<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to update Cisco Trusted Root Certificate Bundle in Cisco S170 Web Security Appliance? in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075408#M7349</link>
    <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there a Way to Update the "Cisco trusted Root Certificate Bundle"?&amp;nbsp;I get more and more https&amp;nbsp;homepages who can't be opened.&amp;nbsp;I suspect that this is related to old certificates&lt;/P&gt;
&lt;P&gt;i tried to add fresh certificates manually, but after that i can't "commit" updates from my Content Security management Appliance (i had to remove the added certificates to get the commit working again).&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Version:&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Name: S170&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Product: Cisco S170 Web Security Appliance&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Model: S170&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Version: 8.8.0-085&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Build Date: 2015-07-02&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Install Date: 2017-03-23 20:34:27&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;RAID: 02&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;RAID Status: OPTIMAL&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;RAID Type: 1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;BMC: 2.02&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco DVS Engine: 1.0 (Never Updated)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco DVS Malware User Agent Rules: 0.554 (Never Updated)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco DVS Object Type Rules: 0.554 (Never Updated)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Trusted Root Certificate Bundle: 1.3 (Wed Aug 3 07:11:50 2016)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Certificate Blacklist: 1.3 (Wed Aug 3 07:11:50 2016)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;L4 Traffic Monitor Anti-Malware Rules: 1491391550 (Wed Apr 5 13:31:50 2017)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Web Usage Controls - Web Categorization Engine: 3.0.0.046 (Fri Mar 24&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;13:37:08 2017)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Web Usage Controls - Web Categorization URL Keyword Filters: 1312487822&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;(Fri Mar 24 13:37:08 2017)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Web Usage Controls - Web Categorization Prefix Filters: 1491399902 (Wed&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Apr 5 15:52:08 2017)&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks in Advance&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Daniel&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Apr 2017 14:37:39 GMT</pubDate>
    <dc:creator>itadmins</dc:creator>
    <dc:date>2017-04-05T14:37:39Z</dc:date>
    <item>
      <title>How to update Cisco Trusted Root Certificate Bundle in Cisco S170 Web Security Appliance?</title>
      <link>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075408#M7349</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there a Way to Update the "Cisco trusted Root Certificate Bundle"?&amp;nbsp;I get more and more https&amp;nbsp;homepages who can't be opened.&amp;nbsp;I suspect that this is related to old certificates&lt;/P&gt;
&lt;P&gt;i tried to add fresh certificates manually, but after that i can't "commit" updates from my Content Security management Appliance (i had to remove the added certificates to get the commit working again).&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Version:&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Name: S170&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Product: Cisco S170 Web Security Appliance&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Model: S170&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Version: 8.8.0-085&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Build Date: 2015-07-02&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Install Date: 2017-03-23 20:34:27&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;RAID: 02&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;RAID Status: OPTIMAL&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;RAID Type: 1&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;BMC: 2.02&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco DVS Engine: 1.0 (Never Updated)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco DVS Malware User Agent Rules: 0.554 (Never Updated)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco DVS Object Type Rules: 0.554 (Never Updated)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Trusted Root Certificate Bundle: 1.3 (Wed Aug 3 07:11:50 2016)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Certificate Blacklist: 1.3 (Wed Aug 3 07:11:50 2016)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;L4 Traffic Monitor Anti-Malware Rules: 1491391550 (Wed Apr 5 13:31:50 2017)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Web Usage Controls - Web Categorization Engine: 3.0.0.046 (Fri Mar 24&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;13:37:08 2017)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Web Usage Controls - Web Categorization URL Keyword Filters: 1312487822&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;(Fri Mar 24 13:37:08 2017)&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Cisco Web Usage Controls - Web Categorization Prefix Filters: 1491399902 (Wed&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Apr 5 15:52:08 2017)&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks in Advance&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Daniel&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 14:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075408#M7349</guid>
      <dc:creator>itadmins</dc:creator>
      <dc:date>2017-04-05T14:37:39Z</dc:date>
    </item>
    <item>
      <title>Hi Daniel,</title>
      <link>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075409#M7350</link>
      <description>&lt;P&gt;Hi Daniel,&lt;/P&gt;
&lt;P&gt;On AsyncOS version 8.8, the Cisco trusted root certificate bundle can only be updated via updates from Cisco server or via AsyncOS version upgrade. Unfortunately there is no other way to update this list.&lt;/P&gt;
&lt;P&gt;The custom root certificates should always take preference over the in-built trusted root certificate bundle. Manually uploading a custom root certificate would the only option to add new root certificate authorities on the WSA.&lt;/P&gt;
&lt;P&gt;May i know if you see an error on SMA when you attempt to publish the configuration after uploading the custom root certificate? If yes, could you please paste the error you see?&lt;/P&gt;
&lt;P&gt;Sid&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 14:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075409#M7350</guid>
      <dc:creator>Siddharth Rajpathak</dc:creator>
      <dc:date>2017-04-05T14:59:21Z</dc:date>
    </item>
    <item>
      <title>Actually, its probably NOT</title>
      <link>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075410#M7351</link>
      <description>&lt;P&gt;Actually, its probably NOT old roots, but the fact that WSA has problems dealing with intermediate certs. (fixed in 10.x. but I haven't tested it yet.)&lt;/P&gt;
&lt;P&gt;We would have errors with https sites, use grep to look at the access log, and it would say something like "bad root cert".&amp;nbsp; So I'd put my machine in the bypass list, go to the site, download their root and intermediate cert (click on the lock in IE, Details tab, save the intermediate and root), then upload the root and intermediate... almost always Cisco already had the root, but not the intermediate.&lt;/P&gt;
&lt;P&gt;We've added about 30 intermediate certs this way.&lt;/P&gt;
&lt;P&gt;The other issue you're running into is that 8.x does NOT support TLS 1.1 or 1.2.&amp;nbsp; 1.0 has issues, so sites are supporting it less and less.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 15:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075410#M7351</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2017-04-05T15:15:30Z</dc:date>
    </item>
    <item>
      <title>Hi Sid</title>
      <link>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075411#M7352</link>
      <description>&lt;P&gt;Hi Sid&lt;/P&gt;
&lt;P&gt;Thank you for your answer.&lt;/P&gt;
&lt;P&gt;I tried to update the Cisco trusted root certificate within the GUI. When i hit "update now" under Network &amp;gt; Certificate Management, the column "new update" shows the value "not available". The column "last Update" shows "&lt;SPAN&gt;Success - Wed Aug 3 07:11:50 2016". i'm wondering if this really is the latest update?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I see the following error on both of my SMA's after manually add Certicates:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Cisco Content Security Management Appliance M170 () - Utilities &amp;gt; Publish &amp;gt; Publish to Web Appliances
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/yahoo-dom-event/yahoo-dom-event.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/element/element-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/connection/connection-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/dragdrop/dragdrop-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/animation/animation-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/event-mouseenter/event-mouseenter-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/patch/container-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/json/json-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/datasource/datasource-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/yahoo/yahoo.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/event/event.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/get/get-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/cookie/cookie-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/datatable/datatable-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/menu/menu-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/button/button-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/tabview/tabview-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/logger/logger-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/paginator/paginator-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/autocomplete/autocomplete-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/calendar/calendar-min.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/scfw/1y-9.6.0-051/yui/selector/selector.js"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript"&gt;// &amp;lt;![CDATA[
