<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: C1111 + APIC-EM PnP issue in Controllers</title>
    <link>https://community.cisco.com/t5/controllers/c1111-apic-em-pnp-issue/m-p/4112255#M344</link>
    <description>&lt;P&gt;So I figured this one out on my own..&lt;/P&gt;&lt;P&gt;When using cloud redirect(PnP Connect), it automatically copies the certificate of your PnP server, which in our case had just been renewed. I believe the reason behind this, is that it allows self-signed certificates to be validated by the cisco device when it is redirected to the PnP server.&lt;/P&gt;&lt;P&gt;In our case we use publicly signed certs, and it had just been renewed - and the cloud redirect thing doesn't automatically renew its copy, so the cisco device is fed an old cert which then does not match up any more..&lt;/P&gt;</description>
    <pubDate>Thu, 02 Jul 2020 05:57:33 GMT</pubDate>
    <dc:creator>steffenschumacher</dc:creator>
    <dc:date>2020-07-02T05:57:33Z</dc:date>
    <item>
      <title>C1111 + APIC-EM PnP issue</title>
      <link>https://community.cisco.com/t5/controllers/c1111-apic-em-pnp-issue/m-p/4108792#M343</link>
      <description>&lt;P&gt;So I had a working solution where I could deploy new DMVPN routers (C1111) using our APIC EM instance over the internet, using cloud redirect, where both a cert is deployed, IOS is upgraded and config is deployed.&lt;/P&gt;&lt;P&gt;Now I've found that this stopped working - and I'm not sure how this happened..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cloud redirect still works, and the a pnp profile is deployed, and the cert from APIC-EM is deployed (as its also our PKI).&lt;/P&gt;&lt;P&gt;But then APIC EM gets stuck, reporting:&amp;nbsp;ERROR_HEALTH_CHECK_TIMER_EXPIRED,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Failed health check since device is stuck in non-terminal state DEVICE_INFO_REQUESTED for more than threshold time: 0 hours, 16 minutes, 0 seconds&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:20.872: %PKI-2-NON_AUTHORITATIVE_CLOCK: PKI functions can not be initialized until an authoritative time source, like NTP, can be obtained.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:22.399: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-2789104647 has been generated or imported by crypto-engine&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:22.400: %SSH-5-ENABLED: SSH 1.99 has been enabled&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:22.457: %PKI-4-NOCONFIGAUTOSAVE: Configuration was modified.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Issue "write memory" to save new IOS PKI configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:22.527: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-2789104647.server has been generated or imported by crypto-engine&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;%Error opening tftp://255.255.255.255/network-confg (Timed out)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:48.621: %PNP-6-HTTP_CONNECTING: PnP Discovery trying to connect to PnP server &lt;A href="https://52.203.231.173:443/pnp/HELLO" target="_blank" rel="noopener"&gt;https://52.203.231.173:443/pnp/HELLO&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:49.121: %PNP-6-HTTP_CONNECTED: PnP Discovery connected to PnP server &lt;A href="https://52.203.231.173:443/pnp/HELLO" target="_blank" rel="noopener"&gt;https://52.203.231.173:443/pnp/HELLO&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:51.405: AUTOINSTALL: Tftp script execution not successful for Gi0/0/0.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:05:57.184: %PNP-6-PNP_DISCOVERY_DONE: PnP Discovery done successfully&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:06:10.147: %AN-6-AN_ABORTED_BY_CONSOLE_INPUT: Autonomic disabled due to User intervention on console. configure 'autonomic' to enable it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Jun 24 12:06:12.000: %SYS-6-CLOCKUPDATE: System clock has been updated from 12:06:11 UTC Wed Jun 24 2020 to 12:06:12 UTC Wed Jun 24 2020, configured from console by vty0. &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Jun 24 12:06:12.001: %PKI-6-AUTHORITATIVE_CLOCK: The system clock has been set.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Jun 24 12:06:13.120: %PKI-4-NOCONFIGAUTOSAVE: Configuration was modified.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Issue "write memory" to save new IOS PKI configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Router#sh run | sec pnp pro&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;pnp profile pnp_redirection_profile&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;transport https host yyy.xxxxx.com port 443 remotecert primary-cert&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;APIC-EM version is&amp;nbsp;1.6.3.114 and the c1111 is 16.9.2 out of the box.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I've attached a log of the console, but I can't find any smoking guns..&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 14:38:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/controllers/c1111-apic-em-pnp-issue/m-p/4108792#M343</guid>
      <dc:creator>steffenschumacher</dc:creator>
      <dc:date>2020-06-24T14:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: C1111 + APIC-EM PnP issue</title>
      <link>https://community.cisco.com/t5/controllers/c1111-apic-em-pnp-issue/m-p/4112255#M344</link>
      <description>&lt;P&gt;So I figured this one out on my own..&lt;/P&gt;&lt;P&gt;When using cloud redirect(PnP Connect), it automatically copies the certificate of your PnP server, which in our case had just been renewed. I believe the reason behind this, is that it allows self-signed certificates to be validated by the cisco device when it is redirected to the PnP server.&lt;/P&gt;&lt;P&gt;In our case we use publicly signed certs, and it had just been renewed - and the cloud redirect thing doesn't automatically renew its copy, so the cisco device is fed an old cert which then does not match up any more..&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 05:57:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/controllers/c1111-apic-em-pnp-issue/m-p/4112255#M344</guid>
      <dc:creator>steffenschumacher</dc:creator>
      <dc:date>2020-07-02T05:57:33Z</dc:date>
    </item>
  </channel>
</rss>

