<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Deployment Certs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973582#M585597</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; here is the offical Cisco ISE guide to renew certificates and the steps required. &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;FYI, it's recommended not to use the self-signed certificates in production.&lt;/P&gt;</description>
    <pubDate>Thu, 07 Dec 2023 17:39:46 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2023-12-07T17:39:46Z</dc:date>
    <item>
      <title>ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973572#M585594</link>
      <description>&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;Issue with our ISE Deployment self signed certs have expired so deployment is out of sync, self signed certs are multi use (Admin, Portal, Radius DTLS, EAP)&lt;BR /&gt;Is there a certain order to renew the self signed cert and get the deployment back in sync.??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 17:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973572#M585594</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-07T17:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973576#M585595</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; it's the Admin cert that is used for the ISE nodes to communicate. When you replace this certificate the ISE services are restarted. Best to do this in a change window. Once all nodes have a new Admin certificate then the ISE cluster should be in sync again. &lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 17:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973576#M585595</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-07T17:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973580#M585596</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for that, whats the best way to do this e.g what order ?? and steps, have you any good links for this info at all ?&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 17:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973580#M585596</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-07T17:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973582#M585597</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; here is the offical Cisco ISE guide to renew certificates and the steps required. &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;FYI, it's recommended not to use the self-signed certificates in production.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 17:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973582#M585597</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-07T17:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973618#M585599</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Again Thanks&lt;/P&gt;&lt;P&gt;When the ISE is installed, it generates a self-signed certificate. The self-signed certificate is used for administrative access and for communication within the distributed deployment (HTTPS) as well as for &lt;STRONG&gt;user authentication (EAP)&lt;/STRONG&gt;. In a live system, use a CA certificate instead of a self-signed certificate.&lt;BR /&gt;&lt;BR /&gt;when it says user eap authentication which users does it refer to is it ISE Admins ??&lt;BR /&gt;&lt;BR /&gt;also Ive inherited this deployment whats the downside of using self signed for this please.?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 19:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973618#M585599</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-07T19:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973625#M585602</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; the EAP certificate is the certificate presented to the endpoints/clients devices when authenticating using dot1x. Generally the EAP certificate issue by an Internal CA (such as from Windows AD PKI), which is then trusted by domain computers. Using a self signed certificate for EAP means the endpoints would not trust this certificate and would cause authentication issues.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 19:15:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973625#M585602</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-07T19:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973627#M585604</link>
      <description>&lt;P&gt;There is many certificate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some not all&lt;/P&gt;
&lt;P&gt;1- admin use to access gui of ISE&lt;/P&gt;
&lt;P&gt;2- portals cert use for web auth&lt;/P&gt;
&lt;P&gt;3- eap cert&amp;nbsp; use for radius EAP-TLS and other EAP auth&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you use CSR there is field you can select for which this cert. Will use.&lt;/P&gt;
&lt;P&gt;So dont confuse admin is different than portal.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 19:25:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973627#M585604</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-07T19:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973632#M585605</link>
      <description>&lt;P&gt;Additional to &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;link&lt;/P&gt;
&lt;P&gt;Check this link also&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-implement-digital-certificates-in-ise/ta-p/3630897" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-implement-digital-certificates-in-ise/ta-p/3630897&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 19:28:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973632#M585605</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-07T19:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973683#M585606</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;So would the PSN Nodes have different certs than the PAN node. ?? e.g for EAP&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 21:00:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973683#M585606</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-07T21:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Deployment Certs</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973686#M585607</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;admin certs would be different for each node, the EAP cert can be different or the same cert (multi domain cert or wildcard).&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 21:05:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-certs/m-p/4973686#M585607</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-07T21:05:45Z</dc:date>
    </item>
  </channel>
</rss>

