<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CRL Validation fails on ACS 5.2.0.26.3 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799962#M232156</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Mikko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How could we verify that ACS 5.3 checking the CRL list while authenticating the clients. Is there any way to check which CRL is present in ACS 5.3 and does it is being used while authenticating the list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone if using CRL must be checkign this. Please suggest asap on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Apr 2012 18:47:24 GMT</pubDate>
    <dc:creator>ajay pandey</dc:creator>
    <dc:date>2012-04-06T18:47:24Z</dc:date>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799951#M232144</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using ACS v5.2.0.26.3 in 802.1X certificate based authentication. Now, when we added CRL functionality into ACS it fails in CRL validation and gives following error message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LastErrorMessage=CRL PKI verification failed&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; Certificate Revocation list Url=&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://crl.download.net/XXXX/deviceCA.crl" target="_blank"&gt;http://crl.download.net/XXXX/deviceCA.crl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have installed root, device and server certificates from CA, but for management we are still using self-signed certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question is, which certificate is used when validating downloaded CRL file - one used for EAP-TLS or one used for management interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How I can check which certificate ACS server is using for CRL validation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799951#M232144</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2019-03-11T01:18:20Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799952#M232146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The crl is used for the eap interface, because crl checking is a necessity to determine which users are still valid and which are revoked. So crl for the management doesnt apply because the management interface authenticates the user via the local admin database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to your crl url that you added, can you use the ip address that resolves to crl.download.net and try that instead? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you go the ipbased url see if you can type in your browser and see if the crl file actually downloads.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Aug 2011 03:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799952#M232146</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2011-08-13T03:57:34Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799953#M232147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tarik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that there is small misunderstanding now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS can download CRL without any problems, but it fails when it tries to validate contents of CRL using PKI. My question was (and still is), which certificates PKI is used for CRL content validation: one used for EAP-TLS or one used management (https)???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to debug this process, but only error message which is related to this problem, is one from SSL informing about PKI failure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 05:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799953#M232147</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2011-08-15T05:44:31Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799954#M232148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As ACS is using openssl for CRL validation, do ACS also expect that CRL file is in PEM format (which is default for openssl)??? In my case CA is publishing CRL in DER format, which can cause this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 12:23:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799954#M232148</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2011-08-15T12:23:48Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799955#M232149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;P.S. This is actual error message from openssl:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Crypto,12/08/2011,13:28:11:523,ERROR,3006782368,NIL-CONTEXT,Crypto::Result=48, Crypto.SSL.verifyCRL - CRL verification failed - Alleged Issuer CN=XXX Root CA, CRL-CN=XXX Device CA,SSL.cpp:829&lt;/P&gt;&lt;P&gt;Crypto,12/08/2011,13:28:11:523,ERROR,3006782368,NIL-CONTEXT,Crypto::Result=48, CryptoLib.CSSL.addCRL - verification failed.,SSL.cpp:360&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 12:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799955#M232149</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2011-08-15T12:29:40Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799956#M232150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am sure we need this file in pem format since openssl is what the ACS uses. Please make the changes to the file and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tarik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2011 04:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799956#M232150</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2011-08-16T04:39:04Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799957#M232151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Converted DER formatted CRL file to PEM - still same error message about PKI Validation failure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to check which CA certificate is used for CRL signature validation??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I'm afraid that ACS is using self-signed certificate, tagged to use with management connection for CRL signature validation, but I need to verify that first before ordering real certificates for all ACS servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2011 06:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799957#M232151</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2011-08-16T06:01:04Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799958#M232152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Answering to my own question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. CRL is validated against management certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. CRL must be in PEM format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Nov 2011 08:52:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799958#M232152</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2011-11-08T08:52:20Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799959#M232153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you get this problem fixed. I am also facing same situation at moment and serching for solution ta moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 11:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799959#M232153</guid>
      <dc:creator>ajay pandey</dc:creator>
      <dc:date>2012-04-04T11:23:59Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799960#M232154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Ajay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes. As ACS has two certificates, one used for web gui and one for authentication (eap-tls), I noticed that management certificate is used for CRL validation, not that one, which is used for EAP-TLS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is very poorly documented in ACS manuals and I hope that Cisco improved documentation quality in ISE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So make sure that management certificate is granted from CA generating CRLs, then it works without problems (EKU has to contain both server and client authentication key usage).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2012 05:44:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799960#M232154</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2012-04-05T05:44:00Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799961#M232155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; But do we have to configure somewhere CRL url's or it should work automatically.&lt;/P&gt;&lt;P&gt;I am using same certificate for mgmt &amp;amp; EAP-TLS purpose. I hope it should not cause any problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2012 08:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799961#M232155</guid>
      <dc:creator>ajay pandey</dc:creator>
