<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CUBE - Wildcard certificates in Collaboration Applications</title>
    <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5238071#M50740</link>
    <description>&lt;P&gt;I can confirm that the p12 or adding the legacy format works with the wildcard certs.&amp;nbsp; I used this procedure for &lt;FONT size="3"&gt;our situation.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Be sure the star cert is issued without any special characters in the passphrase.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Prepare the certificate for the CUBEs.&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Concatenate the GoDaddy Intermediate and Root Certificates to form a root/intermediate chain.&lt;/FONT&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="3"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;cat gd-intermediate.crt gdroot-g2.crt &amp;gt; int-root-chain.crt&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Run openssl using legacy flags the rsa.key, star.crt and the int-root-chain.crt chain&amp;nbsp;to build a .p12 bundled cert.&lt;/FONT&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;openssl pkcs12 -export \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -inkey rsa.key \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -in star.crt \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -certfile int-root-chain.crt \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -name wc-bundle \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -legacy -macalg sha1 \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -out wc_Bundle.p12&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;FONT size="3"&gt;CLI on the ISR&lt;/FONT&gt;&lt;/H4&gt;&lt;H4&gt;&lt;FONT size="3"&gt;Import the cert into the router directly or upload it to the flash and import it.&lt;/FONT&gt;&lt;/H4&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;crypto pki import&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;wc-bundle pkcs12 sftp://username:password@sftphost.westernu.edu/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;wc_Bundle.p12 password&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;xxxxxxxxxxx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;% Do you also want to create trustpoints for CAs higher in&lt;BR /&gt;% the hierarchy? [yes/no]: &lt;SPAN&gt;&lt;SPAN&gt;yes&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;CRYPTO_PKI: Imported PKCS12 file successfully.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;conf t&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip http server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip http secure-server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip http server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip http secure-server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip http secure-trustpoint wc-20260105&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sip-ua&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;crypto signaling default trustpoint wc-bundle&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;end&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;write memory&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Dec 2024 18:10:19 GMT</pubDate>
    <dc:creator>Rich_U</dc:creator>
    <dc:date>2024-12-17T18:10:19Z</dc:date>
    <item>
      <title>CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4450434#M46356</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly requesting your input to on my attempt to install the wildcard certificates on a CUBE. I will be using this for MS team direct routing testing. Please find the steps and commands that i used in this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configured the trustpoint.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto pki trustpoint sbcssl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;enrollment terminal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;fqdn none&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;subject-name cn=*.mydomain.net&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Placed the root certificate chain&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto pki authenticate sbcssl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;&amp;lt;paste the certificate chain here &amp;gt;&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;paste the certificate and private key&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto pki import sbcssl certificate&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;&amp;lt;paste&amp;nbsp; the private key and then certificate &amp;gt;&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;received the error: Cannot import certificate -&lt;BR /&gt;Certificate does not contain router's General Purpose public key for trust point sbcssl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;please note that i am using the wildcard certificate and private key provided. I didnt generated the CSR from the CUBE router. If i remember correctly, i read it below URL that wildcard certificate worked in the MS direct routing setup. so i would like to try it from my end. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;reference:&amp;nbsp;&lt;A title="Cisco ISR 4321 SBC for MS Teams Direct Routing" href="https://community.cisco.com/t5/collaboration-applications/cisco-isr-4321-sbc-for-ms-teams-direct-routing/td-p/4140494" target="_blank" rel="noopener"&gt;Cisco ISR 4321 SBC for MS Teams Direct Routing&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please let me know if anyone can shed some light on it.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 11:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4450434#M46356</guid>
      <dc:creator>Shalid Kurunnan Chalil</dc:creator>
      <dc:date>2021-08-17T11:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4450469#M46358</link>
      <description>&lt;P&gt;I assume its the problem with the key. Use CSR to generate the wildcard cert. I hope it could resolve the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 02:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4450469#M46358</guid>
      <dc:creator>Nithin Eluvathingal</dc:creator>
      <dc:date>2021-08-18T02:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4450474#M46360</link>
