<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New ISE node not trusted in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220444#M593015</link>
    <description>&lt;P&gt;If you have the root CA and/or intermediate CA certificates available in the clients trusted store it doesn't necessarily mean that the client will use them during the dot1x authentication because if the supplicant dot1x profile is not configured with the trusted certificates required the client won't use them. So I would recommend reviewing the supplicant configuration and ensure that you have all the trusted certificates selected from the trusted certificates list.&lt;/P&gt;</description>
    <pubDate>Tue, 05 Nov 2024 15:03:53 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2024-11-05T15:03:53Z</dc:date>
    <item>
      <title>New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5219971#M592996</link>
      <description>&lt;P&gt;I have stood up a new ISE node (3.1 p9) at a backup site.&amp;nbsp; While testing wired radius (eap-tls)&amp;nbsp; it looks like the client is not trusting that node. The same client works with the current nodes at the main site.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The new node does have a system certificate signed by a different root and intermediary CA, but both of those are in the devices trusted certificate stores.&lt;/P&gt;&lt;P&gt;I'm going to test unchecking "Verify the server’s identity by validating the certificate" to see if it will successfully authenticate like that, but I'm not permitted to have the clients set up like that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone run into this issue and has a solution or can point me in a direction to look into?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Nov 2024 21:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5219971#M592996</guid>
      <dc:creator>millhouse64</dc:creator>
      <dc:date>2024-11-04T21:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220040#M592999</link>
      <description>&lt;P&gt;Every ISE node has its own, independent EAP Server certificate.&amp;nbsp; The new ISE node that you have stood up must have an EAP System Certificate that is generated by the CA chain that your clients trust.&amp;nbsp; The new ISE node is probably still running off the default self-signed cert, or it was not generated correctly.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 03:05:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220040#M592999</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-11-05T03:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220392#M593006</link>
      <description>&lt;P&gt;Probably the issue is caused by the supplicant profiles configuration on the clients that do not have the new issuer CA certificate selected.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 14:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220392#M593006</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-11-05T14:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220414#M593009</link>
      <description>&lt;P&gt;I know I'm not using the delf signed certificate--It's possible it wasn't generated correctly since I have to send the CSR to a different office to be signed&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 14:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220414#M593009</guid>
      <dc:creator>millhouse64</dc:creator>
      <dc:date>2024-11-05T14:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220420#M593011</link>
      <description>&lt;P&gt;I have been leaning towards this being a supplicant issue.&amp;nbsp; The certificates path is in the trusted stores of the client.&amp;nbsp; Is that different from what you are saying about selecting the new issuer?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 14:45:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220420#M593011</guid>
      <dc:creator>millhouse64</dc:creator>
      <dc:date>2024-11-05T14:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220422#M593012</link>
      <description>&lt;P&gt;Curious why you are still deploying 3.1?&amp;nbsp; Why is a different CA being used for this node?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 14:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220422#M593012</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-11-05T14:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220435#M593014</link>
      <description>&lt;P&gt;I am looking into going to 3.2 since I've heard that's less 'buggy' just have had too many projects going on to put any real time into that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have to go through a different office to get the certificates signed.&amp;nbsp; I did ask if they were able to choose what root signs the cert and they said no.&amp;nbsp; &amp;nbsp;I have been thinking I'll get another cert signed for all the nodes from the new CA, but I'm a bit reluctant since it isn't working on with the new node&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 14:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220435#M593014</guid>
      <dc:creator>millhouse64</dc:creator>
      <dc:date>2024-11-05T14:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220444#M593015</link>
      <description>&lt;P&gt;If you have the root CA and/or intermediate CA certificates available in the clients trusted store it doesn't necessarily mean that the client will use them during the dot1x authentication because if the supplicant dot1x profile is not configured with the trusted certificates required the client won't use them. So I would recommend reviewing the supplicant configuration and ensure that you have all the trusted certificates selected from the trusted certificates list.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 15:03:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220444#M593015</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-11-05T15:03:53Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220451#M593016</link>
      <description>&lt;P&gt;From who?&amp;nbsp; 3.3 and 3.4 contain very large performance optimizations as compared to 3.2 and before.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 15:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220451#M593016</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-11-05T15:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220537#M593018</link>
      <description>&lt;P&gt;One of our vendors I was working on a project with.&amp;nbsp; Like I said I haven't put much time into looking at an upgrade yet;&amp;nbsp; I'm also government so I'll have to see what's approved before upgrading (and we tend to be horrible about staying 'current' with tech)&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 17:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220537#M593018</guid>
      <dc:creator>millhouse64</dc:creator>
      <dc:date>2024-11-05T17:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: New ISE node not trusted</title>
      <link>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220544#M593019</link>
      <description>&lt;P&gt;If it takes you a while to keep/stay updated then I would not deploy on 3.2 then.&amp;nbsp; 3.4 will give you the longest life-time until the next major upgrade is needed.&amp;nbsp; It also contains the most performance improvements with related to service start time.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 17:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/new-ise-node-not-trusted/m-p/5220544#M593019</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2024-11-05T17:35:50Z</dc:date>
    </item>
  </channel>
</rss>

