01-30-2022 07:58 AM
Hi friends,
in the last few days I get an error message, nothing has changed on my network and there is no block in the firewall.
Feed Service unavailable : SSLHandshakeException invoking https://ise.cisco.com:8443/feedserver/feed/serverinfo?ISE_VERSION=2.4.0.357: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
**Please ensure that the certificate store on ISE has a valid and enabled entry for either the root certificate or the intermediate certificate for the SSL server certificate chain of Cisco ISE feed server.
**Please ensure that Proxy settings are configured if needed to reach Feed Server.
*** This message was generated by Cisco Identity Services Engine (ISE) ***
Anyone else having this problem?
Thanks
Solved! Go to Solution.
01-31-2022 11:52 AM
@shlomoi : Please add IndenTrust as an additional root CA to be trusted for cisco services. Good to keep the certificates you showed, unless you are certain that they are not used for anything else.
01-30-2022 08:20 AM
I had this issue on a customer deployment that was running ISE 2.6, and still have the same issue after upgrading to 3.0 with Patch 6.
Maybe we are hitting this bug?
01-30-2022 09:25 AM
Hey aref.
I'm not sure we have the same problem. My ise in version 2.4 with traditional and not smart licensing. Bug talks about smart licensing. I'll probably open Tac and update.
Thanks
01-30-2022 09:30 AM
When we first saw this issue with ISE 2.6, it was running traditional licenses, and then we moved to 3.0 with smart licenses the issue still persisted. TAC would be the way to go.
01-30-2022 01:55 PM - edited 01-30-2022 04:13 PM
Verify IndenTrust Commerical Root CA 1 is present in the Trusted Certificates in ISE and trusted for cisco services. The ISE profiler feed service site has recently updated the server certificate and it is now issued by HydrantID Server CA O1, a subCA of IndenTrust. For more info, see Field Notice: FN - 72111 - Cisco Identity Services Engine – QuoVadis Root Certificate Decommission Might Affect Posture, Profiler Feed, Client Provisioning, Support Diagnostics Connector, and Smart Licensing Functionality - Software Upgrade Recommend...
01-31-2022 12:45 AM
hi hslai Thank you for your help ,
For me it appears like this, how can i change the certificate
It's safe to make the change, it's going to hurt my service. My service is currently working fine, except for the update error.
Thanks shlomo
01-31-2022 11:52 AM
@shlomoi : Please add IndenTrust as an additional root CA to be trusted for cisco services. Good to keep the certificates you showed, unless you are certain that they are not used for anything else.
01-31-2022 11:50 PM
I replaced the certificate and everything works fine, thank you very much
01-31-2022 01:44 AM
In my case, the customer confirmed the cert is in place and has the Trust for authentication of Cisco Services enabled, but unfortunately it is still not working.
01-31-2022 11:55 AM
If your issue is with Smart licensing, then it can only be addressed by upgrading or patching with an official ISE release with the fix. Smart licensing is not using the ISE trusted certificates store. Otherwise, please work with TAC.
01-31-2022 12:12 PM - edited 01-31-2022 12:12 PM
The customer build is running the latest'ish patch 4. As today patch 5 became available will ask to apply it and see if that makes any better. If not will recommend to work with TAC.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide