09-15-2025 08:16 AM
Currently have a 9800-40 w/ 100 APs associated and working as expected. The self-signed certificate used for AP Join is expiring next month and wanted to work on getting it renewed and replaced prior so as to not have any issues. I was reading this document:
and trying to get the required steps but a little unclear. Would I just need to issue the following:
conf t
crypto key generate rsa exportable general-keys modulus 2048 label ewlc-tp1
crypto pki trustpoint ewlc-tp1
rsakeypair ewlc-tp1
subject-name O=Cisco Wireless LAN Controller, CN=DEVICE-9800-WLC
revocation-check none
hash sha1
serial-number
eku request server-auth client-auth
password 0 cisco123
enrollment url http://172.25.80.10:80
end
crypto pki authenticate ewlc-tp1
crypto pki enroll ewlc-tp1
end
wireless management trustpoint ewlc-tp1
Is this correct? With respect to the currently connected APs, will anything need to be done w/ them other than a reboot of the AP at a later time to have them get the new certificate?
Solved! Go to Solution.
09-15-2025 08:21 AM
09-15-2025 09:01 AM
- @mumbles202 Are you sure that needs to be done ?
Ref : https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/221047-understand-certificate-and-trustpoint-ty.html
>...
>
M.
09-16-2025 07:55 AM
- @MHM Cisco World That information is not correct.
@mumbles202 To allow access points with expired certificates on the 9800 platform
checkout : https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html
Start reading from : 1. Use the Cisco C9800 command to accept expired certificates
complete steps 2. and 3. too !
M.
09-15-2025 08:21 AM
Why you not only bypass cert check ?
MHM
09-15-2025 09:01 AM
- @mumbles202 Are you sure that needs to be done ?
Ref : https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/221047-understand-certificate-and-trustpoint-ty.html
>...
>
M.
09-15-2025 10:28 AM
On the 9800 you don’t need to spin up a new external PKI trustpoint just to keep APs online — the AP join process relies on the controller’s SSC (self-signed certificate), which you can regenerate natively. The right flow is:
Generate a new self-signed certificate on the WLC (either via GUI → Configuration > Security > PKI Management > SSC or in CLI with wireless config vwlc-ssc generate
).
The controller will automatically update its SSC and push it during the AP join handshake.
Your APs don’t need to be re-provisioned; they’ll simply re-establish CAPWAP with the new cert. In most cases they won’t even drop until they next rejoin (reboot or session reset).
The PKI trustpoint config you pasted is the method if you want to use a CA-signed cert for management HTTPS or EAP-TLS. For AP join, the simpler and recommended path is to regenerate the built-in SSC.
So: just regenerate the SSC on the controller, reload if prompted, and your 100 APs will rejoin automatically. No per-AP manual action is required.
–––
Best regards,
Stefan Mihajlov
Mark this post as Helpful if it helped you, and Accept as Solution if it resolved your question.
09-16-2025 05:26 AM
I checked last night and confirmed that the controller is showing a MIC installed:
#show wireless management trustpoint
Trustpoint Name : CISCO_IDEVID_SUDI
Certificate Info : Available
Certificate Type : MIC
I think last time there was a reboot there were issues with some of the APs rejoining the controller and it might have actually been an issue w/ the expired certs on the APs since rolling back the time on the WLC corrected that temporarily. Would issuing this:
config ap cert-expiry-ignore mic enable
on the controller be the fist for that until those older APs can be replaced? Would anything need to be done w/ the SSC?
09-16-2025 05:28 AM
config ap cert-expiry-ignore mic enable <<- that what you need
Show trust points give you info about wlc not about AP cert
Here we need wlc bypass AP cert expired
MHM
09-16-2025 05:38 AM
@MHM Cisco World "config ap cert-expiry-ignore mic enable" is for AireOS not IOS-XE (9800).
Refer to field notice 63942 (link below) for equivalent config for 9800 WLC.
Also @mumbles202 what version of software are you using? (refer to TAC recommended link below)
CISCO_IDEVID_SUDI has been deprecated and replaced by CISCO_IDEVID_CMCA3_SUDI
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-9/release-notes/rn-17-9-9800.html#whatsnew1795
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-14/release-notes/rn-17-14-9800.html#behavior-change
09-16-2025 01:18 PM - edited 09-16-2025 01:20 PM
Please check Mark link
The command list as workaround for wlc 9800, AND YOU select it as solution.
""
Solutions for Expired WLC Certificates
Situation: The Cisco WLC does not run a fixed software release and some Cisco APs cannot join. Complete the following steps:
config ap cert-expiry-ignore {mic|ssc} enable
command."" MHM
09-16-2025 01:24 PM
Why are you continuing to advise AireOS commands @MHM Cisco World ?
09-16-2025 01:31 PM
This list in link you mark as solution?
And friend please don't mention me or send to me anything.
Let me reply other as you do.
MHM
09-16-2025 05:42 AM
9800WLC(config)# wireless management trustpoint <trustpoint-name>
9800WLC(config-trustpoint)# no revocation-check
9800WLC(config)# ap cert-expiry-ignore {mic | ssc | all}
MHM
09-16-2025 07:55 AM
- @MHM Cisco World That information is not correct.
@mumbles202 To allow access points with expired certificates on the 9800 platform
checkout : https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html
Start reading from : 1. Use the Cisco C9800 command to accept expired certificates
complete steps 2. and 3. too !
M.
09-16-2025 05:29 AM - edited 09-16-2025 08:05 AM
If you are using a self signed certificate then that is a mistake! That is only needed on the 9800-CL (virtual WLC).
The hardware appliances use the embedded Cisco Manufacturing Installed Certificate (MIC) for AP join.
This is how it should look:
9800#show wireless management trustpoint
Trustpoint Name : CISCO_IDEVID_CMCA3_SUDI
Certificate Info : Available
Certificate Type : MIC
Certificate Hash : 202958d68b57977e8df7d54b60c772ab13f84de5
Private key Info : Available
FIPS suitability : Not Applicable
09-16-2025 05:35 AM
Why misleading him
He ask about AP cert expired not wlc??
Please double check his request
MHM
09-16-2025 05:54 AM - edited 09-16-2025 01:16 PM
That's a very bold accusation! Everything I have stated is fact backed up by links to the relevant Cisco documentation.
I'm not the person who provided an AireOS command for an IOS-XE WLC.
And the post is clearly and unambiguously about the WLC certificate.
The AP join issues are secondary to the primary issue.
I provided answers to both issues - for 9800 WLC - which @Mark Elsen has reiterated and @mumbles202 has confirmed (as expected) that AireOS commands do not work on IOS-XE!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide