11-10-2021 03:08 AM - edited 11-11-2021 01:06 AM
Hello,
I am having an issue with expired Certificate and the users can't login with their credentials in the internal wifi. When they try to connect, they get a generic error "Can't connect to this network". I checked the windows events (attached windows_events_error.PNG) and I got a more specific error : "eap root cause string: windows cannot connect to this network. There is a problem with the certificate on the server required for authentication"
I checked on ISE and indeed there is a certificate, which is signed by CA, is expired.
I would like to ask how can i find if this expired certificate is used by a policy ?
Also, can i renew somehow the expired certificate, like the self-signed, or i have to create from scratch a new CSR and send it to CA?
Finally, is it necessary to have a signed certificate from a CA or can i have the same functionality with a self-signed certificate ?
Thanks
Solved! Go to Solution.
11-15-2021 01:26 PM
See How To Implement Digital Certificates in ISE.
If the EAP certificate is expired, any 802.1x sessions (PEAP, EAP-TLS, etc) where the server certificate needs to be trusted by the client will fail.
As per the guide, self-signed certificates should not be used in Production so the ISE EAP certificate should be issued by an Enterprise CA for which the clients already have the trust chain installed. The client supplicant should be configured to trust that root CA.
11-23-2021 01:53 PM
ISE does not have the ability to directly renew CA-signed certificates, so it depends entirely on the CA in use. You cannot import a CA-signed identity certificate into ISE without the private key. When creating a CSR in ISE, ISE automatically generates a private key. Only after the signed cert is bound to the CSR can the private key be exported (with the certificate).
If the CA allows you to renew the current certificate and export the private key without submitting a CSR, that should be fine. If not, you would need to create a new CSR and use that to get a new certificate from the CA.
11-15-2021 01:26 PM
See How To Implement Digital Certificates in ISE.
If the EAP certificate is expired, any 802.1x sessions (PEAP, EAP-TLS, etc) where the server certificate needs to be trusted by the client will fail.
As per the guide, self-signed certificates should not be used in Production so the ISE EAP certificate should be issued by an Enterprise CA for which the clients already have the trust chain installed. The client supplicant should be configured to trust that root CA.
11-16-2021 12:27 AM
When I generate a new CSR, send it to CA to sign it and import back the signed certificate into ISE, should i adjust the policy for the internal wifi to match the new certificate or there is not need for anything more?
Also, i found the option "Allow Authentication of expired certificates to allow certificate renewal in Authorization policy" under the "Allowed Protocols". Is it something that i could temporarily use to solve the current issue or it could cause any side effects ?
11-16-2021 01:50 PM
I'm not sure what you mean by 'adjust the policy for the internal wifi'. If you are matching on values in the certificate that will have changed with the new certificate (e.g. Issuer CN, Serial Number, etc) in the ISE Policy Sets, or AuthC/AuthZ Policies, then those will need to be updated as well.
The 'Allow Authentication of expired certificates' option only applies if the supplicant supports allowing expired certs. Many vendors (including Windows) native supplicants do not support it.
11-16-2021 02:29 PM
In the policy that is related with the access in the internal (private) wifi of the company, there is not (any obvious) indication that it is somehow connected with the expired certificate.
When i checked the windows events(windows_events_error.PNG) why the users cannot connect is very clear, that there is an issue with the certificate on the server.
I have found only one signed certificate but i cannot find if and how is related with that policy. We don't match the CN or serial number in the policy.
11-16-2021 06:03 PM
There is no certificate configuration done on the WLC unless you're using some sort of Local EAP for fallback, if that's what you're asking.
Unless there is a load balancer between the NAD and PSN that is doing an SSL termination/rewrite for some reason, the EAP server certificate is presented directly by the PSN for 802.1x sessions.
11-17-2021 01:28 AM
So, the signed certificates are not necessary bonded with a specific policy, it can be used globally for all the policies.
Can i renew the same expired certificate or i have to create from scratch a new CSR and send it to CA?
11-23-2021 01:41 AM
@Greg Gibbs could you please let me know if i could do the above with the Certificates ?
11-23-2021 01:53 PM
ISE does not have the ability to directly renew CA-signed certificates, so it depends entirely on the CA in use. You cannot import a CA-signed identity certificate into ISE without the private key. When creating a CSR in ISE, ISE automatically generates a private key. Only after the signed cert is bound to the CSR can the private key be exported (with the certificate).
If the CA allows you to renew the current certificate and export the private key without submitting a CSR, that should be fine. If not, you would need to create a new CSR and use that to get a new certificate from the CA.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide