11-06-2019 01:26 AM
Hi Expert,
I'd like to know how to renew the 'VeriSign Class 2 Secure Server CA - G3 in Trusted Certificates.
My customer is using the ISE V2.3.7 and they said the above certificate will be expired on Feb 08, 2020 so they want to renew it before it expires.
Does anyone know what this certificate is for? From my checking, I couldn't find any related guide for that.
Thank in advance.
Jihye.
#Trusted Certificates
Solved! Go to Solution.
11-06-2019 02:19 AM - edited 11-06-2019 11:52 PM
Hi @Jihye Han
Certificates in the ISE Trusted Certificates are public certificates. Users do not (and cannot) renew these certificates. If users don't know why a certain certificate is in the Trusted Certificates store in ISE, then you should ignore them. Once they have expired, delete them. Cisco put those certs there but the list is far from complete. Cisco only chose to put a few Root CA certs into ISE but you can install all manner of CA certs (public or private CA's).
Certs in the Trusted Cert store are there to allow ISE to perform checks on the validity of certs that it encounters, potentially signed by those CA's in the Trusted Store. But regardless of that, once those trusted certs have expired, they are useless - delete them.
regards
Arne
11-22-2019 08:19 AM - edited 12-20-2019 04:08 AM
Here is a list of information we will be putting into the official ISE admin guide . we are also hoping to have a more comprehensive listing after the thanksgiving holiday here in the U.S. I will update then
CSCvr90534 Doc: A Document for description of default imported Trusted Certificates is necessary
Everything should be good here now! Take a look!
Do let me know if any further changes are required!
"VeriSign Class 3 Secure Server CA – G3" intermediate CA certificate that comes part of ISE by default in ISE for Cisco Services is expiring on Feb 2020.
The issuer of this certificate is "VeriSign Class 3 Public Primary Certification Authority - G5" and this Root CA is valid up to Wed, 16 Jul 2036. This Root CA certificate is trusted by default in ISE for Cisco Services.
"VeriSign Class 3 Secure Server CA – G3" is trusted for Cisco Services by default in ISE.
Cisco Services can be categorized to following items:
Posture, Profiler and Client Provisioning (Group 1). These are using a different certificate chain and not "VeriSign Class 3 Secure Server CA – G3".
Schedule a MW and follow the below guidelines to safely remove this certificate from ISE.
11-06-2019 02:19 AM - edited 11-06-2019 11:52 PM
Hi @Jihye Han
Certificates in the ISE Trusted Certificates are public certificates. Users do not (and cannot) renew these certificates. If users don't know why a certain certificate is in the Trusted Certificates store in ISE, then you should ignore them. Once they have expired, delete them. Cisco put those certs there but the list is far from complete. Cisco only chose to put a few Root CA certs into ISE but you can install all manner of CA certs (public or private CA's).
Certs in the Trusted Cert store are there to allow ISE to perform checks on the validity of certs that it encounters, potentially signed by those CA's in the Trusted Store. But regardless of that, once those trusted certs have expired, they are useless - delete them.
regards
Arne
11-06-2019 08:37 PM
Hi Arne,
Thank you for the great explanations.
I fully understood.
Best Regards,
Jihye.
11-07-2019 07:23 AM
I do not think this still in-use so should be safe to delete. It was imported earlier for one of our feed services because either cisco.com or ise.cisco.com or perfigo.com used to use certificates issued by that CA.
11-07-2019 07:20 AM
@Arne Bier wrote:
Hi @Jihye Han
Certificates in the ISE Trusted Certificates are public certificates. Users do not (and cannot) renew these certificates. If users don't know why a certain certificate is in the Trusted Certificates store in ISE, then you should ignore them. Once they have expired, delete them. Cisco put those certs there but the list is far from complete. Cisco only chose to put a few Root CA certs into ISE but you can install all manner of CA certs (public or private CA's).
