<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Certificate stale status in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653967#M576270</link>
    <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html#concept_a1f_v2t_msb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html#concept_a1f_v2t_msb&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Jul 2022 14:44:12 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2022-07-20T14:44:12Z</dc:date>
    <item>
      <title>ISE Certificate stale status</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653889#M576268</link>
      <description>&lt;P&gt;Hello Members,&lt;/P&gt;&lt;P&gt;I see after the certificate binding on ISE, the cert status as Stale, under the system certificate tab. How to fix this issue?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 12:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653889#M576268</guid>
      <dc:creator>Anilvnair</dc:creator>
      <dc:date>2022-07-20T12:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate stale status</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653967#M576270</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html#concept_a1f_v2t_msb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html#concept_a1f_v2t_msb&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 14:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653967#M576270</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-07-20T14:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate stale status</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653968#M576271</link>
      <description>&lt;H3 id="ariaid-title99" class="title topictitle3"&gt;Stale System and Trusted Certificates&lt;/H3&gt;
&lt;SECTION class="body conbody"&gt;
&lt;P class="p"&gt;Stale certificates are certificates that don’t belong to any node in the deployment. These redundant certificates might accumulate in large numbers in the System and Trusted Certificate stores, leading to insufficient memory and latency issues. From with Cisco ISE Release 3.1, such redundant certificates carry a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph uicontrol"&gt;Stale Certificate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;status, enabling you to review and delete them.&lt;/P&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Wed, 20 Jul 2022 14:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653968#M576271</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-07-20T14:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate stale status</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653979#M576274</link>
      <description>&lt;P&gt;Did you search for the word "stale" in the ISE Admin Guide?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1.html" target="_self" rel="nofollow noreferrer"&gt;ISE 3.1 Administrator Guide&lt;/A&gt; &amp;gt; &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_basic_setup.html" target="_blank"&gt;Basic Setup&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 14:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4653979#M576274</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-07-20T14:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate stale status</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4993620#M586210</link>
      <description>&lt;P&gt;In a complex deployment runnin for years now we are using seperate interfaces for the Guest Portal.&lt;BR /&gt;We have a Guest Portal Certificate signed by 3rd party that ist shown as stale,&lt;BR /&gt;because neither its' CNs nor its SANs match the fqdn of the one of the nodes.&lt;BR /&gt;We use "ip host" aliases for guest portal setup that ISE cert check obvoiusly forgot to consider &lt;BR /&gt;if an installed system certificate is referenced.&lt;BR /&gt;&lt;BR /&gt;And.... Yes, I have read the manuals ... at least partially &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 12:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/4993620#M586210</guid>
      <dc:creator>ffischer</dc:creator>
      <dc:date>2024-01-10T12:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate stale status</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/5024115#M587650</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286176"&gt;@ffischer&lt;/a&gt; ,&lt;BR /&gt;&lt;BR /&gt;we ran into this issue as well. Does the "ip host" fix definitely the issue?&lt;/P&gt;&lt;P&gt;Thx, Gio&lt;/P&gt;</description>
      <pubDate>Sun, 25 Feb 2024 15:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/5024115#M587650</guid>
      <dc:creator>Gioacchino</dc:creator>
      <dc:date>2024-02-25T15:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Certificate stale status</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/5029900#M587802</link>
      <description>&lt;P&gt;Well..&amp;nbsp;&lt;BR /&gt;The certificates are cecked for beeing referenced in the ISE config&lt;BR /&gt;by internal code running automatically in regular intervals.&lt;BR /&gt;The code obviously ignores the host names in the ip aliases on the CLI.&lt;BR /&gt;&lt;BR /&gt;I'm not aware of a confirmed bug nor a fix for this bug.&lt;BR /&gt;&lt;BR /&gt;Nothing you or I can "fix" if you need the host alias.&lt;BR /&gt;If you do not need it, then delete it.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 14:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-certificate-stale-status/m-p/5029900#M587802</guid>
      <dc:creator>ffischer</dc:creator>
      <dc:date>2024-02-29T14:47:46Z</dc:date>
    </item>
  </channel>
</rss>

