04-30-2020 03:58 AM
I have a Cisco ISE running version 2.3 and I need to upgrade to 2.6
The bundle has been downloaded to the nodes but the upgrade fails because the Default self-signed certificate is expired.
I wanted to renew it but I can't find it in the system certificates tab, I only find it in the trusted certificates tab.
So, is there any way to renew it?
04-30-2020 05:34 AM
How many nodes and which one's self-signed is expired?
If the nodes are all using self-signed certificates each will have its own in system certificates and others in trusted certificates. You need to look under the each node to find its associated self-signed certificate.
(Moving thread to NAC Forum)
04-30-2020 06:09 AM
04-30-2020 06:27 AM
If the cert that has expired does not exist in either of your two ISE nodes under System Certs, and in particular, for the Admin purpose , then you can safely delete the expired cert from the Trusted Certs section. It’s probably an orphan, back from when the system was first built using the Admin cert of Node2 and imported into Node1 to allow Registration to go through. It’s bad practice, but everyone has had to do it from time to time.
04-30-2020 06:43 AM
04-30-2020 02:42 PM - edited 04-30-2020 03:49 PM
Oh that old chestnut :-(
For the remote logging target, simply select another CA cert valid from the drop down list. That tells ISE which cert to use to check the cert from the other end of the TCP connection during TLS establishment. If you have setup secure SYSLOG, then ISE needs to trust the other end of the secure connection.
Then you should be able to delete the expired cert.
Update 1 May 2020: The same thing happened to me today on a fresh ISE 2.6 patch 6 install. I had to create an ISE Cluster using self-signed certs because the PKI guys had not given me a proper cert yet. Once I had the signed Admin certs from the PKI Root CA, I installed those. What happened next surprised me. In the Trusted Certs I now was ISE01 self-signed cert? Why??? I had put ISE02 self-signed cert there to allow me to register the ISE02 node. Weird. And despite me choosing the PKI Root CA for the Secure Logging, ISE refused to allow me delete the useless ISE01 self-signed cert from the Trust Store. So I tried this, and it worked: Under System Certs, Generate Self-Signed Cert and select the roles of the cert assigned to the cert that is refusing to be deleted - in my case it was EAP/RADIUS-DTLS/Portal. Once I had done that, it fixed the issue and I could delete ISE01 self-signed cert from Trust Store.
04-30-2020 08:54 AM
04-30-2020 09:02 AM
04-30-2020 06:44 PM
05-04-2020 12:45 AM
05-04-2020 01:52 AM
Hi Samer,
I believe you are facing the same issue as below:
Please open TAC case to remove this syslog log target via root access
05-02-2020 08:26 PM
Please try deleting the remote syslog target, but get the list of logging categories that it targeting to so you may re-add it back if needed.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide