<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>tema SSL ID Certificates not chaining to CA en VPN</title>
    <link>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732082#M56476</link>
    <description>&lt;P&gt;**Any thoughts on whether this should have been posted in a different security thread?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried to piece this together with&amp;nbsp; SSL Remote Access VPNS, Understanding PKI and the Cisco's ASA 5500 Series Chapter 73 Configuring Digital Certificates, but still need help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is a&amp;nbsp; basic config I use to create the CA and ID certs on ASAs. I use the ASA as the CA server. When I export the SSL trust point it doesn't show chaining from the CA. Since there is no chaining when I load the CA certificate in the Root Store I still an SSL Certificate error.&amp;nbsp; Instead I have to load the SSL Trustpoint Certificate. Please take a look and let me know where where my problem exists.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE CA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto ca server&lt;/P&gt;&lt;P&gt;&amp;nbsp; smtp from-address &lt;EM&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/mailto:admin@Cisco.local"&gt;admin@Cisco.local&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; lifetime ca 3650&lt;/P&gt;&lt;P&gt;&amp;nbsp; lifetime certificate 3650&lt;/P&gt;&lt;P&gt;&amp;nbsp; lifetime crl 24&lt;/P&gt;&lt;P&gt;&amp;nbsp; keysize 2048&lt;/P&gt;&lt;P&gt;&amp;nbsp; keysize server 2048&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shutdown passphrase &lt;EM&gt;123456789&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE SSL ID TRUSTPOINT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto ca trustpoint &lt;EM&gt;Identity_Certificate&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; keypair &lt;EM&gt;LOCAL-CA-SERVER&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; id-usage ssl-ipsec &lt;/P&gt;&lt;P&gt;&amp;nbsp; no fqdn&lt;/P&gt;&lt;P&gt;&amp;nbsp; subject-name &lt;EM&gt;CN=192.168.40.1,OU=SSL_ANYCONNECT_VPN&amp;nbsp; &amp;lt;--This would be my headend IP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; enrollment self&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ENROLL TRUSTPOINT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto ca enroll &lt;EM&gt;Identity_Certificate&lt;/EM&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; answer NO to include the device serial number&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SET VPN TRUSTPOINT ON OUTSIDE INTERFACE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ssl trust-point &lt;EM&gt;Identity_Certificate&lt;/EM&gt; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I originally thought it was a problem with enrollment self in the trustpoint, but I cannot figure out the steps to complete enrollment terminal.&amp;nbsp; &lt;/P&gt;&lt;P&gt;I got to the steps of &lt;STRONG&gt;crypto ca enroll &lt;/STRONG&gt;&lt;EM&gt;&lt;STRONG&gt;Identity_Certificate&lt;/STRONG&gt; &lt;/EM&gt;and displayed the certificate request. At that point the &lt;STRONG&gt;sh crypto ca trustpoint Identity_Certificate&lt;/STRONG&gt; is pending enrollment&lt;EM&gt;. &lt;/EM&gt;I can not find the command for the CA that allows trustpoint enrollment. If I try to &lt;STRONG&gt;crypto ca export Identity_Cetificate identity-certificate&lt;/STRONG&gt;it says trustpoint not enrolled. Of course if I take the enrollment request and attempt to &lt;STRONG&gt;crypto ca import Identity_Certificate certificate &lt;/STRONG&gt;it fails because it's not the cert. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Newt&lt;/P&gt;</description>
    <pubDate>Thu, 06 Oct 2011 11:56:46 GMT</pubDate>
    <dc:creator>newtwork1</dc:creator>
    <dc:date>2011-10-06T11:56:46Z</dc:date>
    <item>
      <title>SSL ID Certificates not chaining to CA</title>
      <link>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732082#M56476</link>
      <description>&lt;P&gt;**Any thoughts on whether this should have been posted in a different security thread?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried to piece this together with&amp;nbsp; SSL Remote Access VPNS, Understanding PKI and the Cisco's ASA 5500 Series Chapter 73 Configuring Digital Certificates, but still need help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is a&amp;nbsp; basic config I use to create the CA and ID certs on ASAs. I use the ASA as the CA server. When I export the SSL trust point it doesn't show chaining from the CA. Since there is no chaining when I load the CA certificate in the Root Store I still an SSL Certificate error.&amp;nbsp; Instead I have to load the SSL Trustpoint Certificate. Please take a look and let me know where where my problem exists.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE CA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto ca server&lt;/P&gt;&lt;P&gt;&amp;nbsp; smtp from-address &lt;EM&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/mailto:admin@Cisco.local"&gt;admin@Cisco.local&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; lifetime ca 3650&lt;/P&gt;&lt;P&gt;&amp;nbsp; lifetime certificate 3650&lt;/P&gt;&lt;P&gt;&amp;nbsp; lifetime crl 24&lt;/P&gt;&lt;P&gt;&amp;nbsp; keysize 2048&lt;/P&gt;&lt;P&gt;&amp;nbsp; keysize server 2048&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shutdown passphrase &lt;EM&gt;123456789&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE SSL ID TRUSTPOINT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto ca trustpoint &lt;EM&gt;Identity_Certificate&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; keypair &lt;EM&gt;LOCAL-CA-SERVER&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; id-usage ssl-ipsec &lt;/P&gt;&lt;P&gt;&amp;nbsp; no fqdn&lt;/P&gt;&lt;P&gt;&amp;nbsp; subject-name &lt;EM&gt;CN=192.168.40.1,OU=SSL_ANYCONNECT_VPN&amp;nbsp; &amp;lt;--This would be my headend IP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; enrollment self&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ENROLL TRUSTPOINT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto ca enroll &lt;EM&gt;Identity_Certificate&lt;/EM&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; answer NO to include the device serial number&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SET VPN TRUSTPOINT ON OUTSIDE INTERFACE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ssl trust-point &lt;EM&gt;Identity_Certificate&lt;/EM&gt; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I originally thought it was a problem with enrollment self in the trustpoint, but I cannot figure out the steps to complete enrollment terminal.&amp;nbsp; &lt;/P&gt;&lt;P&gt;I got to the steps of &lt;STRONG&gt;crypto ca enroll &lt;/STRONG&gt;&lt;EM&gt;&lt;STRONG&gt;Identity_Certificate&lt;/STRONG&gt; &lt;/EM&gt;and displayed the certificate request. At that point the &lt;STRONG&gt;sh crypto ca trustpoint Identity_Certificate&lt;/STRONG&gt; is pending enrollment&lt;EM&gt;. &lt;/EM&gt;I can not find the command for the CA that allows trustpoint enrollment. If I try to &lt;STRONG&gt;crypto ca export Identity_Cetificate identity-certificate&lt;/STRONG&gt;it says trustpoint not enrolled. Of course if I take the enrollment request and attempt to &lt;STRONG&gt;crypto ca import Identity_Certificate certificate &lt;/STRONG&gt;it fails because it's not the cert. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Newt&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2011 11:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732082#M56476</guid>
      <dc:creator>newtwork1</dc:creator>
      <dc:date>2011-10-06T11:56:46Z</dc:date>
    </item>
    <item>
      <title>SSL ID Certificates not chaining to CA</title>
      <link>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732083#M56477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Newt,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the correct forum, and what you observe is normal. The Local CA is not designed to generate an identity certificate for the&amp;nbsp; ASA itself.&amp;nbsp; The ASA will need to have it's own identity/SSL&amp;nbsp; certificate, which can be either a self-signed one (like you are doing with enrollment self - in this case you need to import the self-signed cert on the clients to avoid certificate warnings) or a certificate issued by a trusted third party (e.g. Verisign, Globalsign, etc.).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 09:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732083#M56477</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2011-10-13T09:31:29Z</dc:date>
    </item>
    <item>
      <title>SSL ID Certificates not chaining to CA</title>
      <link>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732084#M56478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Herbert, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate the reponse! So it is not possible to provide chaining from the Local CA to the Identity Certificate. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Oct 2011 13:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732084#M56478</guid>
      <dc:creator>newtwork1</dc:creator>
      <dc:date>2011-10-20T13:50:20Z</dc:date>
    </item>
    <item>
      <title>SSL ID Certificates not chaining to CA</title>
      <link>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732085#M56479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, officially, no.&lt;/P&gt;&lt;P&gt;Unofficially (pretend for a moment that you don't see the Cisco logo beneath my name :)) you may get it to work by requesting a certificate on a client (on behalf of the ASA, so using the ASA hostname as the "username" for the certificate), then converting it to base64 format (using OpenSSL for example), then importing it on the ASA.&lt;/P&gt;&lt;P&gt;This would not be something that is supported by Cisco though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Oct 2011 13:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732085#M56479</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2011-10-20T13:57:15Z</dc:date>
    </item>
    <item>
      <title>SSL ID Certificates not chaining to CA</title>
      <link>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732086#M56480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Herbert,&lt;/P&gt;&lt;P&gt;I really appreciate your reply; I'v been crazy, 2 days thinking about the same issue..&lt;/P&gt;&lt;P&gt;but you sloved it &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;P&gt;mahdi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Dec 2013 20:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ssl-id-certificates-not-chaining-to-ca/m-p/1732086#M56480</guid>
      <dc:creator>sharbati.mahdi</dc:creator>
      <dc:date>2013-12-17T20:56:32Z</dc:date>
    </item>
  </channel>
</rss>

