Expired Cisco's Versigin certificate

Hi all and happy easter
Actually I try to setup AnyConnect on my new laptop using web deployment of my ASA5505 and get an problem with an expired certificate.
ASA 9.2.3
ASDM 7.4.1
AnyConnect 3.1.7021
CN="Cisco Systems, Inc."
From: Jan 03 2013
To: Apr 05 2015
What I have to do?  In my Certificate list is no Versign Certificate available which is expired on Apr 05 2015.
Temporarily I have added my hostname to the java exception list. But thats not the generally fix I hope ;-)
regards,
Chris

Thanks for you answer Marvin,
here the requested output...
show crypto ca trustpoints
Result of the command: "show crypto ca trustpoints"
Trustpoint COMODO:
    Not authenticated.
Trustpoint ASDM_TrustPoint0:
    Not authenticated.
Trustpoint ASDM_TrustPoint2:
    Configured for self-signed certificate generation.
Trustpoint ASDM_TrustPoint6:
    Not authenticated.
Trustpoint LOCAL-CA-SERVER:
    Subject Name: 
    cn=site.mydomain.com
          Serial Number: 4a
    Certificate configured.
Trustpoint ASDM_TrustPoint3:
    Subject Name: 
    cn=EssentialSSL CA
    o=COMODO CA Limited
    l=Salford
    st=Greater Manchester
    c=GB
          Serial Number: 18f2cbbaa304f1a00fc1f2f326462a4a
    Certificate configured.
Trustpoint ASDM_TrustPoint4:
    Subject Name: 
    cn=COMODO RSA Domain Validation Secure Server CA
    o=COMODO CA Limited
    l=Salford
    st=Greater Manchester
    c=GB
          Serial Number: 2f2e6eead975366c148a6edba37c8c07
    Certificate configured.
Trustpoint ASDM_TrustPoint4-1:
    Subject Name: 
    cn=COMODO RSA Certification Authority
    o=COMODO CA Limited
    l=Salford
    st=Greater Manchester
    c=GB
          Serial Number: 2766fe56eb49f38eabd770a2fc84de22
    Certificate configured.
Trustpoint ASDM_Launcher_Access_TrustPoint_0:
    Configured for self-signed certificate generation.
show ssl
Result of the command: "show ssl"
Accept connections using SSLv2 or greater and negotiate to TLSv1
Start connections using TLSv1 only and negotiate to TLSv1 only
Enabled cipher order: 3des-sha1 des-sha1 rc4-md5 aes128-sha1 aes256-sha1
SSL trust-points:
  Default: ASDM_TrustPoint2
  inside VPNLB interface: ASDM_TrustPoint2
  inside interface: ASDM_TrustPoint4
  outside interface: ASDM_TrustPoint4
Certificate authentication is not enabled
show run ssl
Result of the command: "show run ssl"
ssl encryption 3des-sha1 des-sha1 rc4-md5 aes128-sha1 aes256-sha1
ssl trust-point ASDM_TrustPoint2
ssl trust-point ASDM_TrustPoint2 inside vpnlb-ip
ssl trust-point ASDM_TrustPoint4 inside
ssl trust-point ASDM_TrustPoint4 outside

Similar Messages

  • How can I check the expiration date of a Certificate Keychain from terminal?

    Hello, I am writing a bash script to alert me when my corporate certificates are about to expire. How can I check the expiration date of a certificate in keychain? I'm running Mac OS 10.6.8 on a newer MacBook pro with full admin rights.
    Specifically I will be checking three certs: a Root Authority, Issuing Authority, and a user cert (Identity).
    I was exploring the Security and Openssl command line tools. But I can't seem to get the info I need.
    Any recommendations would be appreciated.
    Thank you!

    Anyone?

  • Re: I have expired My Best Buy Certificate  is it true I can get them replaced

    Yeah, just noticed I lost out on a $55 cert. Even made a purchase of $20 while it was issued and was told there were no certs available. Not sure what I think about all of this / Best Buy at the moment after spending $3k in store this year.

    Hi mestevo, and welcome to the Best Buy forum,
    I used the email address you registered with the forum to review your My Best Buy™ account, and I do see that a $55 certificate recently expired.  Once a certificate has officially expired, it cannot be reissued.  Being that the certificate was active at the time of your most recent purchase, we should have been able to check your account at the register and see that it was available.  While you may not have been able to use the certificate then, we could have at least reminded you about it.
    I am showing that you currently have Elite status, which means you should have the option to BANK your points.  I would strongly encourage you to change your certificate preference to BANK so that you can decide when a certificate is issued and avoid another automatically issued certificate from expiring.  You can change your preference by logging into BestBuy.com and clicking on "Rewards" under the My Best Buy™ tab.
    To ensure that your preference is changed to BANK correctly and to see if I can answer any other questions you may have, I will be sending you a private message.  You can check your private messages by logging into the forum and clicking on the envelope icon located at the top of the page.
    My Best Buy™ Program Terms
    Thank you for reaching out to us.
    Derek|Social Media Specialist | Best Buy® Corporate
     Private Message

  • Expired encryption and Trust certificates

    Suppose:
    a Mac OS X 10.8 server shut down for summer,
    Linked to Active Directory Win Serv 2008 R2 x64,
    Managing Macs and iDevices,
    with an encription certificate expired early June 2013
    and a Trust certificate expired late August 2013.
    1- Do I read correctly that all Macs and iDevice (and Net Boot/Restore/install images) need to be reimaged with the New certificates?
    2- Do I unedrstand also that all Update Server's Apple Updates need to be redownloaded. (just read that tonight).
    3- What other thing to do in that case and in which order?
    4- If nothing very important was done on that OS X server besides being linked to Active Directory and a few test Wikis., it it easier to rinstall from scratch?
    ==

    I'd want a correct, current and valid certificate chain (and would likely set up a private CA, as is my wont), as bad certs can block some sorts of secure network access until either corrected or overridden, and as training the end-users to always "yeah, whatever" with certificate security can potentially lead to... well, other issues.
    The software update server will certainly download new and updated changes, but shouldn't need to re-download everything.  Disk images will need to be updated.
    I'd verify proper local DNS services and correct certs as part of the initial validation of the configuration, yes.
    That's entirely your call.  Won't really help with the disk images, and will require a re-download of updates.

  • SSLVPN with iPhone Anyconnect and Cisco IOS Router, Certificate Authentication failed