    YAHOO.namespace("webui");
// ]]&amp;gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/yui_webui"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT src="https://172.30.20.37:8443/javascript?CSRFKey=065cd055-5006-5190-5abf-22d35cab7a1f&amp;amp;language=en-us" type="text/javascript"&gt;&lt;/SCRIPT&gt;
&lt;SCRIPT type="text/javascript"&gt;// &amp;lt;![CDATA[
function createCSRFElement()
{
    var CSRFKey = '065cd055-5006-5190-5abf-22d35cab7a1f';
    
    if(YAHOO.env.ua.ie &amp;gt; 0 &amp;amp;&amp;amp; YAHOO.env.ua.ie &amp;lt;= 7){
      var hidden_element = document.createElement('&amp;lt;input type="hidden" name="CSRFKey" /&amp;gt;');
    } else {
      var hidden_element = document.createElement('input');
      hidden_element.name = "CSRFKey";
      hidden_element.type = "hidden";
    }
    hidden_element.value= CSRFKey;
    return hidden_element;
}

function insertCSRFFields()
{
    var all_forms = document.getElementsByTagName('form');

    for (var i=0;all_forms[i];i++)
    {
        if (!all_forms[i].elements['CSRFKey']) {
            all_forms[i].appendChild(createCSRFElement());
        }
    }
}

safeOnLoad(insertCSRFFields);
// ]]&amp;gt;&lt;/SCRIPT&gt;
&lt;/EM&gt;&lt;/P&gt;
&lt;DIV class="yui-panel-container shadow" id="win_c"&gt;
&lt;DIV class="yui-module yui-overlay yui-panel" id="win"&gt;
&lt;DIV class="bd"&gt;&lt;EM&gt;Failure: Protocol parse error: cp: /data/db/certd/B8919Y.uploadedcacert.pem: No such file or directory 83:}q&amp;#1;U&amp;#7;changesq&amp;#2;}q&amp;#3;(U referencesq&amp;#4;}q&amp;#5;U&amp;#11;sub_changesq&amp;#6;]q&amp;#7;U&amp;#4;typeq&amp;#8;U&amp;#15;publish changesq us.,&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV class="bd"&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV class="bd"&gt;&lt;I&gt;As previously mentioned, when i remove the added Certificates i can publish the new configuration without problems.&lt;/I&gt;&lt;/DIV&gt;
&lt;DIV class="bd"&gt;&lt;I&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;DIV class="bd"&gt;&lt;I&gt;Thanks in advance&lt;/I&gt;&lt;/DIV&gt;
&lt;DIV class="bd"&gt;&lt;I&gt;Daniel&lt;/I&gt;&lt;/DIV&gt;
&lt;DIV class="bd"&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Apr 2017 15:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075411#M7352</guid>
      <dc:creator>itadmins</dc:creator>
      <dc:date>2017-04-05T15:23:29Z</dc:date>
    </item>
    <item>
      <title>Hi Ken</title>
      <link>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075412#M7353</link>
      <description>&lt;P&gt;Hi Ken&lt;/P&gt;
&lt;P&gt;Nice hint with TLS Support!!!&lt;/P&gt;
&lt;P&gt;I was grepping the access_log and had no error or some "bad" messages.&lt;/P&gt;
&lt;P&gt;Just at the moment i'm ralizing that i have to upgrade &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thank you&lt;/P&gt;
&lt;P&gt;EDIT:&lt;/P&gt;
&lt;P&gt;I just took a second look at the homepage which is not running. And there it is:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The connection to this site is encrypted and authenticated using a strong protocol (TLS 1.2), a strong key exchange (ECDHE_RSA with P-256), and a strong cipher (AES_256_GCM).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You served me the solution on the silver tablet, thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 15:36:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075412#M7353</guid>
      <dc:creator>itadmins</dc:creator>
      <dc:date>2017-04-05T15:36:35Z</dc:date>
    </item>
    <item>
      <title>Hi Daniel,</title>
      <link>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075413#M7354</link>
      <description>&lt;P&gt;Hi Daniel,&lt;/P&gt;
&lt;P&gt;Thanks for providing the error message. You are right, the error message would be due to custom uploaded certs.&lt;/P&gt;
&lt;P&gt;The error message seen during publish from SMA is tracked by defect CSCuv04220.&lt;/P&gt;
&lt;P&gt;The defect however mentions that, although we see an error, changes made on SMA do get published properly to WSA.&lt;/P&gt;
&lt;P&gt;Could you try uploading a custom certificate, making a change on SMA, publishing from SMA and then manually checking WSA config to see if the change gets published properly?&lt;/P&gt;
&lt;P&gt;Sid&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 15:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075413#M7354</guid>
      <dc:creator>Siddharth Rajpathak</dc:creator>
      <dc:date>2017-04-05T15:43:48Z</dc:date>
    </item>
    <item>
      <title>Hi Sid </title>
      <link>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075414#M7355</link>
      <description>&lt;P&gt;Hi Sid&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your investigations.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you can see in my reply to Ken's post i will update the asyncOS in my environment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i hope i will the also solve this problem &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 15:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-to-update-cisco-trusted-root-certificate-bundle-in-cisco/m-p/3075414#M7355</guid>
      <dc:creator>itadmins</dc:creator>
      <dc:date>2017-04-05T15:53:05Z</dc:date>
    </item>
  </channel>
</rss>

