1. Aruba ClearPass Deployment Guide: In sections discussing certificate usage
the guide consistently refers to using a Fully Qualified Domain Name (FQDN) that is resolvable by clients. For example
the ClearPass 6.7 Deployment Guide states
"The FQDN of the certificate must be resolvable by the clients." (p. 110). A .local address is not universally resolvable and relies on local network configurations (mDNS or internal DNS)
which can cause validation to fail on many supplicants.
2. CA/Browser Forum
Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates: While this standard applies to public CAs
its principles are considered PKI best practices. Version 1.3.0 (and subsequent versions) officially deprecated the issuance of certificates for internal server names and reserved IP addresses. Section 7.1.4.2.1 explicitly states CAs must not issue certificates containing internal names
which includes any name that does not end in a public TLD. This established the industry-wide practice of avoiding names like .local for interoperability and security.
3. RFC 6762 - Multicast DNS: This IETF standard formally reserves the .local TLD for use with Multicast DNS. "The domain name "local" is a special-use domain name reserved for hostnames in local networks. [...] Any DNS query for a name ending in ".local" MUST be sent to the mDNS IPv4 link-local multicast address" (Section 3). This confirms that .local is not a standard DNS name and can cause resolution conflicts or failures in environments not configured for mDNS.