<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Admin Certificate Renewal: Impact in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/4867842#M582681</link>
    <description>&lt;P&gt;Thank you&amp;nbsp;&lt;SPAN&gt;Tymofii Dmytrenko. I have done the same recently. This thread was useful as it is not clear in the cisco documentation.&amp;nbsp; Sharing my experience in brief, I renewed admin certificate on 1+1 HA deployment running ISE 3.1 Patch 04. There is no service impact during the application restart because secondary server was working. O&lt;/SPAN&gt;nce the primary is up, secondary server restarted the application service. In short, certificate renewal process is smooth.&amp;nbsp;The only problem I faced is ”&lt;STRONG&gt;admin certificate”&lt;/STRONG&gt; on secondary node is not getting replicated. Below is the error message.&amp;nbsp;Certificate Replication Failed: Admin=****; Server=ISE-01; Message=Failed to replicate certificate **** to node ISE-02 because Cannot delete Admin certificate.&lt;/P&gt;
&lt;P&gt;So I had to deregister secondary node from the primary. then it becomes standalone. Import admin certificate to the secondary server and register it again to the primary server. overall&amp;nbsp; process is smooth without any impact on radius and tacacs+ authentication/authorization services. Please note while deregister/reregister process, services of secondary server is getting restarted.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks all&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Jul 2023 11:09:08 GMT</pubDate>
    <dc:creator>dperera</dc:creator>
    <dc:date>2023-07-05T11:09:08Z</dc:date>
    <item>
      <title>Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3673115#M496027</link>
      <description>&lt;P&gt;At the moment we have individual certificates deployed to each ISE node for Admin purpose. We also have wildcard certificate which we use for EAP Authentication and sponsors portal. The problem is that due to HSTS ISE PSN presents its own Admin certificate when redirection is being performed and hence portal cannot be accessed using portal's FQDN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, I decided to use Wildcard certificate for Admin function too, but when I Edited Wildcard certificate to set Admin as one of its functions, I've got the following warning&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ISE.png" style="width: 689px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/15053i623142D72D729432/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE.png" alt="ISE.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my understanding, this means that I will not be able to manage or monitor ISE nodes while this activity takes place. However, is there anyone from Cisco who can confirm the exact impact? Is Authentication going to be affected? Does this happen simultaneously on all nodes in the deployment?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 12:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3673115#M496027</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-07-24T12:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3673122#M496028</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;It depends on how many nodes you are running in your environment and what services are running on those nodes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, when the services restart on the PAN assuming the PSN service is running on another ISE node then you can still authenticate users, but you do lose the ability to process sessions that would require writing to the database. This &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/b_ise_admin_guide_20_chapter_010.html#ID57" target="_self"&gt;link&lt;/A&gt; indicates exactly what is and is not available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 12:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3673122#M496028</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-07-24T12:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3673515#M496029</link>
      <description>I checked on this and yes services will restart when replacing a cert&lt;BR /&gt;</description>
      <pubDate>Tue, 24 Jul 2018 17:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3673515#M496029</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-07-24T17:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3673606#M496030</link>
      <description>&lt;P&gt;You assumed correct.&amp;nbsp; When you hit ok on that warning, the application server service will restart.&amp;nbsp; The entire server does not restart though, just one service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will not be able to access the gui while the the application server service restarts, and any feature leveraging the gui, such as sponsor guest account portal would be unavailable.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Something to keep in mind is that the warning indicates all nodes including PSNs.&amp;nbsp; This means that if you are using the CWA portal for guest authentication on any other PSNs, that will also be unavailable for around 10-20 minutes.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 18:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3673606#M496030</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2018-07-24T18:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3674422#M496031</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt; thanks! This is what I thought. I will raise a change to implement. At the moment we don't use ISE v2.3 for CWA, but this is ongoing project, so I'd better update certificate before it becomes even more critical.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'll make sure the change happens close to end of day over the weekend just in case.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2018 15:03:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3674422#M496031</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-07-25T15:03:24Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3674447#M496032</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt; are you referring to ALL services, or just Application Service (so, only GUI-based services will not be available, such as Management GUI, CWA, sponsors portals, BYOD portals, so on)? Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2018 15:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3674447#M496032</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-07-25T15:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3674523#M496033</link>
      <description>All services should be affected because your cert applies to admin&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Jul 2018 16:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3674523#M496033</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-07-25T16:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3681906#M496034</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199790"&gt;@Jason Kunst&lt;/a&gt;. How this activity may possibly affect Radius if that one is using different certificate (endpoint authentication)? Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 10:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3681906#M496034</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-08-06T10:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3682103#M496035</link>
      <description>&lt;P&gt;The restart of ISE services includes the session services (RADIUS and T+) regardless the EAP server using a different certificate. On the other hand, no ISE restart if only the EAP server certificate updated.&lt;/P&gt;
&lt;P&gt;Please note that it will rolling restart ISE services on all the other ISE nodes, if we change the admin certificate on the primary ISE node.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 14:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3682103#M496035</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-08-06T14:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3682167#M496036</link>
      <description>&lt;P&gt;Oh... so this is a MAJOR change with a MASSIVE impact then? Oh my.&lt;/P&gt;
&lt;P&gt;Thanks for confirming. At least I know what to expect now.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 14:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3682167#M496036</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-08-06T14:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3682181#M496037</link>
      <description>&lt;P&gt;Correct, on the impact of updating the admin certificate on the primary ISE node.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CSCut10928 is an enhancement and not yet implemented. If needed, you may use the workaround for&amp;nbsp;CSCut10928 to reduce the impact.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 15:03:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3682181#M496037</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-08-06T15:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3707167#M496038</link>
      <description>&lt;P&gt;I just thought I will give an update to everyone. So, we've swapped Admin certificate in our Cisco ISE v2.3 environment and I have observed the following.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Only Application Service restarted, other services were not affected (inc Radius authentication)&lt;/LI&gt;
&lt;LI&gt;Service restarted on PAN, and on all other nodes ONE BY ONE as they are listed on the deployment page&lt;/LI&gt;
&lt;LI&gt;Impact was very low (we don't use ISE portals, only RADIUS/TACACS)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This contradicts with the information provided here. I had to go through a pain of raising this as a Major change and going through CAB &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway, happy there was no issues at all. Might be useful to anyone who wants to do the same&lt;/P&gt;
&lt;P&gt;To summarize,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We had wildcard certificate used for EAP and Portals (sponsors), but NODE-specific certificates for ADMIN (each node had its own crt). This resulted in HSTS issues with Sponsors portal, where initially node presents its OWN ADMIN certificate, followed by WILDCARD PORTAL after redirection. Portal access was broken. We had to promote Wildcard crt to ADMIN function. It was successful, with minum impact and resolved HSTS problem we faced.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks all&lt;/P&gt;</description>
      <pubDate>Fri, 14 Sep 2018 14:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/3707167#M496038</guid>
      <dc:creator>Tymofii Dmytrenko</dc:creator>
      <dc:date>2018-09-14T14:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/4086105#M560436</link>
      <description>&lt;P&gt;I second what Tymofii Dmytrenko&amp;nbsp;posted&amp;nbsp;there was no impact on Radius / TACACS requests during admin cert renewal process.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 19:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/4086105#M560436</guid>
      <dc:creator>Abid Abdul Latif</dc:creator>
      <dc:date>2020-05-14T19:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: Admin Certificate Renewal: Impact</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/4867842#M582681</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;SPAN&gt;Tymofii Dmytrenko. I have done the same recently. This thread was useful as it is not clear in the cisco documentation.&amp;nbsp; Sharing my experience in brief, I renewed admin certificate on 1+1 HA deployment running ISE 3.1 Patch 04. There is no service impact during the application restart because secondary server was working. O&lt;/SPAN&gt;nce the primary is up, secondary server restarted the application service. In short, certificate renewal process is smooth.&amp;nbsp;The only problem I faced is ”&lt;STRONG&gt;admin certificate”&lt;/STRONG&gt; on secondary node is not getting replicated. Below is the error message.&amp;nbsp;Certificate Replication Failed: Admin=****; Server=ISE-01; Message=Failed to replicate certificate **** to node ISE-02 because Cannot delete Admin certificate.&lt;/P&gt;
&lt;P&gt;So I had to deregister secondary node from the primary. then it becomes standalone. Import admin certificate to the secondary server and register it again to the primary server. overall&amp;nbsp; process is smooth without any impact on radius and tacacs+ authentication/authorization services. Please note while deregister/reregister process, services of secondary server is getting restarted.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks all&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2023 11:09:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-certificate-renewal-impact/m-p/4867842#M582681</guid>
      <dc:creator>dperera</dc:creator>
      <dc:date>2023-07-05T11:09:08Z</dc:date>
    </item>
  </channel>
</rss>

