<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CT5760 ap cert command in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4057501#M107959</link>
    <description>&lt;P&gt;Around 250 AP's are associated to WLC out of that 20 AP's are always trying to bouncing between controllers ( other Two Anchor controllers ) When they trying to connect 5760 it will download the image and trying to associate after some time it will again trying to associate other WLC and downloading the image..&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Apr 2020 09:51:13 GMT</pubDate>
    <dc:creator>AK002</dc:creator>
    <dc:date>2020-04-02T09:51:13Z</dc:date>
    <item>
      <title>CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056061#M107954</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What will be the equivalent command for&amp;nbsp; (WLC)&amp;gt;&lt;SPAN&gt;&lt;STRONG&gt;config ap cert-expiry-ignore {mic|ssc} enable&amp;nbsp;&lt;/STRONG&gt;in Cisco&amp;nbsp;CT5760 wireless controller, We suspect some certificate issue between controller and access point.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;AIR-CT5760 03.06.05E&lt;/P&gt;&lt;P&gt;AP - 3700&lt;/P&gt;&lt;P&gt;Some of the AP's&amp;nbsp; keep on reconnecting and joining other controllers in the setup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&lt;STRONG&gt;Error message&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;PKI-3-CERTIFICATE_INVALID_EXPIRED : Certificate chain validation has failed. The certificate (SN : [chars]) has expired. Validity period ended on [chars]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 05 Jul 2021 18:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056061#M107954</guid>
      <dc:creator>AK002</dc:creator>
      <dc:date>2021-07-05T18:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056607#M107955</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Strange could you check the end date of the certificate on the AP with :&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;AP_CLI# show crypto pki certificates&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;then look for the string &lt;FONT color="#0000FF"&gt;end date&lt;/FONT&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 09:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056607#M107955</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2020-04-01T09:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056711#M107956</link>
      <description>&lt;P&gt;&lt;BR /&gt;show crypto pki certificates&lt;BR /&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 01&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Root CA M2&lt;BR /&gt;o=Cisco&lt;BR /&gt;Subject:&lt;BR /&gt;cn=Cisco Root CA M2&lt;BR /&gt;o=Cisco&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 13:00:18 UTC Nov 12 2012&lt;BR /&gt;end date: 06:32:02 UTC Oct 7 1901&lt;BR /&gt;Associated Trustpoints: cisco-m2-root-cert&lt;BR /&gt;Storage:&lt;/P&gt;&lt;P&gt;Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 71B9E8530000000C2D3D&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Manufacturing CA SHA2&lt;BR /&gt;o=Cisco&lt;BR /&gt;--More-- &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8; &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8; Subject:&lt;BR /&gt;Name: AP3&lt;BR /&gt;e=support@cisco.com&lt;BR /&gt;cn=AP&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;l=San Jose&lt;BR /&gt;st=California&lt;BR /&gt;c=US&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://www.cisco.com/security/pki/crl/cmca2.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/cmca2.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 09:49:27 UTC Jun 4 2016&lt;BR /&gt;end date: 09:59:27 UTC Jun 4 2026&lt;BR /&gt;Associated Trustpoints: Cisco_IOS_M2_MIC_cert&lt;BR /&gt;Storage:&lt;/P&gt;&lt;P&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 02&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Root CA M2&lt;BR /&gt;o=Cisco&lt;BR /&gt;--More-- &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8; &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8; Subject:&lt;BR /&gt;cn=Cisco Manufacturing CA SHA2&lt;BR /&gt;o=Cisco&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://www.cisco.com/security/pki/crl/crcam2.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/crcam2.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 13:50:58 UTC Nov 12 2012&lt;BR /&gt;end date: 06:32:01 UTC Oct 7 1901&lt;BR /&gt;Associated Trustpoints: Cisco_IOS_M2_MIC_cert&lt;BR /&gt;Storage:&lt;/P&gt;&lt;P&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 00&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Issuer:&lt;BR /&gt;e=support@airespace.com&lt;BR /&gt;cn=ca&lt;BR /&gt;ou=none&lt;BR /&gt;o=airespace Inc&lt;BR /&gt;l=San Jose&lt;BR /&gt;st=California&lt;BR /&gt;c=US&lt;BR /&gt;--More-- &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8; &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8; Subject:&lt;BR /&gt;e=support@airespace.com&lt;BR /&gt;cn=ca&lt;BR /&gt;ou=none&lt;BR /&gt;o=airespace Inc&lt;BR /&gt;l=San Jose&lt;BR /&gt;st=California&lt;BR /&gt;c=US&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 23:38:55 UTC Feb 12 2003&lt;BR /&gt;end date: 23:38:55 UTC Nov 11 2012&lt;BR /&gt;Associated Trustpoints: airespace-old-root-cert&lt;BR /&gt;Storage:&lt;/P&gt;&lt;P&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 03&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Issuer:&lt;BR /&gt;e=support@airespace.com&lt;BR /&gt;cn=Airespace Root CA&lt;BR /&gt;ou=Engineering&lt;BR /&gt;o=Airespace Inc.&lt;BR /&gt;--More-- &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8; &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8; l=San Jose&lt;BR /&gt;st=California&lt;BR /&gt;c=US&lt;BR /&gt;Subject:&lt;BR /&gt;e=support@airespace.com&lt;BR /&gt;cn=Airespace Device CA&lt;BR /&gt;ou=Engineering&lt;BR /&gt;o=Airespace Inc.