<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Johannes- in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896270#M37036</link>
    <description>&lt;P&gt;Hi Johannes-&lt;/P&gt;
&lt;P&gt;Let me start by saying that you should look into configuring OCSP (Online Certificate Status Protocol) instead of CRL (Certificate Revocation List). There are many benefits to it. I am not a PKI expert so I will let you google it and consult the a PKI/Cryptography expert but below is a good link about it:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.fir3net.com/Security/Concepts-and-Terminology/certificate-revocation.html"&gt;https://www.fir3net.com/Security/Concepts-and-Terminology/certificate-revocation.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;One of the benefits of OCSP is the Diagnostic Report in ISE located under Operations &amp;gt; Reports &amp;gt; Diagnostics &amp;gt; OSCP Monitoring. You can schedule that report and run it let's say every morning and have ISE send you a copy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You can configure ISE to automatically check sessions against the CRL/OCSP list by going to:&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uicontrol"&gt;Administration &lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;System &lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Certificates &lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Certificate Management &lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Certificate Periodic Check Settings&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Mar 2016 03:19:09 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2016-03-24T03:19:09Z</dc:date>
    <item>
      <title>ISE 1.4 CRL download verification</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896269#M37034</link>
      <description>&lt;P&gt;Hi ISE professionals,&lt;/P&gt;
&lt;P&gt;today I have a very simple question and hopefully someone will enlighten me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Let's assume I configured a trusted CA certificate with a CRL distribution URL and I download the CRL some time before it expires.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How can I verify if this actually worked? Of course when CRL download fails I assume I get a Error Message. But what I want is a log message somewhere to verify that it worked.&lt;/P&gt;
&lt;P&gt;Has anybody an idea if there is a log file or report where I can verify the download?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896269#M37034</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2019-03-11T06:36:36Z</dc:date>
    </item>
    <item>
      <title>Hi Johannes-</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896270#M37036</link>
      <description>&lt;P&gt;Hi Johannes-&lt;/P&gt;
&lt;P&gt;Let me start by saying that you should look into configuring OCSP (Online Certificate Status Protocol) instead of CRL (Certificate Revocation List). There are many benefits to it. I am not a PKI expert so I will let you google it and consult the a PKI/Cryptography expert but below is a good link about it:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.fir3net.com/Security/Concepts-and-Terminology/certificate-revocation.html"&gt;https://www.fir3net.com/Security/Concepts-and-Terminology/certificate-revocation.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;One of the benefits of OCSP is the Diagnostic Report in ISE located under Operations &amp;gt; Reports &amp;gt; Diagnostics &amp;gt; OSCP Monitoring. You can schedule that report and run it let's say every morning and have ISE send you a copy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You can configure ISE to automatically check sessions against the CRL/OCSP list by going to:&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uicontrol"&gt;Administration &lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;System &lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Certificates &lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt; &lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Certificate Management &lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Certificate Periodic Check Settings&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 03:19:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896270#M37036</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-03-24T03:19:09Z</dc:date>
    </item>
    <item>
      <title>Hello Neno,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896271#M37038</link>
      <description>&lt;P&gt;Hello Neno,&lt;/P&gt;
&lt;P&gt;good point - I forgot to mention, that I'm using OCSP as well. Perhaps I explain the use case for CRLs in the combination with OCSP.&lt;/P&gt;
&lt;P&gt;Assume a PSN node in a remote office. The OCSP server is only available in the central site and not in every remote office.&lt;/P&gt;
&lt;P&gt;If the WAN connection towards the office fails, there is no connection to the OCSP server. Also I don't want to accept EAP-TLS client sessions if the OSCP server in unavailable and skip certificate checking.&lt;/P&gt;
