<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.3 with intermediate certificate in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554061#M89611</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Is there a way to provide all the necessary intermediate certificates to an ACS v5.3 so that it can provide the full chain to the client during a 802.1x PEAP authentication?&lt;/P&gt;&lt;P&gt;Already tried to install the EAP certificate with the chain and also installed the issuing CA as trusted root. I know that installing it as trusted root shouldn't have any effect but that's the way how Cisco solved it on the ASA platforms.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 04:51:04 GMT</pubDate>
    <dc:creator>ROBERTO GIANA</dc:creator>
    <dc:date>2019-03-11T04:51:04Z</dc:date>
    <item>
      <title>ACS 5.3 with intermediate certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554061#M89611</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Is there a way to provide all the necessary intermediate certificates to an ACS v5.3 so that it can provide the full chain to the client during a 802.1x PEAP authentication?&lt;/P&gt;&lt;P&gt;Already tried to install the EAP certificate with the chain and also installed the issuing CA as trusted root. I know that installing it as trusted root shouldn't have any effect but that's the way how Cisco solved it on the ASA platforms.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554061#M89611</guid>
      <dc:creator>ROBERTO GIANA</dc:creator>
      <dc:date>2019-03-11T04:51:04Z</dc:date>
    </item>
    <item>
      <title>Hi,ACS will never supply</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554062#M89612</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ACS will never supply certificates to clients on a PEAP certificate challenege.&lt;/P&gt;&lt;P&gt;It will only propose the ACS certificate for verification (not for install).&lt;/P&gt;&lt;P&gt;The client should have the intermediate and root installed beforehand to make this work.&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 19:25:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554062#M89612</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-07-03T19:25:00Z</dc:date>
    </item>
    <item>
      <title>Hi EdIf you get a certificate</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554063#M89613</link>
      <description>&lt;P&gt;Hi Ed&lt;/P&gt;&lt;P&gt;If you get a certificate e.g. from Verisign it will be issued from a subordinate and not from the root itself. So if you want to do PEAP-MS-CHAP with an unmanaged client who has only the root certificates installed and is configured to verify the server certificate during the PEAP TLS tunnel establishment you will need to provide the whole cert chain to the client, so it can establish the trust link up to the root. So there must be a way of providing the whole chain. Otherwise the ACS is useless for authentication with unmanaged clients who verify the server certificate.&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;Roberto&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2014 13:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554063#M89613</guid>
      <dc:creator>ROBERTO GIANA</dc:creator>
      <dc:date>2014-07-07T13:54:51Z</dc:date>
    </item>
    <item>
      <title>Unfortunately, any radius</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554064#M89614</link>
      <description>&lt;P&gt;Unfortunately, any radius server (not just the ACS) will be not be able to supply the certificate (intermediate or root) for installation to the client during the PEAP tunnel process as that is not as per RFC.&lt;/P&gt;&lt;P&gt;There is some additional feature to facilitate this on Cisco ISE, but only an ISE expert can comment on that.&lt;/P&gt;&lt;P&gt;Could you elaborate, on unmanaged client?&lt;/P&gt;&lt;P&gt;What type of client would this be, is this a BYOD environment?&lt;/P&gt;&lt;P&gt;Rate if Useful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Sharing knowledge makes you Immortal.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2014 17:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554064#M89614</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-07-07T17:58:19Z</dc:date>
    </item>
    <item>
      <title>Hi EdIt's not about</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554065#M89615</link>
      <description>&lt;P&gt;Hi Ed&lt;/P&gt;&lt;P&gt;It's not about INSTALLING a certificate. It's about providing the whole chain during authentication so that the client can establish itself the link to the responsible root. As any well managed webserver should do who runs on HTTPS.&lt;/P&gt;&lt;P&gt;Here the wireshark example of a TLS tunnel to https://supportforums.cisco.com/&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/supportforums.cisco_.com_.png" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And we need the ACS to behave the same during the establishment of the TLS tunnel during a PEAP authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Roberto&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2014 14:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554065#M89615</guid>
      <dc:creator>ROBERTO GIANA</dc:creator>
      <dc:date>2014-07-09T14:22:41Z</dc:date>
    </item>
    <item>
      <title>Roberto,Do you have a capture</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554066#M89616</link>
      <description>&lt;P&gt;Roberto,&lt;/P&gt;&lt;P&gt;Do you have a capture with ACS?&lt;/P&gt;&lt;P&gt;If not, I will test it out.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 00:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554066#M89616</guid>
      <dc:creator>edwardcollins7</dc:creator>
      <dc:date>2014-07-15T00:06:03Z</dc:date>
    </item>
    <item>
      <title>Hi EdUnfortunately I don't</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554067#M89617</link>
      <description>&lt;P&gt;Hi Ed&lt;/P&gt;&lt;P&gt;Unfortunately I don't have a capture, as I don't have access to the network infrastructure between the ACS and the WLC. And Wireshark doesn't capture the PEAP authentication on my wireless NIC during the connection phase.&lt;/P&gt;&lt;P&gt;If you can give it a try it would be great. But from my current tests the ACS doesn't seem to do that, as the clients without the intermediates refuse to talk to the "RADIUS server", as they can't verify it's identity against a trusted root. With the intermediate cert locally installed they work well and trust the "RADIUS Server".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Roberto&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 13:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554067#M89617</guid>
      <dc:creator>ROBERTO GIANA</dc:creator>
      <dc:date>2014-07-15T13:58:52Z</dc:date>
    </item>
    <item>
      <title>The ICA will be only provided</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554068#M89618</link>
      <description>&lt;P&gt;The ICA will be only provided if the ICA is added to the CA list under:&lt;/P&gt;&lt;P&gt;Users and Identity Stores --&amp;gt; Certificate Authorities&lt;/P&gt;&lt;P&gt;After that the correct cert chain will be present in the PEAP process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 08:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-3-with-intermediate-certificate/m-p/2554068#M89618</guid>
      <dc:creator>regumbala</dc:creator>
      <dc:date>2014-10-16T08:52:02Z</dc:date>
    </item>
  </channel>
</rss>

