11-14-2022 03:49 AM
Hi Guys,
I have a customer who is wanting to setup Guest and Sponsor Portals on their ISE (2.4 Patch 8). Both portals are configured to use the same Certificate Group Tag, the certificate is signed by Entrust and configured for Portal usage.
The guest portal is configured to use port 8443 on Gig 2
The sponsor portal is configured to use port 8443 on Gig 0 and using a FQDN (Internal DNS servers have been updated to resolve the ISE ip)
When a wireless client accesses the guest portal, everything works fine. However, when a client accesses the sponsor portal from the internal network, the ISE is presenting its admin certificate rather than the Entrust one. As such the client receives a certificate warning
Its as if the ISE is ignoring the certificate group tag that its been configured with.
Any idea on how to resolve this issue please?
Thanks
Scott
Solved! Go to Solution.
11-14-2022 07:50 AM
11-14-2022 06:10 AM
Yup really common issue on ISE. I usually put the sponsor portal URL as a SAN name in the admin certificate since ISE does a very strange redirection to the sponsor portal. It connects to standard HTTPS/443 first which uses the admin certificate.
11-14-2022 07:29 AM
Thanks for the reply.
So based on what you have said, I can create a self signed certificate, add the FQDN of the sponsor portal into the SAN and tick the admin usage box. Do i also need to tick the portal usage box?
11-14-2022 07:50 AM
11-14-2022 08:08 AM
Yes the admin portal is currently using a cert signed by their private CA
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide