<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACE module - end-to-end SSL in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940414#M18482</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a certificate and a key but once imported they failed the verify command.&lt;/P&gt;&lt;P&gt;Actually what I don't understand is what kind of configuration should a I apply for the ACE to behave as a "regular" ssl client.&lt;/P&gt;&lt;P&gt;I imported a cert then generated a key but the key and the cert did not pair (using the crypto verify command)&lt;/P&gt;&lt;P&gt;I am a bit confused with the pocess of generating the key, I thought the creation of the key was a part of the SSL handshake... How could I create a valid key prior to starting a ssl handshake?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Thibault.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Apr 2008 13:10:35 GMT</pubDate>
    <dc:creator>deephazz02</dc:creator>
    <dc:date>2008-04-14T13:10:35Z</dc:date>
    <item>
      <title>ACE module - end-to-end SSL</title>
      <link>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940412#M18480</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm in the process of setting up an end to end SSL configuration but it doesn't work and I'm getting a bit confused at this stage.I imported a cert using the terminal (copy/paste) then I imported a key using the same method and the tftp. The TFTP failed and the terminal was displaying a message telling me there was topo many lines.&lt;/P&gt;&lt;P&gt;I checked with the crypto verify command and it failed telling me "Error: invalid or unsupported key".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any clear documentation on how to configure an end to end SSL ?&lt;/P&gt;&lt;P&gt;I used the ACE ssl guide, but it is not really accurate and looks more like a reminder to me rather than a guide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attached the existing config to this post although it does not show the cert and key I imported to the ACE module, it gives a better understanding of what the idea is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did anybody came across the same issues on the first time configuring end-to-end ssl with ACE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2008 15:52:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940412#M18480</guid>
      <dc:creator>deephazz02</dc:creator>
      <dc:date>2008-04-11T15:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: ACE module - end-to-end SSL</title>
      <link>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940413#M18481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;before configuring ssl, you need to properly important key and cert.&lt;/P&gt;&lt;P&gt;Can you try with FTP ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"crypto import ftp 192.168.30.27 cisco key.pem key.pem"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is your key a pem file ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Documentation for key management here :&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/v3.00_A1/configuration/ssl/guide/certkeys.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/v3.00_A1/configuration/ssl/guide/certkeys.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 09:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940413#M18481</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2008-04-14T09:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: ACE module - end-to-end SSL</title>
      <link>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940414#M18482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a certificate and a key but once imported they failed the verify command.&lt;/P&gt;&lt;P&gt;Actually what I don't understand is what kind of configuration should a I apply for the ACE to behave as a "regular" ssl client.&lt;/P&gt;&lt;P&gt;I imported a cert then generated a key but the key and the cert did not pair (using the crypto verify command)&lt;/P&gt;&lt;P&gt;I am a bit confused with the pocess of generating the key, I thought the creation of the key was a part of the SSL handshake... How could I create a valid key prior to starting a ssl handshake?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Thibault.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 13:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940414#M18482</guid>
      <dc:creator>deephazz02</dc:creator>
      <dc:date>2008-04-14T13:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: ACE module - end-to-end SSL</title>
      <link>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940415#M18483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;just don't know where to start.&lt;/P&gt;&lt;P&gt;I feel like you do not have the right key/cert.&lt;/P&gt;&lt;P&gt;This would be the very first thing to verify.&lt;/P&gt;&lt;P&gt;Where did you get your key and cert ?&lt;/P&gt;&lt;P&gt;What certificate authority signed your certificate ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The creation of the session key requires the use of an RSA key pair (private/public).&lt;/P&gt;&lt;P&gt;Every server must have a public and a private key associated with a certificate signed by a certificate authority.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're not familiar with those concepts, configuring an SSL offloaded like ACE won't be easy.&lt;/P&gt;&lt;P&gt;Maybe you should start be reading on the subject from various article available on the WEB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;openssl is a great tool to generate keys and certficates.&lt;/P&gt;&lt;P&gt;I would suggest maybe to get this free tool and start by creating your own RSA key pair and a self signed certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then import everything into ACE.&lt;/P&gt;&lt;P&gt;Once you have valid key/cert we can continue with the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 13:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/ace-module-end-to-end-ssl/m-p/940415#M18483</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2008-04-14T13:32:47Z</dc:date>
    </item>
  </channel>
</rss>

