05-16-2019 11:21 AM
Hi,
I have installed ISE 2.4, and configured for Wireless Guest Access (Self Registration Portal). So, but when the users are trying to browse internet they are getting https error message, because they need to install firewall's certificate to their devices and I have to manually install firewall certificate to their devices. How can I automatically install my firewall certificate to the Guest Devices when they are connecting to the network?
Thanks,
Rajitha
Solved! Go to Solution.
05-17-2019 04:00 AM
If any device throws up a certificate warning it means that it cannot verify the certificate. What kind of certificate is this and who signed it? If it was not signed by a public CA then I would argue that is a mis-configuration on that TLS interception device. It needs to present a public CA cert. If that device is trying to intercept all traffic (which is becoming more common place now because companies want to see what's inside these TLS flows). In a company owned/managed device the IT guys can push this to the end device any no one is any the wiser. But in a guest portal situation where you have un-managed devices, this is impossible to achieve with a PKI cert.
05-19-2019 02:50 PM
05-16-2019 12:04 PM
05-19-2019 06:29 AM - edited 05-19-2019 06:37 AM
Dear @Jason Kunst ,
Thanks for the reply, actually when the internet links are connected to the firewall, in the firewall HTTPS packet inspection is enabled. So, when the guests are allowed to connect internet, they are going to internet via firewall, and without firewall certificate, guests are getting an error.
Thanks,
Rajitha
05-19-2019 06:30 AM
Dear @Jason Kunst ,
Thanks for the reply, actually when the internet links are connected to the firewall, in the firewall HTTS packet inspection is enabled. So, when the guests are allowed to connect internet, they are going to internet via firewall, and without firewall certificate, guests are getting an error.
Thanks,
Rajitha
05-19-2019 02:50 PM
05-20-2019 07:50 AM
@Jason Kunst thanks for the reply..! I will check with cisco.
05-17-2019 04:00 AM
If any device throws up a certificate warning it means that it cannot verify the certificate. What kind of certificate is this and who signed it? If it was not signed by a public CA then I would argue that is a mis-configuration on that TLS interception device. It needs to present a public CA cert. If that device is trying to intercept all traffic (which is becoming more common place now because companies want to see what's inside these TLS flows). In a company owned/managed device the IT guys can push this to the end device any no one is any the wiser. But in a guest portal situation where you have un-managed devices, this is impossible to achieve with a PKI cert.
05-19-2019 06:36 AM
Dear @Arne Bier ,
Thanks for the reply and Our firewall certificate is signed by public CA and it's a valid one. As you mentioned, we are using HTTPS inspection. So, when the guest users are connected to the network, we need to install firewall certificate to user's device automatically. So, I can upload my firewall certificate to ISE and can i push uploaded to a guest device?
-- Rajitha
05-19-2019 02:33 PM
If I were a guest on your network, I would run a mile if you're asking me to install something, just so that it can work. No Guest service should ask or expect anyone to install a certificate into your end device's Trust Store. The Trust Store should be guarded and left alone to the OS manufacturer or to MDM/BYOD onboarding use cases.
So there are two things here. Client to ISE Portal will build a TLS connection and the cert that is used here should be a publicly signed cert that lives on the ISE PSN. You end devices should have no issues with that. If that causes a cert warning on the end device because the end device doesn't trust the ISE cert, then there is a problem with the CA (weird/unknown/untrusted CA that signed the ISE cert) or the end device doesn't have the Root CA cert for that CA.
Once user has successfully authenticated on the portal and sends first TLS packet to the firewall, then the firewall should intercept that and masquerade as the end destination - but again, this should be transparent to the user. A firewall cannot have a single cert that handles every possibly domain, therefore YOU (end device) have to install its cert, so that you don't freak out when you speak to the man in the middle. Excuse my cynicism, but that sounds like asking for trouble.
Maybe I am wrong. I don't have any experience with TLS interception - I just try to understand the fundamentals. And in TLS 1.3 I believe things will get even trickier.
05-20-2019 07:54 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide