Create a cert template from existing working template from your CA and name it "XXXXX.INF" on the ca - copy to server that needs the cert
 
	SAVE IT WITH THE SERVER NAME. MAKE SURE IT'S AN .INF FILE.
 
	Create the REQ from the INF on the local server 
	Open the INF file and replace the server template has “XXXXXX” for server name, replace with the  with the server name you are working on. -  
	open CMD as admin, navigate to where you put the XXXXX.INF example below 
	Example: CMD.exe --> C:\temp\Certificate>certreq -new yourservername.inf yourservername.req
 
	Copy the XXXXX.req File to your Primary CA, now you want to submita new request.
 
	Open the Certification Authority console
 
	Click start type in CA and Certificate Authority should appear “Run as Admin”
 
	Right-click the CA → All Tasks > Submit a new request 
	Select the XXXXX.req file and save it as a .CER file  
	Example XXXXX.cer
 
	Now copy the XXXXX.cer file back to the server that needs it, and import it to the Computer\Personal Store. 
	Trying running your ccmsetup.exe /install /mp blah blah blah
 
	I would try to get networks to open up ports to the CA from all subnet in that domain and ports that SCCM needs to communicate with.
 
	ports needed
 
	Kerberos 464 Certificate Enrollment Web Services Domain Controllers (DC) Allow Source Certificate Enrollment Web Services - Destination : DC 
	LDAP 389 Certificate Enrollment Web Services Domain Controllers (DC) Allow Source Certificate Enrollment Web Services - Destination: DC 
	Service: LDAP (network port tcp/389) 
	LDAP 636 Certificate Enrollment Web Services Domain Controllers (DC) Allow Source Certificate Enrollment Web Services 
	Service: LDAP (network port tcp/636) 
	DCOM/RPC Random port above port 1023 · Certificate Enrollment Web Services CA Allow Please see for details on RPC/DCOM configuration: http://support.microsoft.com/kb/154596/en-us 
	HTTPS 443 All clients requesting certs Certificate Enrollment Web Services Allow
 
	CERT INF Example Below: 
	Example: 
	[Version] 
	Signature="$Windows NT$" 
	[NewRequest] 
	Subject = "CN=XXXXX, OU=XXX, O=XXX, L=STATE, S=CITY, C=US"   <----needs hostname - no fqdn of server you need 
	KeySpec = 1 
	KeyLength = 2048 
	Exportable = TRUE 
	MachineKeySet = TRUE 
	SMIME = FALSE 
	PrivateKeyArchive = FALSE 
	UserProtected = FALSE 
	UseExistingKeySet = FALSE 
	ProviderName = "Microsoft RSA SChannel Cryptographic Provider" 
	ProviderType = 12 
	RequestType = PKCS10 
	KeyUsage = 0xa0
 
	[Extensions] 
	2.5.29.17 = "{text}" 
	_continue_ = "dns=XXXXX.company.com"   <---needs FQDN
 
	2.5.29.37 = "{text}" 
	_continue_ = "1.3.6.1.5.5.7.3.2" ; Client Authentication
 
	[RequestAttributes] 
	CertificateTemplate = ConfigMgrClientCertificate 
	DisableExtensionsList = "2.5.29.31,1.3.6.1.5.5.7.1.1"
 
	Hope this helps!