    Hello,
    i have a problem regarding the authentication with a certificate from the iPhone Anyconnect 2.5 Client to a 1802 Cisco Router.
    Cisco 1802 Router:
    Cisco IOS Software, C180X Software (C180X-ADVENTERPRISEK9-M), Version 15.1(1)T, RELEASE SOFTWARE (fc1)
    First i configured SSLVPN with username and password, in this configuration the Anyconnect Client of my iPhone works.
    then i enrolled a certificate from my Windows 2008 R2 CA to the Router with the Attributes: Server Authentication and IPSEC
    and i enrolled a certificate for my iPhone with Client Authentication and IPSEC
    after a bunch of time ( i realy could not find a really good documentation on how to do this) i got it done, in the webvpn context configuration i made this changes here:
    no aaa authentication list default
    authentication certificate
    ca trustpoint CA
    as the "SSL VPN Configuration Guide, Cisco IOS Release 15.1M&T" says: if i want only certificate authentication i had to user the "authentication certificate" command and thats it.
    as i look into the debugs it seems to me that the Router accepts the certificate of the iPhone, but then i receive a window on the iphone that wants an additional username and password authentication, and no matter what i enter there's always the same dialog coming back..
    any ideas what the problem could be???
    here is the configuration:
    webvpn gateway WEBVPN_GW_OFFICE2
    ip interface Dialer0 port 1444
    ssl trustpoint CA
    inservice
    webvpn install svc flash:/webvpn/sslclient-win-1.1.4.179.pkg sequence 1
    webvpn install svc flash:/webvpn/anyconnect-win-3.0.4235-k9.pkg sequence 2
    webvpn install svc flash:/webvpn/anyconnect-dart-win-2.5.3055-k9.pkg sequence 3
    webvpn context WEBVPN_CONTEXT2
    secondary-color white
    title-color #669999
    text-color black
    ssl authenticate verify all
    policy group WEBVPN_POLICY2
       functions svc-enabled
       mask-urls
       svc address-pool "SSLVPN_OFFICE1"
       svc default-domain "domain.internal"
       svc keep-client-installed
       svc split include 192.168.0.0 255.255.0.0
       svc dns-server primary 192.168.53.33
       svc dns-server secondary 192.168.53.35
    virtual-template 3
    default-group-policy WEBVPN_POLICY2
    gateway WEBVPN_GW_OFFICE2
    authentication certificate
    ca trustpoint CA
    inservice
    here is the debug:
    OfficeRouter1# PASSING appctx is [0x89FAFFCC]
    Nov 19 22:39:53.507: WV: sslvpn process rcvd context queue event
    Nov 19 22:39:53.507: WV: sslvpn process rcvd context queue event
    Nov 19 22:39:53.607: WV: sslvpn process rcvd context queue event
    Nov 19 22:39:53.607: WV: Entering APPL with Context: 0x86529380,
          Data buffer(buffer: 0x86543A40, data: 0x15A07AB8, len: 469,
          offset: 0, domain: 0)
    Nov 19 22:39:53.607: WV: http request: / with no cookie
    Nov 19 22:39:53.607: WV: validated_tp : CA cert_username :  matched_ctx :
    Nov 19 22:39:53.607: WV: Received appinfo
    validated_tp : CA, matched_ctx : ,cert_username :
    Nov 19 22:39:53.607: WV: Trustpoint match successful
    Nov 19 22:39:53.607: WV: Extracted username:  pass: ?
    Nov 19 22:39:53.607: WV: Client side Chunk data written..
    buffer=0x86543640 total_len=661 bytes=661 tcb=0x8811FE60
    Nov 19 22:39:53.607: WV: Appl. processing Failed : 2
    Nov 19 22:39:53.607: WV: sslvpn process rcvd context queue event
    BueroRouter1# PASSING appctx is [0x89FAEEC4]
    Nov 19 22:40:24.028: WV: sslvpn process rcvd context queue event
    Nov 19 22:40:24.032: WV: sslvpn process rcvd context queue event
    Nov 19 22:40:24.132: WV: sslvpn process rcvd context queue event
    Nov 19 22:40:24.132: WV: Entering APPL with Context: 0x86529380,
          Data buffer(buffer: 0x86543A40, data: 0x160C4038, len: 469,
          offset: 0, domain: 0)
    Nov 19 22:40:24.132: WV: http request: / with no cookie
    Nov 19 22:40:24.132: WV: validated_tp : CA cert_username :  matched_ctx :
    Nov 19 22:40:24.132: WV: Received appinfo
    validated_tp : CA, matched_ctx : ,cert_username :
    Nov 19 22:40:24.132: WV: Trustpoint match successful
    Nov 19 22:40:24.132: WV: Extracted username:  pass: ?
    Nov 19 22:40:24.132: WV: Client side Chunk data written..
    buffer=0x86543640 total_len=661 bytes=661 tcb=0x88D11EEC
    Nov 19 22:40:24.136: WV: Appl. processing Failed : 2
    Nov 19 22:40:24.136: WV: sslvpn process rcvd context queue event
    Nov 19 22:40:39.764: WV: sslvpn process rcvd context queue event
    Nov 19 22:40:39.880: WV: sslvpn process rcvd context queue event
    Nov 19 22:40:39.892: WV: sslvpn process rcvd context queue event
    Nov 19 22:40:39.892: WV: Entering APPL with Context: 0x86529380,
          Data buffer(buffer: 0x86543A40, data: 0x1616FD38, len: 610,
          offset: 0, domain: 0)
    Nov 19 22:40:39.892: WV: http request: /webvpn.html with domain cookie
    Nov 19 22:40:39.892: WV: validated_tp :  cert_username :  matched_ctx :
    Nov 19 22:40:39.892: WV: Received appinfo
    validated_tp : CA, matched_ctx : ,cert_username :
    Nov 19 22:40:39.892: WV: Trustpoint match successful
    Nov 19 22:40:39.892: WV: Client side Chunk data written..
    buffer=0x86543640 total_len=607 bytes=607 tcb=0x88D11EEC
    Nov 19 22:40:39.892: WV: Appl. processing Failed : 2
    Nov 19 22:40:39.892: WV: sslvpn process rcvd context queue event