Certs in the Trusted Cert store are there to allow ISE to perform checks on the validity of certs that it encounters, potentially signed by those CA's in the Trusted Store. But regardless of that, once those trusted certs have expired, they are useless - delete them.
regards
Arne
TRUE! also Cisco will update any roots that are critical to its needs on ISE in a patch when coming close to renewal time. Another reason to keep things fresh :)
11-12-2019 02:22 AM
Hello,
I currently have the same problem with a client, his "VeriSign Class 3 Secure Server CA - G3" certificate expires in February 2020. How do I know if he uses it? He would like to renew it, is it possible and how do we do it? According to your answer it is not possible to renew this certificate.
11-12-2019 01:53 PM
Hi
I suspect this is going to be a commonly asked question, because I also found this cert expiration warning on my ISE 2.4 system.
This cert was shipped with ISE, but since Cisco doesn't tell us why, it's anyone's guess. I may have seen mention things along the lines of, "ISE needed this cert back in the day to connect to Cisco Call Home, Smart Licensing, or Cisco Profiler Feed Service, or the BYOD Client Provisioning download feature etc." - all these features built into ISE that rely on a TLS connection to trust the end system. But this is a legacy cert and it doesn't appear to be needed for anything that ISE is doing internally.
As a proof point, I just deleted it and then tested all the "ISE Internet Services" that I could find - and they all still work.
Here's my advice. Before deleting this cert, export it through ISE GUI and then save the file somewhere in case you need it in the next 90 days before it expires. Once the cert has expired, it's no good to anyone. So then you may as well delete it. But if you want to prove to customer that deleting the cert won't break anything, then save a copy before deleting it. If something breaks then they can re-install it and then you'll know what it's for. It's highly unlikely that your customer needs this cert.
11-12-2019 04:23 PM
11-22-2019 08:19 AM - edited 12-20-2019 04:08 AM
Here is a list of information we will be putting into the official ISE admin guide . we are also hoping to have a more comprehensive listing after the thanksgiving holiday here in the U.S. I will update then
CSCvr90534 Doc: A Document for description of default imported Trusted Certificates is necessary
Everything should be good here now! Take a look!
Do let me know if any further changes are required!
"VeriSign Class 3 Secure Server CA – G3" intermediate CA certificate that comes part of ISE by default in ISE for Cisco Services is expiring on Feb 2020.
The issuer of this certificate is "VeriSign Class 3 Public Primary Certification Authority - G5" and this Root CA is valid up to Wed, 16 Jul 2036. This Root CA certificate is trusted by default in ISE for Cisco Services.
"VeriSign Class 3 Secure Server CA – G3" is trusted for Cisco Services by default in ISE.
Cisco Services can be categorized to following items:
Posture, Profiler and Client Provisioning (Group 1). These are using a different certificate chain and not "VeriSign Class 3 Secure Server CA – G3".
Schedule a MW and follow the below guidelines to safely remove this certificate from ISE.
12-18-2019 01:22 AM
Hi
Are there any validated, detaild information about the "VeriSign Class 3 Secure Server CA – G3" Certificate?
As @Jason Kunst mentioned, It is "possible" that following services can be internally using this trust certificate.
How should customers and partners intepret this statement "possible"?
- Does not Cisco know if what exactly the different Trusted Certificates within ISE is used for- related to PxGrid, TC-NAC and so on?
- or Is this something customers them selves can configure to use explicit for TC-NAC? - "How would this typically be done"
Somehow i intepret the answer as: "we have no clue what we are doing - but disable it and see what happends..."
12-18-2019 10:10 AM
12-20-2019 03:29 AM
I would have expected a Cisco Field Notice for this since it affects every version of ISE I have come across - at least 2.2 and onwards. (it’s even shipping in ISE 2.7)
Surely a patch would be released to remove this cert?
FYI: Another major Wireless vendor sent out a field notice today about this same issue.
12-21-2019 06:55 AM
@Arne Bier wrote:
I would have expected a Cisco Field Notice for this since it affects every version of ISE I have come across - at least 2.2 and onwards. (it’s even shipping in ISE 2.7)
Surely a patch would be released to remove this cert?
FYI: Another major Wireless vendor sent out a field notice today about this same issue.
will see what we can do, for now the guidance is in the guides
01-17-2020 08:46 AM
Thanks Arne for your response on this! Wish there was a field notice from Cisco regarding this as it impacts all the ISE customers!
01-27-2020 06:54 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide