<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE node FQDN domain different from certificate CN and SANs domain in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264051#M595164</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;How did you manage to create an Admin/EAP cert that contains two different DNS domains?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The certificate for Admin/EAP/Radius DTLS is from their internal CA and contains DNS SANs fields using&lt;/P&gt;
&lt;P&gt;isenode1.mycompany.com&lt;/P&gt;
&lt;P&gt;isenode2.mycompany.com&lt;/P&gt;
&lt;P&gt;guestportal1.&lt;FONT color="#FF0000"&gt;notmyAD.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;guestportal2.&lt;FONT color="#FF0000"&gt;notmyAD.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;That should be technically impossible to do.&amp;nbsp; Your Admin/EAP certificate should only contain mycompany.com SAN entries.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;The portal cert should contain notmyAD.com SAN entries. If it's a re-used wildcard cert then it should be fine for Guest Portals. Else, customers usually create a multi-SAN cert that contains these in the DNS SAN fields&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;guestportal1.notmyAD.com&lt;BR /&gt;guestportal2.notmyAD.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Please don't change your ISE deployment DNS domain from mycompany.com to notmyAD.com - that is not necessary.&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Guest Portals operate by using DNS to resolve&amp;nbsp;guestportal1.notmyAD.com and&amp;nbsp;guestportal2.notmyAD.com to the IP address of&amp;nbsp;isenode1.mycompany.com and&amp;nbsp;isenode2.mycompany.com respectively.&amp;nbsp; That's a job for the client's DNS resolver - the DHCP scope must provide a DNS server that can successfully resolve that.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 23 Feb 2025 22:22:44 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2025-02-23T22:22:44Z</dc:date>
    <item>
      <title>ISE node FQDN domain different from certificate CN and SANs domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5263579#M595123</link>
      <description>&lt;P&gt;Running ISE 3.3 with 2 nodes running all personas with Active Directory join&lt;/P&gt;
&lt;P&gt;AD example = mycompany.com&lt;/P&gt;
&lt;P&gt;The certificate for Admin/EAP/Radius DTLS is from their internal CA and contains DNS SANs fields using&lt;/P&gt;
&lt;P&gt;isenode1.mycompany.com&lt;/P&gt;
&lt;P&gt;isenode2.mycompany.com&lt;/P&gt;
&lt;P&gt;guestportal1.notmyAD.com&lt;/P&gt;
&lt;P&gt;guestportal2.notmyAD.com&lt;/P&gt;
&lt;P&gt;Their Guest Portal certificate is from 3&lt;SUP&gt;rd&lt;/SUP&gt; party CA and has CN of *.notmyAD.com as well as the following DNS SANs&lt;/P&gt;
&lt;P&gt;guestportal1.notmyAD.com&lt;/P&gt;
&lt;P&gt;guestportal2.notmyAD.com&lt;/P&gt;
&lt;P&gt;mydevices.notmyAD.com&lt;/P&gt;
&lt;P&gt;*.notmyAD.com&lt;/P&gt;
&lt;P&gt;The internal admin/eap certificate is on both nodes.&lt;/P&gt;
&lt;P&gt;The guest certificate only resides on ise node 1.&lt;/P&gt;
&lt;P&gt;When they export the guest certificate from node 1 and try to import it into node 2 they’ve run into issues related to ISE actual FQDN being in a different domain than the CN or SANs.&lt;/P&gt;
&lt;P&gt;I’m not sure how it was ever installed into Node1&lt;/P&gt;
&lt;P&gt;While their AD is mycompany.com, their email addresses are user@notmyAD.com&lt;/P&gt;
&lt;P&gt;Looking for recommendations on resolution.&amp;nbsp; I think we need to change the domain on the ISE nodes from mycompany.com to notmyAD.com and regenerate certificates?&amp;nbsp; Is there a better alternative?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 16:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5263579#M595123</guid>
      <dc:creator>cherie13653</dc:creator>
      <dc:date>2025-02-21T16:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node FQDN domain different from certificate CN and SANs domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264051#M595164</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;How did you manage to create an Admin/EAP cert that contains two different DNS domains?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The certificate for Admin/EAP/Radius DTLS is from their internal CA and contains DNS SANs fields using&lt;/P&gt;
&lt;P&gt;isenode1.mycompany.com&lt;/P&gt;
&lt;P&gt;isenode2.mycompany.com&lt;/P&gt;
