<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate contains bad Common Name &amp;amp; SAN Values during CSR r in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258387#M594852</link>
    <description>&lt;P&gt;Hello Scott. Thank you for your answer.&lt;/P&gt;&lt;P&gt;There is another question then:&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a DNS A record for &lt;STRONG&gt;ise01.company.local.net.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Mainly, we will use the certificate based on the CSR request we still can't get for EAP authentication (wireless and wired).&lt;/P&gt;&lt;P&gt;The question is: Won't it be a problem having different SAN from CN for the dot1x authentication.&lt;/P&gt;&lt;P&gt;For example: If in my new CSR the CN would be &lt;STRONG&gt;ise01.company.local.net&amp;nbsp;&lt;/STRONG&gt;and the SAN of the very same CSR would be like &lt;STRONG&gt;ise-01.company.local.net.&amp;nbsp;&lt;/STRONG&gt;Would it cause problems during checking the certificate for example in EAP-TLS Authentication?&amp;nbsp;&lt;BR /&gt;And what would be if I just skip the warning and just create the new one CSR request and sign it with my Subordinate CA?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;P.S. I tried to re-generate the CSR with the sam CN and SAN and get the next error. Error is in the attachment.&amp;nbsp;&lt;BR /&gt;What should I do next? Delete the current certificate for EAP auth and regenerate the new CSR?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 09 Feb 2025 14:22:52 GMT</pubDate>
    <dc:creator>Darnitsa Admin</dc:creator>
    <dc:date>2025-02-09T14:22:52Z</dc:date>
    <item>
      <title>Certificate contains bad Common Name &amp; SAN Values during CSR request</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258222#M594835</link>
      <description>&lt;P&gt;Hello there.&lt;/P&gt;&lt;P&gt;I have a problem during generating CSR request on my Standalone Cisco ISE node.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Previously, I have configured the CSR and obtained the proper one from my enterpise CA, BUT the CA which signed the CSR was Root CA and now we have Subordinate CA by means of which I have to sign the new CSR, obtain new certificate and put it for EAP authentication.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the thing. When I try to generate new CSR the error appear every time: &lt;STRONG&gt;'WARNING!&amp;nbsp;Certificate contains bad Common Name &amp;amp; SAN Values 'ise01.company.local.net,ise01.company.local.net'.Please confirm still you want to proceed.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I have got no clue why the error shows up. I suppose it's because of the existing one certificate issued to the node &lt;STRONG&gt;ise01.company.local.net&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We did the same thing in lab and everythin worked fine. Any suggestion?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Cisco ISE version&amp;nbsp;&lt;SPAN&gt;3.2.0.542&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;Patch Information: 1,2,3,4,5,6,7&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Role: STANDALONE&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;ADE-OS Version: 3.2.0.401&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 08 Feb 2025 11:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258222#M594835</guid>
      <dc:creator>Darnitsa Admin</dc:creator>
      <dc:date>2025-02-08T11:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate contains bad Common Name &amp; SAN Values during CSR r</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258271#M594843</link>
      <description>&lt;P&gt;You can always generate the cert from the other node if the FQDN is in the SAN.&amp;nbsp; What I had to do since we have a lot of nodes and dev nodes, is I just create a CSR using openssl with a CN like &lt;STRONG&gt;ise.comany.com&lt;/STRONG&gt; and then the fqdn of each of the nodes. Also, you don't have to have the CN you use in the SAN.&lt;/P&gt;
&lt;P&gt;ise-001.company.com&lt;BR /&gt;ise-002.company.com&lt;BR /&gt;ise-dev-001.company.com&lt;BR /&gt;ise-test-001.company.com&lt;/P&gt;
&lt;P&gt;That way I can use the cert on all my nodes.&lt;/P&gt;
&lt;P&gt;You can generate something like this:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;CN=ise.company.local.net --&amp;gt; Make sure you have DNS pointing to the IP of your PAN&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SAN=ise01.company.local.net,ise02.company.local.net,ise03.company.local.net&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 08 Feb 2025 17:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258271#M594843</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-02-08T17:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate contains bad Common Name &amp; SAN Values during CSR r</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258387#M594852</link>
