09-15-2021 09:12 PM
Hi all,
I have noticed in the ISE 3.0 Post Upgrade notes that it mentions that the Root CA chain must be regenerated.
Cisco ISE 3.0 Upgrade Guide: Post-Upgrade Tasks - Cisco
My question is two fold:
I am wary of the impact this may cause,, as the customer this upgrade is for has tens of thousands of endpoints with ISE supplied certificates
Cheers,
Michael
Solved! Go to Solution.
09-16-2021 03:26 PM
When you re-generate the Internal CA Root Chain, ISE does not delete the old one automatically. As long as ISE retains the old Root Chain, it will trust certificates presented by the endpoints with identity certificates signed by that chain.
09-15-2022 02:10 AM
09-16-2021 03:26 PM
When you re-generate the Internal CA Root Chain, ISE does not delete the old one automatically. As long as ISE retains the old Root Chain, it will trust certificates presented by the endpoints with identity certificates signed by that chain.
08-15-2022 01:35 PM
After upgrading from 2.7 to 3.1. I'm now receiving the Queue Link Error. Cisco advised to replace the Internal Root CA. I wonder if that's our case. We have 2 nodes and they in sync. ISE messaging is up and running and under Internal CA settings, the internal CA authority is up for both nodes. Will this affect the certificate installed in the workstations? Our used signed by the local CA of the company.
Thanks, JC
09-14-2022 01:11 PM
Question, does regenerating the ISE Root CA require or cause a reboot of the ISE appliance?
09-15-2022 02:10 AM
No
09-15-2022 06:16 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide