<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Certificate Days to Expiry log in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3748321#M488249</link>
    <description>&lt;P&gt;I imagine&amp;nbsp;ISE calculates the expiry date by deducting the expiration date of the cert from the current date. All X.509 certs have validity attributes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BTW why wait for the MICs to expire? Why risk having phones not register some day in the future when you can just install your LSCs during a maintenance window?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Nov 2018 18:57:50 GMT</pubDate>
    <dc:creator>Nadav</dc:creator>
    <dc:date>2018-11-16T18:57:50Z</dc:date>
    <item>
      <title>ISE Certificate Days to Expiry log</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3746611#M488243</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customer is trying to figure out a way to create a report of the MIC certificates in their Cisco IP Phones and their date of expiration to plan for&amp;nbsp;the implementation of LSC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since we can use the "Days to Expiry" attribute in an AuthZ policy and it provides the quantity of days to expiry, it means that the expiration date is extracted and logged somewhere I guess. In which log can I find this information?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 15:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3746611#M488243</guid>
      <dc:creator>slevesqu</dc:creator>
      <dc:date>2018-11-14T15:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate Days to Expiry log</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3746633#M488246</link>
      <description>ISE does not store those attributes anywhere and the conditions are run in a Just In Time(JIT) fashion where they are evaluated at the runtime and a decision is taken based on the values returned. They are logged at TRACE level on the logs that reside on the ISE which are written locally. So in short, there is no way you can pull those attributes from ISE.&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Nov 2018 15:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3746633#M488246</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-11-14T15:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate Days to Expiry log</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3747656#M488247</link>
      <description>&lt;P&gt;100% clear thank you sir!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 20:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3747656#M488247</guid>
      <dc:creator>slevesqu</dc:creator>
      <dc:date>2018-11-15T20:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate Days to Expiry log</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3748321#M488249</link>
      <description>&lt;P&gt;I imagine&amp;nbsp;ISE calculates the expiry date by deducting the expiration date of the cert from the current date. All X.509 certs have validity attributes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BTW why wait for the MICs to expire? Why risk having phones not register some day in the future when you can just install your LSCs during a maintenance window?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 18:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3748321#M488249</guid>
      <dc:creator>Nadav</dc:creator>
      <dc:date>2018-11-16T18:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate Days to Expiry log</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3759004#M488251</link>
      <description>&lt;P&gt;Not that easy the CUCM is managed by a 3rd party which makes it challenging to deploy LSCs in the short term&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 15:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/3759004#M488251</guid>
      <dc:creator>slevesqu</dc:creator>
      <dc:date>2018-12-06T15:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate Days to Expiry log</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/4136986#M562366</link>
      <description>&lt;P&gt;One alternative in this case, would be to write a duplicate policy for authenticating your phones on top of the existing policy but name this policy something like 'Phone-Auth-expires-less-than-100' and add the expire attribute as something that must be matched. You can then easily report on the devices that match this policy instead of your already existing policy.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Aug 2020 16:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-days-to-expiry-log/m-p/4136986#M562366</guid>
      <dc:creator>gnegronida</dc:creator>
      <dc:date>2020-08-17T16:36:40Z</dc:date>
    </item>
  </channel>
</rss>

