<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow authentication of expired certificates - ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5193394#M591786</link>
    <description>&lt;P&gt;Greg,&lt;/P&gt;
&lt;P&gt;Thank you.&amp;nbsp; This is helpful and looks to be exactly what I was looking for.&amp;nbsp; I'll run this by others on the team, schedule a maintenance window, and report back to this thread.&lt;/P&gt;
&lt;P&gt;Thanks again,&lt;/P&gt;
&lt;P&gt;Andrew&lt;/P&gt;</description>
    <pubDate>Wed, 11 Sep 2024 18:40:57 GMT</pubDate>
    <dc:creator>andrewdours</dc:creator>
    <dc:date>2024-09-11T18:40:57Z</dc:date>
    <item>
      <title>Allow authentication of expired certificates - ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5192877#M591764</link>
      <description>&lt;P&gt;This is an option in ISE when if checked, ISE allows expired certificates to be authenticated.&amp;nbsp; So here's the deal.&amp;nbsp; We have a number of iPhone devices used internally on the network.&amp;nbsp; Some get left in a desk drawer or powered off.&amp;nbsp; By the time those phones get powered back on, their certificate has expired and therefore cannot connect to our SSID that utilizes certificates in order to connect.&amp;nbsp; After finding this option above, I checked the box.&amp;nbsp; Created a policy rule to allow devices connecting to this SSID with an expired certificate to connect to the certificate (in a dACL associated to the rule) server in order to renew the certificate.&amp;nbsp; This rule is placed in front of the original rule that authenticates these devices by certificate.&amp;nbsp; This works.&amp;nbsp; However, that checkbox is a global setting for all the policies that we are using for both wired and wireless clients.&amp;nbsp; We have many other rules for clients to connect using certificates with other SSIDs and for wired connections as well.&amp;nbsp; How can I create a separate "Allowed Protocols" with this checked and then only have it apply to one wireless SSID so that I don't impact any other certificate authentication?&lt;/P&gt;
&lt;P&gt;Here is the link in the configuration guide:&amp;nbsp;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_segmentation.html#ID37" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_segmentation.html#ID37&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Search for "Table 11."&lt;/P&gt;
&lt;P&gt;Attached is the tool tip right out of ISE 3.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 20:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5192877#M591764</guid>
      <dc:creator>andrewdours</dc:creator>
      <dc:date>2024-09-10T20:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: Allow authentication of expired certificates - ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5192903#M591766</link>
      <description>&lt;P&gt;You could create a separate Policy Set for the SSID by using the 'RADIUS:Called-Station-ID ENDS_WITH' attribute and match on the new Allowed Protocols list. This is common practice for separating Policy Sets per SSID.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-09-11 at 8.39.40 AM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228891iF27D8981FCD32E82/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-09-11 at 8.39.40 AM.png" alt="Screenshot 2024-09-11 at 8.39.40 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You would just need to ensure the WLC is passing the SSID name in the RADIUS Authentication/Accounting messages.&lt;/P&gt;
&lt;P&gt;For the IOS-XE based 9800 WLC, this is configured in the Configuration &amp;gt; Security &amp;gt; AAA &amp;gt; AAA Advanced &amp;gt; Global Config section.&lt;BR /&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-09-11 at 8.44.11 AM.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228892i1E8D9471F6181FD7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2024-09-11 at 8.44.11 AM.png" alt="Screenshot 2024-09-11 at 8.44.11 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;For the older AireOS based WLCs, the configuration is done on the Security &amp;gt; RADIUS &amp;gt; Authentication/Accounting pages.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 22:50:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5192903#M591766</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-09-10T22:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allow authentication of expired certificates - ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5193394#M591786</link>
      <description>&lt;P&gt;Greg,&lt;/P&gt;
&lt;P&gt;Thank you.&amp;nbsp; This is helpful and looks to be exactly what I was looking for.&amp;nbsp; I'll run this by others on the team, schedule a maintenance window, and report back to this thread.&lt;/P&gt;
&lt;P&gt;Thanks again,&lt;/P&gt;
&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 18:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5193394#M591786</guid>
      <dc:creator>andrewdours</dc:creator>
      <dc:date>2024-09-11T18:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: Allow authentication of expired certificates - ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5202022#M592115</link>
      <description>&lt;P&gt;Wanted to put an update out here.&amp;nbsp; I made the change on Monday and the devices landed on the correct policy, but now I have a major problem where the expired certificate rule wireless ACL is not being applied for the device connection...&amp;nbsp; This wasn't happening before.&amp;nbsp; Separate issue that I'll need to work through.&amp;nbsp; Here's what I configured.&amp;nbsp; It's cut off, but he Authorization Profile for the rule where the certificate is expired, should apply a wireless ACL that permits only access to our Mobile Iron server.&amp;nbsp; That part is not working now.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andrewdours_1-1727813921537.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230382i31725580EAEB3295/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andrewdours_1-1727813921537.png" alt="andrewdours_1-1727813921537.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andrewdours_2-1727813948677.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230383iD6D5368F761FBDFD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andrewdours_2-1727813948677.png" alt="andrewdours_2-1727813948677.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andrewdours_3-1727814085087.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230386i03DB616091BC2CD7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andrewdours_3-1727814085087.png" alt="andrewdours_3-1727814085087.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 20:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5202022#M592115</guid>
      <dc:creator>andrewdours</dc:creator>
      <dc:date>2024-10-01T20:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: Allow authentication of expired certificates - ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5205279#M592293</link>
      <description>&lt;P&gt;Greg,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the help.&amp;nbsp; Your post was the solution.&amp;nbsp; The issue we had with regard to the ACL not applying was due to settings for the WLAN not being turned on as we had for the other WLANs.&amp;nbsp; After making those changes, the entire solution is working well.&amp;nbsp; Thanks again.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andrewdours_0-1728404851524.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/230842i8CF1D376803F3C18/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andrewdours_0-1728404851524.png" alt="andrewdours_0-1728404851524.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 16:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/allow-authentication-of-expired-certificates-ise/m-p/5205279#M592293</guid>
      <dc:creator>andrewdours</dc:creator>
      <dc:date>2024-10-08T16:28:10Z</dc:date>
    </item>
  </channel>
</rss>