&lt;P&gt;guestportal1.&lt;FONT color="#FF0000"&gt;notmyAD.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;guestportal2.&lt;FONT color="#FF0000"&gt;notmyAD.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;That should be technically impossible to do.&amp;nbsp; Your Admin/EAP certificate should only contain mycompany.com SAN entries.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;The portal cert should contain notmyAD.com SAN entries. If it's a re-used wildcard cert then it should be fine for Guest Portals. Else, customers usually create a multi-SAN cert that contains these in the DNS SAN fields&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;guestportal1.notmyAD.com&lt;BR /&gt;guestportal2.notmyAD.com&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Please don't change your ISE deployment DNS domain from mycompany.com to notmyAD.com - that is not necessary.&amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;Guest Portals operate by using DNS to resolve&amp;nbsp;guestportal1.notmyAD.com and&amp;nbsp;guestportal2.notmyAD.com to the IP address of&amp;nbsp;isenode1.mycompany.com and&amp;nbsp;isenode2.mycompany.com respectively.&amp;nbsp; That's a job for the client's DNS resolver - the DHCP scope must provide a DNS server that can successfully resolve that.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 22:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264051#M595164</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-02-23T22:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node FQDN domain different from certificate CN and SANs domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264069#M595166</link>
      <description>&lt;P&gt;It is possible to submit a CSR and get a cert because we used to have the same a while back during some mergers.&amp;nbsp; We don't now, but our AD now has trust to all the other domains. &lt;BR /&gt;I did just test this in my home lab using openssl with a Windows CA and successfully installed the cert in my ISE 3.4 node.&amp;nbsp; I didn't apply it to my admin, but I may try to do that on a test node just to see.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ScottFella_0-1740356346380.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/240461i3B716757287416A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="ScottFella_0-1740356346380.png" alt="ScottFella_0-1740356346380.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 00:21:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264069#M595166</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-02-24T00:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node FQDN domain different from certificate CN and SANs domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264096#M595168</link>
      <description>&lt;P&gt;In openssl you can create whatever you like, but a public CA should not have the ability to create a certificate that represents an internal domain which has its own PKI, and for which the internal PKI should be issuing certs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;When you import a cert into ISE, it doesn't check the SAN to see if what you put there is sane.&amp;nbsp; Although, I think for guest portals, newer ISE versions try to be clever and reconcile the portal FQDN with one or more SAN entries - but it can't be sure whether any of this is valid and mostly gets it wrong (stating that a valid cert for a valid portal is 'Stale')&lt;BR /&gt;&lt;BR /&gt;A trustworthy CA can/should only issue certs for a domain for which it has obtained proof that the CSR requester owns the public domain (e.g. public DNS TXT record).&amp;nbsp; If an organization is putting its internal domains on the internet to allow CAs to validate it, then that sounds like a terrible idea to me.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I can create a cert in my home lab with a SAN: &lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="http://www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;- but it doesn't mean I can make your browser trust that, even if I could poison the DNS and send you to my rogue server, running that cert for that domain.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 04:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264096#M595168</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-02-24T04:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE node FQDN domain different from certificate CN and SANs domain</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264099#M595170</link>
      <description>&lt;P&gt;You are right, I took the OP as stating that their internal cert provided a cert with the internal domain and another domain but not a public domain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 04:53:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-node-fqdn-domain-different-from-certificate-cn-and-sans/m-p/5264099#M595170</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-02-24T04:53:21Z</dc:date>
    </item>
  </channel>
</rss>

