<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198845#M1116056</link>
    <description>&lt;P&gt;The clients need to trust the certificate issuer of the certificate that ISE presents for EAP authentication. By default the endpoints would trust any of the large certificates providers, however, the issue in your case could be caused by the supplicant profile configuration that was pushed to endpoints. For instance, if the pushed provide via GPO has Entrust certificate selected from the Trusted Root Certification Authorities to be trusted then you would need to adjust that profile by selecting DigiCert certificate.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Sep 2024 13:55:43 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2024-09-25T13:55:43Z</dc:date>
    <item>
      <title>ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth cert</title>
      <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198443#M1116032</link>
      <description>&lt;P&gt;Recently we renewed Public CA certificate from Entrust to DigiCert for ISE system EAP Authentication, and since then, devices have been failing to authenticate via EAP-TLS. These devices obtain endpoint certificates through the BYOD portal.&amp;nbsp;This is happening for EAP-TLS auth only for those devices that got Endpoint Cert from ISE internal CA via BYOD onboarding portal, not for PEAP-MSCHAPv2. We use&amp;nbsp;ISE system EAP Authentication certs only for Auth purpose, there is another wildcard Digicert for Admin/portal/Radius DTLS that we renewed last week, Before it was issued from Entrust, this year we changed to Digicert. That is working perfectly. But This week when we changed EAp Auth Cert, problem started at same time after renew to renew CA cert.&lt;/P&gt;&lt;P&gt;I had a look at certs pack issued by ISE, saw it is pushing all ISE internal CA chains plus Entrust Root CA-G2. I think Root CA-G2 is causing issue. As soon as we changed to DigiCert, endpoint started failing as it doesn't have DigiCert chain in its store.&lt;/P&gt;&lt;P&gt;All fails are showing this log,12520 EAP-TLS failed SSL/TLS handshake because the client rejected the ISE local-certificate.&lt;/P&gt;&lt;P&gt;Please help to me get rid of this issue. we have hundreds of iPad devices online by this way, it is huge impact on business. We had to roll back to Entrust, it has just below 3 wks to expiry.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 23:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198443#M1116032</guid>
      <dc:creator>MMR16</dc:creator>
      <dc:date>2024-09-24T23:49:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth</title>
      <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198743#M1116047</link>
      <description>&lt;P&gt;Are CA chain is known by user ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 11:19:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198743#M1116047</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-25T11:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth</title>
      <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198756#M1116051</link>
      <description>&lt;P&gt;CA Chain must be known by user as it was issued from ISE internal CA, was working as usual. After roll back, again started working. Question is then what causing issue after EAP Auth cert renewal to DigiCert&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 11:49:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198756#M1116051</guid>
      <dc:creator>MMR16</dc:creator>
      <dc:date>2024-09-25T11:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth</title>
      <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198845#M1116056</link>
      <description>&lt;P&gt;The clients need to trust the certificate issuer of the certificate that ISE presents for EAP authentication. By default the endpoints would trust any of the large certificates providers, however, the issue in your case could be caused by the supplicant profile configuration that was pushed to endpoints. For instance, if the pushed provide via GPO has Entrust certificate selected from the Trusted Root Certification Authorities to be trusted then you would need to adjust that profile by selecting DigiCert certificate.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 13:55:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5198845#M1116056</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-09-25T13:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth</title>
      <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5199131#M1116060</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;Thanks for replying, we dont manage those device, they are BYOD. onboarding via BYOD portal. Client provisioning policies are pushing native supplicant profile where we push wifi profile and ISE internal Cert template. Not any EAP Auth cert&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 03:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5199131#M1116060</guid>
      <dc:creator>MMR16</dc:creator>
      <dc:date>2024-09-26T03:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth</title>
      <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5199264#M1116068</link>
      <description>&lt;P&gt;What settings do you push in the WiFi profile?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 08:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5199264#M1116068</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-09-26T08:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth</title>
      <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5199337#M1116078</link>
      <description>&lt;P&gt;Just SSID Name, WPA2, Allowed Protocol as TLS and ISE Internal CA Cert Template&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 11:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5199337#M1116078</guid>
      <dc:creator>MMR16</dc:creator>
      <dc:date>2024-09-26T11:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Internal CA issued EAP-TLS auth fails after renewing EAP Auth</title>
      <link>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5199951#M1116118</link>
      <description>&lt;P&gt;Then I think for some reason those BYOD devices are not trusting ISE DigiCert certificate that will be presented by ISE during the EAP negotiation. I'm not sure if replacing that DigiCert cert with a self-signed cert issued by ISE would work, I'm just thinking if these BYOD devices get their certs by ISE internal CA, maybe they will trust ISE self-signed cert during EAP negotiation?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2024 12:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ise-internal-ca-issued-eap-tls-auth-fails-after-renewing-eap/m-p/5199951#M1116118</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-09-27T12:01:03Z</dc:date>
    </item>
  </channel>
</rss>

