<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: config ap cert-expiry-ignore {mic|ssc} enable in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/3860942#M709</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Yes, that is correct, those with valid certs (not expired) will not be prone to man-in-the-middle attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
    <pubDate>Wed, 22 May 2019 14:28:58 GMT</pubDate>
    <dc:creator>Mark Elsen</dc:creator>
    <dc:date>2019-05-22T14:28:58Z</dc:date>
    <item>
      <title>config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/3860899#M707</link>
      <description>&lt;P&gt;We found a couple of old 1141N AP's in our network that were not associated with the controller. Upon investigation I found that the MIC had expired. We are currently running 8.3.133 on the controllers. If this command is used in the shot term, (until I can replace them with new models)&amp;nbsp; it will only be relevant to AP's with an expired MIC and not affect any other AP's from what I have read correct? Also would this leave them open to man-in-the middle attacks? Thank in advance!&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 17:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/3860899#M707</guid>
      <dc:creator>daswann</dc:creator>
      <dc:date>2021-07-05T17:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/3860942#M709</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Yes, that is correct, those with valid certs (not expired) will not be prone to man-in-the-middle attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 14:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/3860942#M709</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2019-05-22T14:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/3860952#M711</link>
      <description>&lt;P&gt;Thank you M. just wanted to make sure. I will be replacing the access points tomorrow so I won't need to use the command but wanted a second set of eyes on it.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 14:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/3860952#M711</guid>
      <dc:creator>daswann</dc:creator>
      <dc:date>2019-05-22T14:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4053625#M713</link>
      <description>&lt;P&gt;How do you determine the MIC on the expired AP?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 13:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4053625#M713</guid>
      <dc:creator>RHEA LINN</dc:creator>
      <dc:date>2020-03-27T13:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4053732#M715</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;FONT color="#0000FF"&gt; &amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;SPAN&gt;&lt;FONT color="#0000FF"&gt;AP_CLI&lt;/FONT&gt;#&lt;STRONG&gt;sh crypto pki certificates&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &lt;EM&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt; Look for the line containing &lt;STRONG&gt;end date&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 15:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4053732#M715</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2020-03-27T15:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4166823#M716</link>
      <description>&lt;P&gt;Hi Marce - Do you know if the older APs "with expired" certs will be vulnerable to MIMs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 15:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4166823#M716</guid>
      <dc:creator>steadroy_em1</dc:creator>
      <dc:date>2020-10-14T15:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4530558#M237056</link>
      <description>&lt;P&gt;&lt;FONT color="#0000FF"&gt;AP_CLI&lt;/FONT&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;STRONG&gt;sh crypto pki certificates&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does the AP check?&lt;BR /&gt;Does WLC check?&lt;/P&gt;&lt;P&gt;If I use config ap cert-expiry-ignore mic enable on WLC 5520 model, is AP OK in MIC authentication?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 03:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4530558#M237056</guid>
      <dc:creator>namyong1276</dc:creator>
      <dc:date>2022-01-13T03:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4650108#M244129</link>
      <description>&lt;P&gt;Hello Marce,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Hello,&lt;/SPAN&gt; &lt;SPAN class=""&gt;I have a Cisco WLC 2504 with version &lt;/SPAN&gt;&lt;A target="_blank"&gt;7.6.130.0&lt;/A&gt;&lt;SPAN class=""&gt; but both commands below are not available:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Command for Version &lt;/SPAN&gt;&lt;A target="_blank"&gt;7.0.252.0: &lt;/A&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;config ap lifetime-check {mic|ssc} enable &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Command for Versions &lt;/SPAN&gt;&lt;A target="_blank"&gt;7.4.140.0&lt;/A&gt;&lt;SPAN class=""&gt; and later: &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;config ap cert-expiry-ignore {mic|ssc} enable&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Please help&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN class=""&gt;Thank you,&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 14 Jul 2022 08:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4650108#M244129</guid>
      <dc:creator>tanios191</dc:creator>
      <dc:date>2022-07-14T08:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: config ap cert-expiry-ignore {mic|ssc} enable</title>
      <link>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4650133#M244135</link>
      <description>- You need at least 8.3.x for that.&lt;BR /&gt;&lt;BR /&gt; M.&lt;BR /&gt;</description>
      <pubDate>Thu, 14 Jul 2022 09:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/config-ap-cert-expiry-ignore-mic-ssc-enable/m-p/4650133#M244135</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-07-14T09:37:44Z</dc:date>
    </item>
  </channel>
</rss>