&lt;P&gt;This is when CRLs come into place. If the OSCP server is unavailable the downloaded CRL is checked. Assuming a CRL lifetime of one week and an overlap of CRL creation of&amp;nbsp; ~three days, I have ~ three days to fix the WAN connectivity.&lt;/P&gt;
&lt;P&gt;So thanks for the hint. But in my opinion there are valid use cases to use both mechanisms in combination.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 06:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896271#M37038</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2016-03-24T06:43:41Z</dc:date>
    </item>
    <item>
      <title>Ahh best of both worlds! :)</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896272#M37039</link>
      <description>&lt;P&gt;Ahh best of both worlds! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Thank you for the explanation on the CRL + OCSP. That makes a lot of sense! (+5 from me!)&lt;/P&gt;
&lt;P&gt;Back to your question:&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp;For OCSP: I would recommend you check the report that I referenced above and see if that gives your the information needed&lt;/P&gt;
&lt;P&gt;2. For CRL: I am afraid I am not aware of a way to confirm that things have worked &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; And yes, you are correct that you will can be notified when a retrieval fails. That is done via an alarm called "&lt;SPAN&gt;&lt;STRONG&gt;CRL Retrieval Failed&lt;/STRONG&gt;" and it is&amp;nbsp;&lt;/SPAN&gt;located at:&amp;nbsp;&lt;SPAN class="menucascade"&gt;&lt;STRONG&gt;&lt;SPAN class="uicontrol"&gt;Administration&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;System&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="uicontrol"&gt;Settings&lt;/SPAN&gt; &amp;gt; &lt;/STRONG&gt;&lt;SPAN class="uicontrol"&gt;&lt;STRONG&gt;Alarm Settings&lt;/STRONG&gt;. You need to make sure that the alarm is enabled and that you have an e-mail configured for the notifications to work.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;So with that being said, I guess you will have to assume that if you are not getting notifications about the alarm then everything is working fine &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="menucascade"&gt;&lt;SPAN class="uicontrol"&gt;&amp;nbsp;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 07:51:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896272#M37039</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-03-24T07:51:14Z</dc:date>
    </item>
    <item>
      <title>Hi Neno,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896273#M37040</link>
      <description>&lt;P&gt;Hi Neno,&lt;/P&gt;
&lt;P&gt;thanks for your answer. Regardless of the Alarm settings, the CRL download failed event is always logged.&lt;/P&gt;
&lt;P&gt;Example Syslog:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Category Name: RADIUS Diagnostics&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Message Class: CRL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Message Code:&amp;nbsp; 12831&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Message Text:&amp;nbsp; Unable to download CRL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;There are much more notifications with different conditions, which can be reviewed under:&lt;/P&gt;
&lt;P&gt;Administration &amp;gt; System &amp;gt; Logging &amp;gt; Message Catalog&lt;/P&gt;
&lt;P&gt;Just type in "CRL" as the filter for the "Message Text" column.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Back to my original request.&lt;/P&gt;
&lt;P&gt;I was just wondering of a successful CRL download is in some log file. If I login to ADE-OS there are tons of different log files if I issue a "show logging ..." on the command line. I just don't know where to search.&lt;/P&gt;
&lt;P&gt;Another potential location would be in the GUI under "Operations &amp;gt; Troubleshoot &amp;gt; Download Logs"&lt;/P&gt;
&lt;P&gt;There are all debug log files (also tons of them) for each ISE node in the deployment. There must be a CRL download indication in one of these files.&lt;/P&gt;
&lt;P&gt;Perhaps a TAC engineer of Cisco is reading this and exactly knows where to search for it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 08:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896273#M37040</guid>
      <dc:creator>Johannes Luther</dc:creator>
      <dc:date>2016-03-24T08:22:31Z</dc:date>
    </item>
    <item>
      <title>Yes, perhaps someone from</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896274#M37041</link>
      <description>&lt;P&gt;Yes, perhaps someone from Cisco and/or someone that knows about this can chime in &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 17:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-1-4-crl-download-verification/m-p/2896274#M37041</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-03-24T17:59:10Z</dc:date>
    </item>
  </channel>
</rss>