      <dc:date>2012-04-05T08:45:21Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799962#M232156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Mikko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How could we verify that ACS 5.3 checking the CRL list while authenticating the clients. Is there any way to check which CRL is present in ACS 5.3 and does it is being used while authenticating the list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone if using CRL must be checkign this. Please suggest asap on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 18:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799962#M232156</guid>
      <dc:creator>ajay pandey</dc:creator>
      <dc:date>2012-04-06T18:47:24Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799963#M232157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer to your both questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. CRL is defined in "Users and Identity Stores"-&amp;gt;"Certificate Authorities". As far as I have tested ACS does not read CRL information from certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. You will see message in ACS log files if CRL download/processing fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. I tested CRL processing with dummy test certificate, which I installed to test PC and tried to access network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 07:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799963#M232157</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2012-04-10T07:40:10Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799964#M232158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mikko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;one question regarding &lt;/P&gt;&lt;P&gt;"So make sure that management certificate is granted from CA generating CRLs"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this mean, that CRL checking should be enabled for the management certificate/CA? (where i cannot see the reason why)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Karsten&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2012 05:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799964#M232158</guid>
      <dc:creator>Karsten Jaschultowski</dc:creator>
      <dc:date>2012-04-16T05:43:06Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799965#M232159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, I think that I put it in wrong way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When ACS has downloaded CRL from CA (or its frontend), it uses management certificate chain to check validity of downloaded CRL file. So if management certificate and CRL does not share same certificate chain, CRL is ignored and not processed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CRL checking is needed only defined to CA/certificate used for EAP-TLS authentication (but unfortunately it does not use that information for CRL processing. I hope that this functionality is changed in ISE).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2012 05:59:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799965#M232159</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2012-04-16T05:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799966#M232160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mikko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for clearing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mit freundlichen Grüßen&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karsten Jaschultowski&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Dipl.-Ing.&lt;/P&gt;&lt;P&gt;Teamleiter&lt;/P&gt;&lt;P&gt;Security Network Services&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tel.: +49 251 7133 2402&lt;/P&gt;&lt;P&gt;Fax.: +49 251 7133 92402&lt;/P&gt;&lt;P&gt;Mobil: +49 172 2623879&lt;/P&gt;&lt;P&gt;E-Mail: karsten.jaschultowski@vrnetze.de&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VR Netze GmbH&lt;/P&gt;&lt;P&gt;Weseler Straße 480&lt;/P&gt;&lt;P&gt;48163 Münster&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;www.vrnetze.de&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Geschäftsführer: Winfried Richert, Martin Schauer&lt;/P&gt;&lt;P&gt;Sitz: Münster/Westf., Registergericht: AG Münster, HRB 10235&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Von:	mjarvela &lt;SUPPORTFORUMS-DONOTREPLY&gt;&lt;/SUPPORTFORUMS-DONOTREPLY&gt;&lt;/P&gt;&lt;P&gt;An:	Karsten Jaschultowski &lt;KARSTEN.JASCHULTOWSKI&gt;&lt;/KARSTEN.JASCHULTOWSKI&gt;&lt;/P&gt;&lt;P&gt;Datum:	16.04.2012 07:59&lt;/P&gt;&lt;P&gt;Betreff:	&lt;A href="AAA, Identity and NAC"&gt;&lt;/A&gt; - Re: CRL Validation fails on ACS&lt;/P&gt;&lt;P&gt;            5.2.0.26.3 &lt;A href="https://community.cisco.com/twah5q-degs-25f70"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2012 06:35:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799966#M232160</guid>
      <dc:creator>Karsten Jaschultowski</dc:creator>
      <dc:date>2012-04-16T06:35:49Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799967#M232161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; It actually works in ASC 5.3 and I had verified also that it works, In ACS actually CRL is downloaded based on time we specified in CRL download option time and it chekes the client certificate from CRL list, if client certificate is revoked and ACS downloaded the CRL after that it will not fail authetication of that client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is basic functionality of CRL and oit should always work &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Apr 2012 13:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799967#M232161</guid>
      <dc:creator>ajay pandey</dc:creator>
      <dc:date>2012-04-21T13:15:44Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799968#M232162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mikko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you have to change the format of the CRL to get it to work with ACS? - or was the issue the CA chain used?&lt;/P&gt;&lt;P&gt; (the CRL %20 URL problem is another trip up point - on ACS the %20 entries in a http CRL path must be converted to whitespace character)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using Microsoft PKI and trying to figure if I have to do 'something' to the format of the CRL to get ACS to be able to read it properly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using Microsoft PKI and if so how/what did you change with respect to the CRL format?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Sez&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2013 08:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799968#M232162</guid>
      <dc:creator>sez sharp</dc:creator>
      <dc:date>2013-02-18T08:47:25Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799969#M232163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sez,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I solved this problem by converting CRL file into .PEM format with openssl and I'm using this method in two cases; one where we are using Microsoft PKI and other where CA is unix based.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We didn't notice any problems with %20 conversion as I took care that there is no spaces in CRL URL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to summarize, conversion from .DER to .PEM is necessary (and this applies also to ISE installations).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2013 09:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799969#M232163</guid>
      <dc:creator>MIKKO JARVELA</dc:creator>
      <dc:date>2013-02-18T09:37:29Z</dc:date>
    </item>
    <item>
      <title>CRL Validation fails on ACS 5.2.0.26.3</title>
      <link>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799970#M232164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mikko&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But can't help groaning - would think that after all this time this would be taken care of under the hood of ACS (and definitley ISE!)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to have a timely mechanism for CRL propogation for EAP/TLS we have to look at; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Set the Microsoft PKI to publish new CRL file (not a delta) on say daily basis and &lt;/P&gt;&lt;P&gt; Set a timed batch job to run oppenssl after that to do PEM conversion and&lt;/P&gt;&lt;P&gt; Set ACS to retrieve CRL after all that&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pity there not an app for that... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciao,&lt;/P&gt;&lt;P&gt;Sez&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2013 09:49:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/crl-validation-fails-on-acs-5-2-0-26-3/m-p/1799970#M232164</guid>
      <dc:creator>sez sharp</dc:creator>
      <dc:date>2013-02-18T09:49:12Z</dc:date>
    </item>
  </channel>
</rss>

