificates on dot1x (don't have ISE in front of me right now, so can't say how exactly this option is called).&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 14:53:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4730998#M578587</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-12-01T14:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4731284#M578599</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/330320"&gt;@Milos_Jovanovic&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes I guess this is the option you tell me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm checking everything&lt;BR /&gt;This ISE was operational two and a half months ago, therefore the incidence became apparent to me.&lt;BR /&gt;I can see that the certificate was no longer valid.&lt;/P&gt;&lt;P&gt;I lack background in certificates.&lt;BR /&gt;I created a new certificate, created a CSR, and sent it to the CA's management to be bound to the new certificate and imported into the system.&lt;/P&gt;&lt;P&gt;When I look at the expired certificate, I discover a wilcard *domain.&lt;BR /&gt;Befor I can see the EAP check, I can't tell who is at work.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I configured SAN&amp;nbsp;&amp;nbsp; IP ise, domain resolution, hostname ise, and other settings in the new certificate I created.Perhaps that is the issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attach both cerficates&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EXPIRIED CERTIFICATE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;NEW CERTIFICATE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Feb 2023 18:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4731284#M578599</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-12T18:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4732143#M578632</link>
      <description>&lt;P&gt;Yes, the option I was mentioning is "Trust for client authentication and Syslog". As I can see, this certificate is issued by Sectigo, and used on you ISE server(s). Which certificates are you using on client side? Are those also issued by Sectigo, or you are using your internal PKI for that?&lt;/P&gt;
&lt;P&gt;Expired wildcard certificate should be replaced at some point, but it is not what is messing your dot1x. As wildcard is tied to pxGrid and RADIUS DTLS, I don't think it is related to your current issue. Furthermore, wildcard certiicate can't be used for dot1x, as clients are not trusting it.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Sun, 04 Dec 2022 18:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4732143#M578632</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-12-04T18:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4732159#M578633</link>
      <description>&lt;P&gt;The new cert looks good and to be honest, having the Admin and EAP signed by your internal PKI is often perfectly acceptable. Your expired cert was a public signed cert, and also contained a wildcard - this cert was possibly used elsewhere in the organisation. Wildcard certs and EAP typically don't play well together with Windows supplicants. I can't remember whether it's Digicert or some other CA ... with those guys you can apparently do wildcard EAP certs. But I would not bother with it. What you have looks good. I even put 3 year certs on my Admin and EAP, using internal PKI. Browsers and supplicants are happy with that.&lt;/P&gt;
&lt;P&gt;The issue you face might be the Windows supplicant configuration. Is there a reason that you chose User Authentication and not Machine Authentication? Machine authentication is generally better because the machine gets connected during boot up, and will also stay connected when user logs out. The "user auth" in my opinion, does not require a network authentication to ISE. Rather let that be a Windows authentication to AD/Azure etc.&lt;/P&gt;
&lt;P&gt;If you're using Intune, do you put machine certs on Windows computers?&lt;/P&gt;</description>
      <pubDate>Sun, 04 Dec 2022 21:19:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4732159#M578633</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-12-04T21:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734330#M578703</link>
      <description>&lt;P&gt;Hi thanks for you reply&lt;BR /&gt;You are correct; I should have realized that there was another certificate for internal PKI signed with the ise this certificate had a error .&lt;/P&gt;&lt;P&gt;My certificate is accurate, yet I continue to receive an error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 21:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734330#M578703</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2022-12-07T21:57:10Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734339#M578705</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/82347"&gt;@Arne Bier&lt;/a&gt;, I appreciate your response.it's plausible that the supplicant made the mistake.&lt;BR /&gt;I obtain with a other PC for good authentication.&lt;BR /&gt;The client informs me that all of them have the same configuration.&lt;BR /&gt;I've tested the boss' PC and several others, and the outcomes are always the same error.I asked the client to leave the wireless settings unattended ( without intune) in those PCs, and even though I was able to set everything up correctly, I still received the same issue.Regarding user authentication, my client has chosen to implement it i do not whywhat will transpire&lt;BR /&gt;I'm crazy.&lt;BR /&gt;Do you have any suggestions for the test?&lt;BR /&gt;I downloaded wireshark for capture packet wifi on the client computer, however i can no see any packet transmit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="eap-tls error.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/170104i236367B1396365AD/image-size/large?v=v2&amp;amp;px=999" role="button" title="eap-tls error.png" alt="eap-tls error.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Steps&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11001&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Received RADIUS Access-Request&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11017&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;RADIUS created a new session&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;15049&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Evaluating Policy Group&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;15008&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Evaluating Service Selection Policy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;15048&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Queried PIP - Normalised Radius.Ra&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11507&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Extracted EAP-Response/Identity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12500&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared EAP-Request proposing EA&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11006&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Returned RADIUS Access-Challenge&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11001&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Received RADIUS Access-Request (&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;ms)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11018&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;RADIUS is re-using an existing sessi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12502&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Extracted EAP-Response containing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;response and accepting EAP-TLS as&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12800&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Extracted first TLS record; TLS hand&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12545&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Client requested EAP-TLS session ti&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12805&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Extracted TLS ClientHello message&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12806&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared TLS ServerHello message&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12807&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared TLS Certificate message&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12808&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared TLS ServerKeyExchange m&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12809&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared TLS CertificateRequest me&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12810&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared TLS ServerDone message&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12505&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared EAP-Request with another&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11006&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Returned RADIUS Access-Challenge&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11001&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Received RADIUS Access-Request&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11018&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;RADIUS is re-using an existing sessi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12504&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Extracted EAP-Response containing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;response&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12505&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared EAP-Request with another&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11006&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Returned RADIUS Access-Challenge&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11001&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Received RADIUS Access-Request&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11018&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;RADIUS is re-using an existing sessi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12504&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Extracted EAP-Response containing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;response&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12505&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared EAP-Request with another&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11006&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Returned RADIUS Access-Challenge&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11001&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Received RADIUS Access-Request&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11018&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;RADIUS is re-using an existing sessi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12504&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Extracted EAP-Response containing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;response&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12505&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared EAP-Request with another&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11006&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Returned RADIUS Access-Challenge&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11001&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Received RADIUS Access-Request&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11018&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;RADIUS is re-using an existing sessi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;12504&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Extracted EAP-Response containing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;response&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11514&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Unexpectedly received empty TLS m&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;rejection by the client&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;61025&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Open secure connection with TLS pe&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11504&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Prepared EAP-Failure&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;SPAN&gt;11003&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; &lt;SPAN&gt;Returned RADIUS Access-Reject&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 21:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734339#M578705</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2022-12-07T21:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734344#M578707</link>
      <description>&lt;P&gt;The ISE Error detail gives a hint about the client perhaps not trusting the ISE EAP certificate. The clients MUST have all the CA certificates that were used in signing the ISE EAP System certificate installed.&lt;/P&gt;
&lt;P&gt;Have you checked that all of the PSNs have the correct and expected EAP System certificate (signed by the PKI CA that the clients can trust? Each PSN can have its own EAP System cert ... if you have many PSNs then it's easy to not notice that at first glance)&lt;/P&gt;
&lt;P&gt;As far as debugging goes, have you tried an ISE endpoint debug?&amp;nbsp; You can use the MAC address of a failing wireless client and then debug that in ISE. With any luck, the endpoint debug will also capture the client certificate, which you can then download and inspect. Unfortunately you can't verify how the supplicant was configured - but you might get a copy of the client cert.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 22:15:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734344#M578707</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-12-07T22:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734365#M578709</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;The ISE Error detail gives a hint about the client perhaps not trusting the ISE EAP certificate. The clients MUST have all the CA certificates that were used in signing the ISE EAP System certificate installed.&lt;/P&gt;&lt;P&gt;Have you checked that all of the PSNs have the correct and expected EAP System certificate (signed by the PKI CA that the clients can trust? Each PSN can have its own EAP System cert ... if you have many PSNs then it's easy to not notice that at first glance)&lt;/P&gt;&lt;P&gt;I am checking again it is increible I am seeing same node diferent name who it is possible&amp;nbsp; wha is the propuse to have it this way oh my good&lt;/P&gt;&lt;P&gt;I created a CSR with name of&amp;nbsp; node ISE i belive it was the problem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It is incredible, so I'm checking it again everything . I notice the same node with a different name; what is the proposed for it ? I can not uderstand it .Oh, goodness&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I am seeeing a certificate with this name state ? without check any&amp;nbsp; opcion&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this&amp;nbsp; certificate I am watching the opcion uncheck&amp;nbsp; do you thhink if I ccheck the opcions admin and EAP authentificacion it will works&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;///&lt;BR /&gt;I believed the issue was the node ISE, thus I established a CSR with that name ABTLPC02. I am making a dnslookup and the result for this&amp;nbsp; ise node is a diferent IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Feb 2023 18:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734365#M578709</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-12T18:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734679#M578716</link>
      <description>&lt;P&gt;I'm lost now. How many ISE servers are you using, and in what kind of deployment? Based on your DNS lookup, you have 2 of them - ABTLPC01 and ABTLPC02. Based on the screenshot provided above, you are using a single-node deployment of ABTLPC02. Also, on a screenshot above, you are presenting a cert screenshot of ABTLPC01, which is not part of the deployment?&lt;/P&gt;
&lt;P&gt;Please clarify this, to start with. You should also check what is configured on your WLC, just to be clear which ISE node(s) is in use.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 09:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4734679#M578716</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-12-08T09:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4735041#M578729</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/69120"&gt;@Milos Jovanovic&lt;/a&gt;&lt;BR /&gt;Like you, I am lost.&lt;BR /&gt;I think the issue is related to DNS reverse.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;I can see Only one ISE node exists.IP 10.76.33.102 for ABTLPC02&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;However, if I perform a nslookup on this ISE hostname, XXXXX, its IP address is 10.x.x.x, but it is not HTTP-reachable, suggesting that this IP is not an ISE node&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;As a result, if you see this certificate: The ISE is resolved by all of the subject alternative neme (SAN), whnw i puting in the browser each&amp;nbsp; SAN&amp;nbsp; : abtlpc01.abanteasesores.es or bienvenido.avanteasesores.com .&amp;nbsp; get in in the node ise with hostname ABTLPC02&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because of these factors, the ISE node's hostname is 10.x.x.x. 102&amp;nbsp; hostname is xxxxxx.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;WLC&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="wlc.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/170222i9CE8D89091A7C540/image-size/large?v=v2&amp;amp;px=999" role="button" title="wlc.png" alt="wlc.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see two IP addresses, however the IP 10.76.33.103 cannot be accessed via HTTP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Feb 2023 18:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4735041#M578729</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-12T18:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4735090#M578731</link>
      <description>&lt;P&gt;If this is the case, let's go in in reverse:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Based on WLC configuration, ISE in use has IP 10.76.33.102 (more relevant screenshot would be from WLAN configuration, AAA section, but based on offered IPs and previus screenshots, this would be the best match)&lt;/LI&gt;
&lt;LI&gt;Behind IP address 10.76.33.102 is ISE with hostname ABTLPC02&lt;/LI&gt;
&lt;LI&gt;You need to fix DNS records, both forward and reverse, so it represents real hostname and IP address&lt;/LI&gt;
&lt;LI&gt;Given that your hostname is ABTLPC02, and your screenshots - your certificate is not ok, as it is issued to ABTLPC01, so the cert warning is actually expected&lt;/LI&gt;
&lt;LI&gt;You could do one of the following:
&lt;UL&gt;
&lt;LI&gt;Get certificate for ABTLPC02, and apply it for relevant roles (Admin, EAP-TLS)&lt;/LI&gt;
&lt;LI&gt;Reimage ISE, name it ABTLPC01, fix DNS records accordingly, and re-apply existing certificate&lt;/LI&gt;
&lt;LI&gt;Play arround with authorization policy and instead of returning default ISE hostname, return static FQDN of ABTLPC01&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Given that your cert is issued by internal PKI, easiest one is to issue certificate for ABTLPC02, and relevant SANs.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 19:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4735090#M578731</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-12-08T19:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: Behavor differtent user  Ise certificates</title>
      <link>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4735122#M578732</link>
      <description>&lt;P&gt;Hello, &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/69120"&gt;@Milos Jovanovic&lt;/a&gt;.&lt;BR /&gt;Thank you for your response. Keep in mind that when I first encountered this client, I had no prior knowledge of it. When I discovered that the hostname was ABTPCL02, I searched for certificates related to it but couldn't find any, so I created a new certificate with that hostname. It was only after I discovered that the user couldn't connect that I opened this post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the best practice in this situation to modify the host name to ABTLPC01 add the current certificate, and check that the EAP and Admin options are functional?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;or If I used my certificate, I would need to get in touch with the guys AD and ask them to perform a reverse DNS lookup.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;What is the ideal method?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Feb 2023 18:12:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/behavor-differtent-user-ise-certificates/m-p/4735122#M578732</guid>
      <dc:creator>athan1234</dc:creator>
      <dc:date>2023-02-12T18:12:50Z</dc:date>
    </item>
  </channel>
</rss>