      <description>&lt;P&gt;Hello Scott. Thank you for your answer.&lt;/P&gt;&lt;P&gt;There is another question then:&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a DNS A record for &lt;STRONG&gt;ise01.company.local.net.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Mainly, we will use the certificate based on the CSR request we still can't get for EAP authentication (wireless and wired).&lt;/P&gt;&lt;P&gt;The question is: Won't it be a problem having different SAN from CN for the dot1x authentication.&lt;/P&gt;&lt;P&gt;For example: If in my new CSR the CN would be &lt;STRONG&gt;ise01.company.local.net&amp;nbsp;&lt;/STRONG&gt;and the SAN of the very same CSR would be like &lt;STRONG&gt;ise-01.company.local.net.&amp;nbsp;&lt;/STRONG&gt;Would it cause problems during checking the certificate for example in EAP-TLS Authentication?&amp;nbsp;&lt;BR /&gt;And what would be if I just skip the warning and just create the new one CSR request and sign it with my Subordinate CA?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;P.S. I tried to re-generate the CSR with the sam CN and SAN and get the next error. Error is in the attachment.&amp;nbsp;&lt;BR /&gt;What should I do next? Delete the current certificate for EAP auth and regenerate the new CSR?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 14:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258387#M594852</guid>
      <dc:creator>Darnitsa Admin</dc:creator>
      <dc:date>2025-02-09T14:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate contains bad Common Name &amp; SAN Values during CSR r</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258423#M594853</link>
      <description>&lt;P&gt;Keep in mind that the CN or common name is just what it means a common DNS you can use to point to your PAN. If you only have one node, then you don’t need any SAN unless you want to have multiple DNS for the PAN as an example and that is okay.&amp;nbsp;&lt;BR /&gt;you need to validate that the root ca and intermediate ca’s are on the endpoints as that is the only way they will trust ISE. I have like 60+ in the SAN entry and it’s not a problem. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 16:01:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258423#M594853</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-02-09T16:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate contains bad Common Name &amp; SAN Values during CSR r</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258542#M594858</link>
      <description>&lt;P&gt;So, the solution will be like having RootCA and SubCA as Trusted Certs on ISE and Client. Generate new CSR on ISE to sign it by SubCA for EAP Authentication filling fields of CN and (if needed) SAN values. And it will be ok for dot1x auth for wired as well as for wirelss? Am I right?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 05:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258542#M594858</guid>
      <dc:creator>Darnitsa Admin</dc:creator>
      <dc:date>2025-02-10T05:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate contains bad Common Name &amp; SAN Values during CSR r</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258779#M594874</link>
      <description>&lt;P&gt;This is how I would phrase it.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ISE will need to have the root ca &amp;amp; intermediate ca(s) that the client uses in the trusted certificate store&lt;/LI&gt;
&lt;LI&gt;The client will need to have the root ca &amp;amp; intermediate ca(s) that ISE uses in the trusted root CA and trusted intermediate CA.&lt;/LI&gt;
&lt;LI&gt;If you have multiple nodes and want to just have one certificate for all nodes:
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;Create a CN like&amp;nbsp;&lt;STRONG&gt;ise.company.local.net &amp;lt;-- This will resolve in DNS to your PAN&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Create SAN's for the FQDN or all your other nodes&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;If you only have one node:
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;Create the CN using the FQDN for that node&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;No SAN is required&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Will this work for EAP... YES, it can also work for your admin so you don't get a cert error.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 10 Feb 2025 16:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5258779#M594874</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-02-10T16:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate contains bad Common Name &amp; SAN Values during CSR r</title>
      <link>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5373636#M599921</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326193"&gt;@Scott Fella&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thank you for the thorough and detailed responses you provided in the thread, they were very helpful.&lt;/P&gt;&lt;P&gt;A possible alternative solution for the certificates used by ISE, specifically for EAP, would be not to create the DNS record at all. In this case, a generic FQDN such as “ise-cluster.customer-domain.com” can still be included in both the CN and SAN fields of the certificate, even if it does not exist within the DNS servers.&lt;/P&gt;&lt;P&gt;For authentication purposes, the absence of the corresponding DNS record will not cause any issues.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2026 16:29:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/certificate-contains-bad-common-name-amp-san-values-during-csr/m-p/5373636#M599921</guid>
      <dc:creator>bassomarco1998</dc:creator>
      <dc:date>2026-03-01T16:29:19Z</dc:date>
    </item>
  </channel>
</rss>

