<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks a lot! in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081996#M22673</link>
    <description>&lt;P&gt;Thanks a lot!&lt;/P&gt;
&lt;P&gt;You made my day!&lt;/P&gt;</description>
    <pubDate>Fri, 02 Jun 2017 02:45:19 GMT</pubDate>
    <dc:creator>eric.hosseini</dc:creator>
    <dc:date>2017-06-02T02:45:19Z</dc:date>
    <item>
      <title>Does Cisco ISE 2.0 Support CRL ?</title>
      <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081990#M22667</link>
      <description>&lt;P&gt;Dear support,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I want to configure Certificate Revocation List (CRL) on Cisco ISE version 2.0 but I can not find the configuration section for CRL, however OCSP configuration section is there.&lt;/P&gt;
&lt;P&gt;I've done some researches and I found that configuring CRL was supported (at least on version 1.2), but on version 2.0 there is not any documentation about this (at least I couldn't find any). On this version "OCSP Client Profile" is the only section that can be found (under Administration &amp;gt; System &amp;gt; Certificates.&lt;/P&gt;
&lt;P&gt;So the question is whether CRL is supported or OCSP is the only way on this version? If yes, how?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081990#M22667</guid>
      <dc:creator>eric.hosseini</dc:creator>
      <dc:date>2019-03-11T07:45:27Z</dc:date>
    </item>
    <item>
      <title>Do you want ISE to publish a</title>
      <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081991#M22668</link>
      <description>&lt;P&gt;&lt;EM&gt;Moved this thread to the correct forum for better engagement with and visibility to the community.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you want ISE to publish a CRL when acting as a CA or do you want it to use CRL(s) from external CA(s)?&lt;/P&gt;
&lt;P&gt;The first is not a supported feature.&lt;/P&gt;
&lt;P&gt;The second is configurable per CA. Look under&amp;nbsp;Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Certificate Management &amp;gt; Certificate Periodic&amp;nbsp;Check Settings. (per the ISE 2.2 Admin Guide)&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 15:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081991#M22668</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-01T15:11:57Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081992#M22669</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;Yes, I want to use CRL(s) from external CA(s). That section where you are pointing to is for checking the downloaded CRL(s) ("&lt;SPAN&gt;Cisco ISE checks the Certificate Revocation Lists (CRL) periodically. Using this page, you can configure Cisco ISE to check ongoing sessions against CRLs that are downloaded automatically&lt;/SPAN&gt;").&lt;/P&gt;
&lt;P&gt;But my problem is that I don't know where I can configure the CRL(s) providers. In other words, where can I tell ISE "check this url which is the CRL provider/server's url and download the latest CRL" ?&lt;/P&gt;
&lt;P&gt;I have an option which is "OCSP Client Profile" and I can set up OCSP provider(s) in there. But what about CRL?&lt;/P&gt;
&lt;P&gt;I've attached a screenshot of options I have under Administration &amp;gt; System &amp;gt; Certificates&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 00:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081992#M22669</guid>
      <dc:creator>eric.hosseini</dc:creator>
      <dc:date>2017-06-02T00:57:50Z</dc:date>
    </item>
    <item>
      <title>Ah OK. you configure what you</title>
      <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081993#M22670</link>
      <description>&lt;P&gt;Ah OK. You configure what you are asking about under the&amp;nbsp;&lt;SPAN&gt;Administration &amp;gt; System &amp;gt; Certificates &amp;nbsp;&amp;gt; Trusted Certificates section. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Edit the CA for whom you wish to retrieve their CRL and you will see the section below (open in new tab to zoom) where you can enter the URL for CRLs:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/ise_crl.png" class="migrated-markup-image" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 02:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081993#M22670</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-02T02:26:12Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081994#M22671</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;You are a life saver &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; That's exactly what I was looking for.&lt;/P&gt;
&lt;P&gt;So I have one CA server and 2 intermediate servers which are part of my certificate chain (Root &amp;lt; intermediate server 1/2 &amp;lt; Certificate). Those two intermediate servers are issuing server which are running in load balancing mode.&lt;/P&gt;
&lt;P&gt;My final question is, "doing this step for both of those issuing servers is enough or I should do that for Root CA as well?"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 02:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081994#M22671</guid>
      <dc:creator>eric.hosseini</dc:creator>
      <dc:date>2017-06-02T02:26:29Z</dc:date>
    </item>
    <item>
      <title>The Admin Guide tells us "For</title>
      <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081995#M22672</link>
      <description>&lt;P&gt;The Admin Guide tells us "For each CA certificate that can sign a client certificate, specify how to do the revocation status check for that CA."&lt;/P&gt;
&lt;P&gt;I interpret that to mean you would do that for each issuing server (and not the root CA).&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 02:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081995#M22672</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-02T02:38:40Z</dc:date>
    </item>
    <item>
      <title>Thanks a lot!</title>
      <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081996#M22673</link>
      <description>&lt;P&gt;Thanks a lot!&lt;/P&gt;
&lt;P&gt;You made my day!&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 02:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/3081996#M22673</guid>
      <dc:creator>eric.hosseini</dc:creator>
      <dc:date>2017-06-02T02:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Ah OK. you configure what you</title>
      <link>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/4035174#M558308</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is related to CRL but a bit diffrent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have deployed EAP-TLS method for wireless user authentication. if CRL server goes down then ISE will not be able to download CRL from it. In this case as the latest CRL is not available on the ISE will it still perform the authentication without any issues? any other impact happens?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Suyog&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 06:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/does-cisco-ise-2-0-support-crl/m-p/4035174#M558308</guid>
      <dc:creator>mhapsekar.suyog</dc:creator>
      <dc:date>2020-02-25T06:04:29Z</dc:date>
    </item>
  </channel>
</rss>

