<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ise Deployment Question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976367#M585681</link>
    <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;Im thinking about possibly moving the admin use from the expired cert to a cert thats not expired, is this possible,?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Dec 2023 15:37:00 GMT</pubDate>
    <dc:creator>benolyndav</dc:creator>
    <dc:date>2023-12-12T15:37:00Z</dc:date>
    <item>
      <title>Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976140#M585665</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;If i Generate a new self signed Cert on the primary node and use for multi use one being Admin would the application restart affect the secondary node? or would this carry on serving Clients as normal.??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 11:54:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976140#M585665</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-12T11:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976145#M585666</link>
      <description>&lt;P&gt;If the clients have valid certs they should not be effected.&lt;/P&gt;
&lt;P&gt;what kind of cert you replacing, admin certs ? - adding new Cert does not need ISE to reload.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217191-configuration-guide-to-certificate-renew.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 12:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976145#M585666</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-12-12T12:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976147#M585667</link>
      <description>&lt;P&gt;can I know what service for Client you use in Secondary Node ?&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 12:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976147#M585667</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-12T12:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976168#M585668</link>
      <description>&lt;P&gt;friend they will effect be careful.&amp;nbsp;&lt;BR /&gt;Admin Cert. in distribute mode is important&amp;nbsp;&lt;BR /&gt;check before apply any change&amp;nbsp;&lt;BR /&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 12:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976168#M585668</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-12T12:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976169#M585669</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Sorry pressed the wrong button didnt want to accept solution, its self signed certs and are multi use admin being one of the uses,&lt;BR /&gt;also I do see there is a button to renew the cert is that the easiest way to renew&amp;gt;?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 12:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976169#M585669</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-12T12:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976173#M585670</link>
      <description>&lt;P class="p"&gt;When you set up a deployment, the node that you designate as the Primary Administration Node (PAN) becomes the Root CA. The PAN has a Root CA certificate and a Node CA certificate that is signed by the Root CA.&lt;/P&gt;
&lt;P class="p"&gt;When you register a Secondary Administration Node to the PAN, a Node CA certificate is generated and is signed by the Root CA on the Primary Administration Node.&lt;/P&gt;
&lt;P class="p"&gt;Any Policy Service Node (PSN) that you register with the PAN is provisioned an Endpoint CA and an OCSP certificate signed by the Node CA of the PAN. The Policy Service Nodes (PSNs) are subordinate CAs to the PAN. When you use the ISE CA, the Endpoint CA on the PSN issues the certificates to the endpoints that access your network.&lt;/P&gt;
&lt;P class="p"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_ise_manage_certificates.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_ise_manage_certificates.html&lt;/A&gt;&lt;/P&gt;
&lt;P class="p"&gt;check this guide, see ISE root CA in PAN&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 12:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976173#M585670</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-12T12:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976182#M585672</link>
      <description>&lt;LI-CODE lang="markup"&gt;, its self signed certs and are multi use admin being one of the uses,
also I do see there is a button to renew the cert is that the easiest way to renew&amp;gt;?&lt;/LI-CODE&gt;
&lt;P&gt;is the self signed certs you renewing or you replacing ?&lt;/P&gt;
&lt;P&gt;what kind of deployment, what ISE version ?&lt;/P&gt;
&lt;P&gt;have you checked the document posted above - in related to renewals of certs.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 12:42:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976182#M585672</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-12-12T12:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976189#M585673</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;its the self signed certs that have expired onthe primary admin and secondary admin nodes, theses certs are used for&amp;nbsp; DTLS, Admin, Portal, eap auth.&lt;BR /&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 12:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976189#M585673</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-12T12:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976191#M585674</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; applying a new admin certificate to a node will restart the services on that node only. As long as the secondary node provides the same services (RADIUS, TACACS etc) then the clients will continue to be authenticated. It is important the secondary node will need to trust the Primary node's new admin certificate.&lt;/P&gt;
&lt;P&gt;If you also use the new certificate for EAP (and any other function) then those clients will need to trust the new certificate, when using a self-signed certificate this won't be easy. The recommendation is to use an internal CA for admin/EAP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 12:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976191#M585674</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-12T12:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976274#M585676</link>
      <description>&lt;P&gt;You can start with new Certs on Primary node and later secondary node, the document give you steps.&lt;/P&gt;
&lt;P&gt;Client should not see any issue, as long as both system configured correctly to failover to other ISE when one ISE not reachable.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 13:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976274#M585676</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-12-12T13:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976332#M585677</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;so the psn nodes are using a cert from an external CA for EAP which is i gues why clients are ok,&amp;nbsp; the Primary admin node is as mentioned using a self signed cert which has expired for admin, eap, portal, DTLS,&amp;nbsp;&lt;BR /&gt;so if I generate a new self signed cert for the primary node or use the check box to renew&amp;nbsp; which is the best way,?&lt;/P&gt;&lt;P&gt;then this new cer has to also be in the trusted certs along with all other nodes in the deployment?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 14:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976332#M585677</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-12T14:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976336#M585678</link>
      <description>&lt;LI-CODE lang="markup"&gt;so if I generate a new self signed cert for the primary node or use the check box to renew  which is the best way,?&lt;/LI-CODE&gt;
&lt;P&gt;if the Cert is new you need to add to Trusted store and amend as per requirement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 14:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976336#M585678</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-12-12T14:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976367#M585681</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;Im thinking about possibly moving the admin use from the expired cert to a cert thats not expired, is this possible,?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 15:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976367#M585681</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-12T15:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976371#M585682</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt; yes, just click the other certificate and select the usage as "Admin" and apply, the services will then restart. Ensure the other certificate is trusted by the other nodes.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 15:40:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976371#M585682</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-12T15:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976381#M585683</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;So just being curious could I select any Cert thats being used for say pxgrid or ise messagin etc and add the Admin use to the Cert.?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 16:03:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976381#M585683</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2023-12-12T16:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Ise Deployment Question</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976385#M585684</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/445131"&gt;@benolyndav&lt;/a&gt;&amp;nbsp;generally yes you can as long as it's trusted by other nodes etc. Preferably you'd have at least a dedicated certificate for admin role IMO.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 16:07:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-deployment-question/m-p/4976385#M585684</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-12T16:07:19Z</dc:date>
    </item>
  </channel>
</rss>