    http://www.cisco.com/en/US/products/ps8411/products_qanda_item09186a00809aec31.shtml
    HI,
    Refer to
    AnyConnect VPN Client FAQ
    Q. Is it possible to connect the iPad, iPod, or iPhone AnyConnect VPN Client to a Cisco IOS router?
    A. No. It is not possible to connect  the iPad, iPod, or iPhone AnyConnect VPN Client to a Cisco IOS router.  AnyConnect on iPad/iPhone can connect only to an ASA that runs version  8.0(3).1 or later. Cisco IOS is not supported by the AnyConnect VPN  Client for Apple iOS. For more information, refer to the Security Appliances and Software Supported section of the Release Notes for Cisco AnyConnect Secure Mobility Client 2.4, Apple iOS 4.2 and 4.3.

  • Using Cisco VPN client certificate for built in IPSec?

    Hi,
    Does anybody know if it is possible to "convert" a certificate exported from Cisco VPN client and import it into the Keychain for using it with built-in IPSec in Snow Leopard?
    Thanks,
    Oli

    I too am having trouble importing the Cisco certificate. It would be nice for some clear documentation. We've been successful converting the x.509 cer to KPCS#7 using openssl which will import into the keychain. However, the VPN (Cisco IPSec) sill doesn't see it.

  • Expired AD User Object certificate

    We have an expired certificate under Active Directory User Object > Certificates.
    Can someone please tell me to renew or re-create this certificate?

    Hi,
    We cannot renew expired certificate, you can request a new certificate instead.
    If you are using enterprise CA, you can refer to this article below to request a new certificate:
    Request a Certificate
    http://technet.microsoft.com/en-us/library/cc730689.aspx
    For stand-alone CA:
    How to Obtain a Certificate Using Windows Server 2003 Stand-Alone CA in Operations Manager 2007
    http://technet.microsoft.com/en-us/library/bb735417.aspx
    How to Obtain a Certificate Using Windows Server 2008 Stand-Alone CA
    http://technet.microsoft.com/en-us/library/hh467905.aspx
    Best Regards,
    Amy

  • From time to time, I can't verify the expiration of my client certificate on IIS.

    I have a IIS web server and a CA(AD CS) server built on a 2008R2 virtual machine.
    I require a client certificate in order to access the web server.
    It works very well but FROM TIME TO TIME, a 403 error code is returned.
    According to the trace log(FailedReqLogFiles), a 0x80092013 error occurs.
    Once this 403 error occurs, it last for about an hour and then everything goes back to normal.
    In order to find out what is the problem, I have done setup:
    - CRL has a publication time of 1 hour
    - (Delta CRL) has a publication time of 30minutes.
    also:
    - Both web server and CA server are not on a domain but a workgroup
    - The CA certificate is registered on the web server & client on the root & intermediate certificate registrar.
    - Both setups are patched to the latest windows update
    As far as I've checked the log:
    - on the web server log(source: CAPI2), there is an event id 53 at almost every hour for both the CRL & delta CRL
    but before the problem occurs the event id 53 is only reported on the delta CRL and nothing on the CRL.
    - By the way, System32\config\systemprofile\AppData\LocalLow\Microsoft\X509Objects, the .crl file for the problematic update is only present on the delta CRL.
    - On the CA server's IIS access log, there is just the delta CRL access that is registered.
    - Below is the log on the CA server IIS's access log (XXX-CA is for anonymous sake):
    2014-04-16 10:51:34 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1).crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 218
    2014-04-16 10:51:39 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1)+.crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 202
    2014-04-16 11:52:05 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1)+.crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 265
    2014-04-16 12:52:22 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1).crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 218
    2014-04-16 12:52:28 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1)+.crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 202
    - I think that the 403 error is due to the fact this CRL is not getting reached but why would this happen?
    - Is there an other way than to restart the OS in order to clear this problem in a shorter time than 1 hour?
    side note:
    - this problem happens on the client setup too.
    - the log is shorten but if there is any filter to apply to get better information, please tell me.
    I would appreciate any helps on this matter!
    nb:
    this is a translation from a Japanese text.

    Hi,
    The error message will occur if IIS cannot download CRLs of the client certificate, in other words, if the CA is shut down or there are network connectivity issues between web server and CA when Internet Information Services try
    to download the client certificate’s CRL.
    Therefore, please make sure that there is no network connectivity issue between the web server and CA, you can
    find the IP address of the problem CDP server then add an entry to the HOSTS file on the IIS computer.
    Here are some related KB articles below I suggest you refer to:
    IIS returns HTTP "403.13 Client Certificate Revoked" error message although certificate is not revoked
    http://support.microsoft.com/kb/294305/en-us
    You receive a "403.13 client certificate revoked" error message when you connect to a computer that is running Windows Server 2003 and Internet Information Services 6.0
    http://support.microsoft.com/kb/884115/en-us
    Best Regards,
    Amy

  • Cisco ACS Local Certificate

    Hello,
    I work on ACS version 5.6 and I would like to add a second certificate for the EAP in local Certificate.
    I don't know if i can without delete the first.
    Could you please help me.
    Best regards 

    Unfortunately you can only have one (1) certificate coupled with the EAP protocol. With that being said, you don't have to delete the original certificate. You can add the second certificate and enable with for EAP. This will automatically remove the EAP binding from the first certificate. But at the end, only one certificate can be tied to the EAP protocol. 
    I hope this helps!
    Thank you for rating helpful posts!

  • WVC54GC V1.1 - Software Certificate Expired!

    I have this camera put away some time, and recently I installed it again.
    It was no problem finding it and setting it up both with cable and wireless.
    And no problems coming to the webpage where I should could see the camera.
    I choose "View Video" and it pops up with software install (NetCamPlayerWeb11gv2.cab)
    Then it says Unknown Supplier and something about Windows has blocked it to protect my computer.
    Under certificate it says that it's expired:
    Cisco-Linksys LLC
    Verisign Class 3 Code Signing 2004A
    From June 9th, 2006 to July 12th, 2009
    I can not install the software in neither in IE or Firefox.
    Newest firmware installed. Tried from Win7, XP and VirtualXP - no luck

    You are absolutely not reading anything I'm writing...
    You can change all the security settings you want.
    NOTHING WILL WORK as the software integrated in the camera's firmware is expired.
    Only solution is to change the time on the PC back to the time where the software was NOT expired.
    I have mounted video-surveillance as a technician in years. And obviously I know more about your product than yourself.
    Scary!
    I say again, It has nothing to do with IE security as I tried it as the first thing.
    IE ask your permission to install activex, but it is not helping as it does not change that the software is expired.
    But certainly I have realized what brand of products NOT to purchase at a later time.
    You can take a look at your own previously releasenotes:
    http://homedownloads.cisco.com/downloads/WVC54GC_V11_FW126,0.txt
    quote:
    Version v1.19, Jul 7, 2006
    - Fix: Unable to install ActiveX plugin to view video. Verisign digital signature expired.
    /quote
    Even noobs can see that this is the problem AGAIN, as the Verisign digital signature once again has expired.
    (As I said from the beginning)
    So try again!

  • Cisco ISE authentication failed because client reject certificate

    Hi Experts,
    I am a newbie in ISE and having problem in my first step in authentication. Please help.
    I am trying to deploy a standalone Cisco ISE 1.1.2 with WLC using 802.1x authentication. The user authentication configured to be checked to ISE's internal user database for early deployment. But when the user try to authenticate, they failed with error message in ISE :
    Authentication failed : 12321 PEAP failed SSL/TLS handshake because the client rejected the ISE local-certificate
    I've generate a certificate for ISE using Windows Server CA and replace ISE's self-signed certificate with the new certificate but authentication still failed with the same error message. Must I generate a certificate for WLC also? Please help me in solving this problem.
    Regards,
    Ratna

    Certificate-Based User Authentication via Supplicant Failing
    Symptoms or
    Issue
    User authentication is failing on the client machine, and the user is receiving a
    “RADIUS Access-Reject” form of message.
    Conditions (This issue occurs with authentication protocols that require certificate validation.)
    Possible Authentications report failure reasons:
    • “Authentication failed: 11514 Unexpectedly received empty TLS message;
    treating as a rejection by the client”
    • “Authentication failed: 12153 EAP-FAST failed SSL/TLS handshake because
    the client rejected the Cisco ISE local-certificate”
    Click the magnifying glass icon from Authentications to display the following output
    in the Authentication Report:
    • 12305 Prepared EAP-Request with another PEAP challenge
    • 11006 Returned RADIUS Access-Challenge
    • 11001 Received RADIUS Access-Request
    • 11018 RADIUS is reusing an existing session
    • 12304 Extracted EAP-Response containing PEAP challenge-response
    • 11514 Unexpectedly received empty TLS message; treating as a rejection by the
    client
    • 12512 Treat the unexpected TLS acknowledge message as a rejection from the
    client
    • 11504 Prepared EAP-Failure
    • 11003 Returned RADIUS Access-Reject
    • 11006 Returned RADIUS Access-Challenge
    • 11001 Received RADIUS Access-Request
    • 11018 RADIUS is re-using an existing session
    • 12104 Extracted EAP-Response containing EAP-FAST challenge-response
    • 12815 Extracted TLS Alert message
    • 12153 EAP-FAST failed SSL/TLS handshake because the client rejected the
    Cisco ISE local-certificate
    • 11504 Prepared EAP-Failure
    • 11003 Returned RADIUS Access-Reject
    Note This is an indication that the client does not have or does not trust the Cisco
    ISE certificates.
    Possible Causes The supplicant or client machine is not accepting the certificate from Cisco ISE.
    The client machine is configured to validate the server certificate, but is not
    configured to trust the Cisco ISE certificate.
    Resolution The client machine must accept the Cisco ISE certificate to enable authentication.

  • How to replace the certificate of Cisco 2106 wireless LAN controller for CAPWAP ?

    I have interested in CAPWAP feature and I download the open capwap project to make Access Controller (AC) and Wireless Terminal Point (WTP). I had built the AC which used PC and WTP which used Atheros AP. The CAPWAP feature work well when I enabled the CAPWAP that used my own AC  and WTP. When I got the Cisco 2106 wireless LAN controller (Cisco WLC), I configured the Cisco WLC to instead my own AC but I got the authorize fail in Cisco WLC side. It seem the Cisco WLC could not recognize the CAPWAP message which sent form my own WTP. I think this issue just need to synchronize the certificate between Cisco WLC and WTP.So I need to replace the Cisco WLC's certificate manually. Does anyone know how to replace the certificate manually with Cisco WLC ?
    Best Regards,
    Alan

    Unfortunately this Support Community is for Cisco Small Business & Small Business Pro product offerings.  The WLC2106 is a traditional Cisco product.  You can find this type of support on the Cisco NetPro Forum for all traditional Cisco products.
    Best Regards,
    Glenn

  • Cisco Prime WLC mismatch due to expired guest voucher

    Hi Cisco Community,
    a customer of mine likes to administrate his guest vouchers via lobby ambassador accounts on Cisco Prime.
    Unfortunately if one of these Guest Vouchers expires Cisco Prime shows up an Audit Mismatch because this Voucher isnt present at the Controller but still present at Cisco Prime.
    I have already tried to execute the Background Task -> Guest Accounts Sync manually but this doesnt solve the issue.
    I will add some Screenshots for explanation.
    1. I deploy the guest voucher to our WLC´s
    2. The guest voucher is visible at the controllers security configuration tab.
    3. The guest voucher reaches its validity period and disapears from all the controllers.
    4.Then only one controller shows up a configuration mismatch.
    After executing the Background Task -> Guest Accounts Sync manually this voucher will be shown as "Expired"
    But the mismatch still remain between Controller and PI
    Why is this happening and why does it happen only at one of the controllers??
    How am I able to fix this issue?
    Thanks for your support
    regards
    Benedikt

    Since it has been a while, you might be better off opening a TAC case.  If PI doesn't get the config refreshed from the WLC, thats when you get the error your showing.  So maybe run the background task just on that one WLC and see if it fails or you get an error.
    Thanks,
    Scott
    Help out other by using the rating system and marking answered questions as "Answered"

  • Leap in time to test expiration of a certificate

    Hi (Eric),
    We got our certificates (thanks for your support) and we're the process of validating the deployment.
    A question raised-up:
    In a protected media streaming use case, is it possible to leap forward in time (change dates) to test the validity/expiration of a given certificate (or set of) ? We've tried and apparently a certificate installed on the client would prevent doing this.
    Alain

    > I have logged a fair bit of data at 2.6667 second time intervals inside
    > Labview. Each sample has a timestamp which was the time in seconds since
    > 1904 when the sample was taken. Some samples were discarded at the time
    > of sampling and weren't logged. I now want to play this data back to the
    > equivalent of a scrolling chart. The problem I'm having is getting the
    > time in seconds wired into the x-axis of this chart as the delta x-part
    > isn't uniform and the timescale does not correspond to what is plotted
    > on the chart. What is important to me is that the solution displays as a
    > scrolling chart with the correct time on the axis.
    >
    > Any pointers or suggestions would be appreciated.
    You don't mention what version of LV you are using. If you are or can
    use L
    V6, then you can do this with the Waveform datatype. The waveform
    is an semi-opaque datatype that includes a timestamp with one or more
    measured values. Since you can wire it to a chart, you can accumulate
    discontiguous data. In a normal acquire and chart application that now
    returns a waveform and you send it to the chart, the irregular sampling
    automatically shows up. If you are reading them from file, then you can
    pretty easily bundle the evenly sampled portions together into one
    waveform, then start another to skip ahead when you find a skip.
    If you are stuck using a previous version, then I'm afraid you
    will need to use an XY graph, possibly with the accumulation functions
    in the example I recently listed or use your own shift registers and
    build array.
    Greg McKaskle

  • Server's certificate expire

    hello sir, i have bb curve 8520 and thier server certificate has expired and therefore iam not excess on internet when i open the browser these error shows that "your server's certificate has expire plz contact to your service provider"

    Hi Andy
    See this TID- https://www.novell.com/support/kb/doc.php?id=7016141
    -Dan
    Originally Posted by andymilburn
    Hi,
    Seeing the following popup daily on a ZCM 11.3.2 setup after renewing the eDir server certs:
    The public key certificates for the following LDAP directory servers will soon expire and should be updated before the expiration date.
    The certificate for the server "172.16.24.10" for the user source "A_TREE" will expire in 14 day(s).
    The certificate for the server "172.16.24.11" for the user source "A_TREE" will expire in 14 day(s).
    Always at 14 days
    Both 172.16.24.10 and .11 have been removed, same error
    Re-added both servers again, same error
    Rebooted everything, same
    All system messages acknowledged and deleted
    Any idea how to clear this?
    Cheers
    Andy

Maybe you are looking for