&lt;BR /&gt;l=San Jose&lt;BR /&gt;st=California&lt;BR /&gt;c=US&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 22:37:13 UTC Apr 28 2005&lt;BR /&gt;end date: 22:37:13 UTC Jan 26 2015&lt;BR /&gt;Associated Trustpoints: airespace-device-root-cert&lt;BR /&gt;Storage:&lt;/P&gt;&lt;P&gt;Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 5615E28A00000003E644&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Manufacturing CA&lt;BR /&gt;=Cisco Systems&lt;BR /&gt;Subject:&lt;BR /&gt;Name: AP&lt;/P&gt;&lt;P&gt;e=support@cisco.com&lt;BR /&gt;cn=AP&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;l=San Jose&lt;BR /&gt;st=California&lt;BR /&gt;c=US&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://www.cisco.com/security/pki/crl/cmca.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/cmca.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 09:46:55 UTC Jun 4 2016&lt;BR /&gt;end date: 09:56:55 UTC Jun 4 2026&lt;BR /&gt;Associated Trustpoints: Cisco_IOS_MIC_cert&lt;BR /&gt;Storage:&lt;/P&gt;&lt;P&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 6A6967B3000000000003&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Root CA 2048&lt;BR /&gt;=Cisco Systems&lt;BR /&gt;Subject:&lt;BR /&gt;cn=Cisco Manufacturing CA&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://www.cisco.com/security/pki/crl/crca2048.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/crca2048.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 22:16:01 UTC Jun 10 2005&lt;BR /&gt;end date: 20:25:42 UTC May 14 2029&lt;BR /&gt;Associated Trustpoints: Trustpool Cisco_IOS_MIC_cert&lt;BR /&gt;Storage:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 11:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056711#M107956</guid>
      <dc:creator>AK002</dc:creator>
      <dc:date>2020-04-01T11:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056915#M107957</link>
      <description>Check if the date and time is correct on the WLC (NTP enabled). &lt;BR /&gt;Although some CA certs have an expiration in the past 19xx, which is quite weird. &lt;BR /&gt;The AP certificate looks fine:&lt;BR /&gt;Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 5615E28A00000003E644&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Manufacturing CA&lt;BR /&gt;=Cisco Systems&lt;BR /&gt;Subject:&lt;BR /&gt;Name: AP&lt;BR /&gt;&lt;BR /&gt;e=support@cisco.com&lt;BR /&gt;cn=AP&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;l=San Jose&lt;BR /&gt;st=California&lt;BR /&gt;c=US&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://www.cisco.com/security/pki/crl/cmca.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/cmca.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 09:46:55 UTC Jun 4 2016&lt;BR /&gt;end date: 09:56:55 UTC Jun 4 2026&lt;BR /&gt;Associated Trustpoints: Cisco_IOS_MIC_cert</description>
      <pubDate>Wed, 01 Apr 2020 15:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056915#M107957</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2020-04-01T15:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056938#M107958</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;EM&gt;&amp;gt;Some of the AP's&amp;nbsp; keep on reconnecting and joining other controllers in the setup.&amp;nbsp;&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- What do&amp;nbsp; you mean by this sentence ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 16:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4056938#M107958</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2020-04-01T16:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4057501#M107959</link>
      <description>&lt;P&gt;Around 250 AP's are associated to WLC out of that 20 AP's are always trying to bouncing between controllers ( other Two Anchor controllers ) When they trying to connect 5760 it will download the image and trying to associate after some time it will again trying to associate other WLC and downloading the image..&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 09:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4057501#M107959</guid>
      <dc:creator>AK002</dc:creator>
      <dc:date>2020-04-02T09:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4057514#M107960</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- This is not advisable and may somehow be an underlying cause of your original issue; AP should use dedicated and known controller by for instance using DHCP option 43 to direct the AP to the &lt;FONT color="#0000FF"&gt;&lt;U&gt;intended&lt;/U&gt; controller&lt;/FONT&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 10:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4057514#M107960</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2020-04-02T10:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4057574#M107961</link>
      <description>Yes from the AP end we have mentioned the primary controller, But some how the WLC is not accepting the AP join request.&lt;BR /&gt;&lt;BR /&gt;Raising a case with Cisco TAC, Thanks for the help..</description>
      <pubDate>Thu, 02 Apr 2020 11:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4057574#M107961</guid>
      <dc:creator>AK002</dc:creator>
      <dc:date>2020-04-02T11:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4076623#M107962</link>
      <description>&lt;P&gt;&lt;SPAN&gt;PLEASE ANSWER THIS QUESTION "What will be the equivalent command for&amp;nbsp; (WLC)&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;config ap cert-expiry-ignore {mic|ssc} enable&amp;nbsp;&lt;/STRONG&gt;in Cisco&amp;nbsp;CT5760 wireless controller",&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have the same issue with 1142N&amp;nbsp; APs certification expiring&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 19:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4076623#M107962</guid>
      <dc:creator>FrankCerniglia5327</dc:creator>
      <dc:date>2020-04-29T19:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4076923#M107963</link>
      <description>&lt;P&gt;I just had a look at the bug, field notice and community entry and I could nowhere find the 5760 mentioned.&lt;/P&gt;
&lt;P&gt;I wonder if this controller is affected at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The information I've checked:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/wireless-mobility-documents/lightweight-ap-fail-to-create-capwap-lwapp-connection-due-to/ta-p/3155111" target="_blank"&gt;https://community.cisco.com/t5/wireless-mobility-documents/lightweight-ap-fail-to-create-capwap-lwapp-connection-due-to/ta-p/3155111&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuq19142" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuq19142&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One workaround that works with all other WLC was to create your own certificate and roll it out to the APs, I wonder if that workaround would also work here.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2020 06:47:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4076923#M107963</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2020-04-30T06:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4077420#M107964</link>
      <description>&lt;P&gt;I have several AP's out&amp;nbsp; but when I&amp;nbsp; turn back the date, the AP's comes up&amp;nbsp; but can I keep the date&amp;nbsp; incorrect in the&amp;nbsp; &amp;nbsp;5760 Controller with out effecting the network? I just have&amp;nbsp; a lot of old&amp;nbsp; AP's 1140's&amp;nbsp; and I am afraid they will all shut down. We are updating the WLC with 9800&amp;nbsp; but&amp;nbsp; hot ready yet&amp;nbsp; from the 5760 Controller. we will have to replace them&amp;nbsp; but I need to make them work till that happen, I tried these command s but&amp;nbsp; they do not take (bellow)&amp;nbsp; is there another&amp;nbsp; command that does the same for the 5760?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;config ap lifetime-check {mic|ssc} enable&lt;/P&gt;&lt;P&gt;config ap cert-expiry-ignore {mic|ssc} enable&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2020 18:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4077420#M107964</guid>
      <dc:creator>FrankCerniglia5327</dc:creator>
      <dc:date>2020-04-30T18:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4077741#M107965</link>
      <description>I think it's not a big problem to leave the date in the past, as long as you don't use any certificate based authentication on the WLC. Of course, all logfiles have a wrong date then.&lt;BR /&gt;&lt;BR /&gt;Did you look at the workaround with your own certificates for the APs?</description>
      <pubDate>Fri, 01 May 2020 06:41:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4077741#M107965</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2020-05-01T06:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4171687#M107966</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Did you ever find a command for this? We have a similar issue with anchor controllers with expired certificates not forming mobility tunnels with our 5760.&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;P&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 11:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4171687#M107966</guid>
      <dc:creator>pwilliams86</dc:creator>
      <dc:date>2020-10-22T11:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4485168#M234394</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Just in case anyone would still need this, since it was quite a pain on my side to find out:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;9800-1#conf t&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;9800-1(config)#crypto pki certificate map &amp;lt;mapname&amp;gt; 1&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;9800-1(ca-certificate-map)#issuer-name co Cisco Manufacturing CA&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;9800-1(ca-certificate-map)#exit&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;9800-1(config)#crypto pki trustpool policy&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;9800-1(ca-trustpool)#match certificate &amp;lt;mapname&amp;gt; allow expired-certificate&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;9800-1(ca-trustpool)#end&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;This is mainly used for inter-controller links (anchor and such), but i believe it should be fine for AP certs too (though i did not have any problems with the APs on my 5760s so I cannot be 100% sure).&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Best regards,&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 10:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/4485168#M234394</guid>
      <dc:creator>Axsuptls</dc:creator>
      <dc:date>2021-10-13T10:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: CT5760 ap cert command</title>
      <link>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/5075222#M270547</link>
      <description>&lt;P&gt;We are still using 5760 WLCs because of delays in upgrading our network and ran into this issue today and can confirm that this config fixes the issue&lt;/P&gt;&lt;P&gt;&lt;EM&gt;WLC01#show ap summary&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Number of APs: 534&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;WLC01#conf t&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;WLC01(config)#crypto pki certificate map ap-cert-expired 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;WLC01(ca-certificate-map)#issuer-name co Cisco Manufacturing CA&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;WLC01(ca-certificate-map)#exit&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;WLC01(config)#crypto pki trustpool policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;WLC01(ca-trustpool)#match certificate ap-cert-expired allow expired-certificate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;WLC01(ca-trustpool)#end&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;WLC01#&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;WLC01#show ap summary&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Number of APs: 543&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;We saw an immediate jump in the number of APs joined. Many thanks Axsuptls.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 12:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ct5760-ap-cert-command/m-p/5075222#M270547</guid>
      <dc:creator>Pdub3850</dc:creator>
      <dc:date>2024-04-22T12:59:10Z</dc:date>
    </item>
  </channel>
</rss>

