01-10-2020 08:09 AM
We are in the process of upgrading ISE from 2.1 to 2.4, and I'm tasked with certificate side of things.
Currently existing 2.1 is only used for Guest WiFi, and we plan to utilise the new system for EAP authentication as well.
We've decided to go with publicly signed wildcard certificate for all things ISE (Admin, EAP, portals and maybe pxGrid at later stage?). I've followed the Cisco best practise for generating a CSR by using a generic name in CN and added this generic CN i and the wildcard in the SAN field. Our supplier is having difficulty progressing with this CSR though, and waiting to find out how it goes.
Now, as for the trusted certificates, Digicert Root CA is already in trusted cert store on ISE by default for Endpoints, Infrastructure and AdminAuth.
Assuming we'd also have to add our internal CA root CAs here, but do I need to select this for the same purposes as well?
Thanks in advance,
Solved! Go to Solution.
01-10-2020 09:16 AM
01-10-2020 09:16 AM
01-10-2020 10:56 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide