<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Expired System Certificate Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846359#M582037</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/969432"&gt;@patrickbyrne456305724&lt;/a&gt; replacing the "admin" certificate will result in restarting the ISE services. Replacing the other certificates does not result in restarting the services. Obviously for the EAP certificate you need to ensure the clients trust the ISE certificate, so use the same CA to issue the certificate and you should be fine.&lt;/P&gt;
&lt;P&gt;Here is a cisco guide to renew ISE certificates - &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Once you've replaced the certificates and the old certificate is not in use, you can safely delete the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 May 2023 11:30:43 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2023-05-31T11:30:43Z</dc:date>
    <item>
      <title>Expired System Certificate Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846353#M582036</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;We have a bunch of system Certificates expiring ASAP in a PAN failover depoyment (Primary &amp;amp; Secondary)&lt;/P&gt;&lt;P&gt;Can you aid in the correct steps to carry out this work. Can you actually import the new certs whilst the others are active and then just delete them when new certs are active?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="patrickbyrne456305724_0-1685532037981.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/186104i641F5CAE844AAF50/image-size/medium?v=v2&amp;amp;px=400" role="button" title="patrickbyrne456305724_0-1685532037981.png" alt="patrickbyrne456305724_0-1685532037981.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I look forward to hearing back&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 11:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846353#M582036</guid>
      <dc:creator>patrickbyrne456305724</dc:creator>
      <dc:date>2023-05-31T11:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: Expired System Certificate Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846359#M582037</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/969432"&gt;@patrickbyrne456305724&lt;/a&gt; replacing the "admin" certificate will result in restarting the ISE services. Replacing the other certificates does not result in restarting the services. Obviously for the EAP certificate you need to ensure the clients trust the ISE certificate, so use the same CA to issue the certificate and you should be fine.&lt;/P&gt;
&lt;P&gt;Here is a cisco guide to renew ISE certificates - &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Once you've replaced the certificates and the old certificate is not in use, you can safely delete the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 11:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846359#M582037</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-31T11:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: Expired System Certificate Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846500#M582038</link>
      <description>&lt;P&gt;Many thanks for response..If you add/import the new Certs to the Primary ISE node do they then automatically get onto the Secondary. Or, would you need to import onto Secondary first etc?&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 14:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846500#M582038</guid>
      <dc:creator>patrickbyrne456305724</dc:creator>
      <dc:date>2023-05-31T14:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Expired System Certificate Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846535#M582039</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/969432"&gt;@patrickbyrne456305724&lt;/a&gt;&lt;/P&gt;
&lt;H3 id="ariaid-title42" class="title topictitle3 3H_Head3-F767EBB3"&gt;Bind a CA-Signed Certificate to a Certificate Signing Request&lt;/H3&gt;
&lt;TABLE class="stepTable" border="0"&gt;
&lt;TBODY&gt;
&lt;TR id="ID776__step_C504B5F5F4F2474A9C13E5276DA7A1AC" class="li step"&gt;
&lt;TD width="10%" align="left" valign="top"&gt;&lt;STRONG&gt;Step&amp;nbsp;7&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD align="left" valign="top"&gt;
&lt;P class="ph cmd"&gt;(Optional) Check the services for which this certificate will be used in the &lt;SPAN class="ph uicontrol"&gt;Usage&lt;/SPAN&gt; area.&lt;/P&gt;
&lt;SECTION class="itemgroup info"&gt;This information is autopopulated if you have enabled the &lt;SPAN class="ph uicontrol"&gt;Usage&lt;/SPAN&gt; option while generating the certificate signing request.&lt;SPAN class="ph"&gt; You can also choose to edit the certificate at a later time to specify the usage.&lt;/SPAN&gt;
&lt;P class="p"&gt;&lt;EM&gt;&lt;STRONG&gt;Changing the &lt;SPAN class="ph uicontrol"&gt;Admin&lt;/SPAN&gt; usage certificate on a primary PAN restarts the services on all the other nodes. The system restarts one node at a time, after the primary PAN restarts.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_ise_manage_certificates.html#ID776" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_ise_manage_certificates.html#ID776&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Only the admin certificate initiates a restart of the ISE services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 14:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/expired-system-certificate-cisco-ise/m-p/4846535#M582039</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-05-31T14:57:36Z</dc:date>
    </item>
  </channel>
</rss>