      <description>&lt;P&gt;Thanks for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to get the wildcard certificate corrected if that is a possible option. Is it possible for you to verify the steps that i mentioned is correct or not?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 12:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4450474#M46360</guid>
      <dc:creator>Shalid Kurunnan Chalil</dc:creator>
      <dc:date>2021-08-17T12:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4450862#M46366</link>
      <description>&lt;P&gt;Below mentioned are the steps for signing a router certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;1)&amp;nbsp;Generate the keypair&amp;nbsp;&lt;BR /&gt;2) Create the trustpoints&amp;nbsp;&lt;BR /&gt;3) Generate CSR (Certificate Signing Request)&amp;nbsp;&lt;BR /&gt;4) Obtain public signed SSL/TLS certificate&amp;nbsp;&lt;BR /&gt;5) Import certificate to trustpoint&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Note sure if we can upload the private key. I assume that you didnt do the step 1 and step 3 mentioned above.&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Generate CSR and use the same CSR for downloading your wildcard certificate.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 02:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4450862#M46366</guid>
      <dc:creator>Nithin Eluvathingal</dc:creator>
      <dc:date>2021-08-18T02:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4453803#M46385</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure if you've seen this video or not, but I've used it once or twice to refresh myself on the process:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=IVH5PdPsQyw" target="_blank"&gt;https://www.youtube.com/watch?v=IVH5PdPsQyw&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I haven't done any wildcard certificates with Teams Direct Routing (yet), but on page 54 in the Direct Routing for Microsoft Phone System with Cisco CUBE doc, a CSR is generated after the RSA keys and Trust Points configured in this example. It might be that you have to do the same here too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/interoperability-portal/direct-routing-with-cube.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/interoperability-portal/direct-routing-with-cube.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 21:03:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4453803#M46385</guid>
      <dc:creator>Scott Leport</dc:creator>
      <dc:date>2021-08-23T21:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4530177#M47044</link>
      <description>&lt;P&gt;Unfortunately the direct routing documentation does not provide a clear example when we are not generating a certificate csr on the cisco cube and thus are not generating a private key.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However it should be possible to import the private key/signed certificate when bundled in .pkcs12 format, if the pfx file is uploaded to the router flash and imported as per the bellow screenshot:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ac6f5d58-472e-4e06-b86c-cb0a243269fe.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/140999iC1093D2B716CD27C/image-size/large?v=v2&amp;amp;px=999" role="button" title="ac6f5d58-472e-4e06-b86c-cb0a243269fe.PNG" alt="ac6f5d58-472e-4e06-b86c-cb0a243269fe.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 12:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4530177#M47044</guid>
      <dc:creator>Nuno Melo</dc:creator>
      <dc:date>2022-01-12T12:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4898401#M49222</link>
      <description>&lt;P&gt;I am attempting to import our wildcard certificate but I am getting a Message that states:&lt;/P&gt;
&lt;P&gt;% Importing pkcs12...&lt;BR /&gt;Source filename [wlcd_xxx_com_new_pw_2023_11.pfx]? &lt;BR /&gt;Reading file from bootflash:wlcd_xxx_com_new_pw_2023_11.pfx% You already have RSA keys named padsbc.xxx.com&lt;BR /&gt;% If you replace them, all router certs issued using these keys&lt;BR /&gt;% will be removed.&lt;BR /&gt;% Do you really want to replace them? [yes/no]: yes&lt;BR /&gt;% Warning: CA cert is not found. The imported certs might not be usable.&lt;BR /&gt;CRYPTO_PKI: Import PKCS12 operation failed to create trustpoint padsbc.xxx.com&lt;/P&gt;
&lt;P&gt;I have tried to install the Root CA from DigiCert that the certificate is signed by but not having any luck with that either.&lt;/P&gt;
&lt;P&gt;Please advise,&lt;/P&gt;
&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 19:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/4898401#M49222</guid>
      <dc:creator>joeharb</dc:creator>
      <dc:date>2023-08-03T19:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5004625#M49839</link>
      <description>&lt;P&gt;Recently I was working with customer to integrate CUCM and Microsoft Teams using Microsoft Teams Direct Routing. In this case, we used their existing wildcard certificate. Here is the process:&lt;/P&gt;
&lt;P&gt;1. Do not generate any CSR on CUBE Router.&lt;/P&gt;
&lt;P&gt;2. Customer must combine their existing Root CA, Intermediate CA, Wildcard Certificate and Private Key in single PKCS12 bundle. For more details, refer to this post &lt;A href="https://community.cisco.com/t5/security-knowledge-base/installing-certificate-for-webvpn-without-csr-on-asa-8-4-3/ta-p/3152144" target="_self"&gt;here.&lt;/A&gt; This is the single file you need to import on CUBE Router.&lt;/P&gt;
&lt;P&gt;3. Copy this file from FTP/SFTP to CUBE Router flash. For example:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;copy ftp://&amp;lt;username&amp;gt;:&amp;lt;password&amp;gt;@&amp;lt;x.x.x.x&amp;gt;/wildcard.pfx flash: 
Destination filename [wildcard]? 
Accessing ftp://*:*@&amp;lt;x.x.x.x&amp;gt;/wildcard.pfx...! 
[OK - 4931/4096 bytes]&lt;/LI-CODE&gt;
&lt;P&gt;4. Using the below command, import the wildcard certificate to CUBE. This will automatically create the trustpoint “WILDCARD_TP”.&lt;/P&gt;
&lt;LI-CODE lang="ruby"&gt;crypto pki import WILDCARD_TP pkcs12 flash:wildcard.pfx password ******* % 
Importing pkcs12... 
Source filename [wildcard.pfx]? 
Reading file from bootflash:wildcard.pfx 
CRYPTO_PKI: Imported PKCS12 file successfully.&lt;/LI-CODE&gt;
&lt;P&gt;5. Show running configuration can be used to verify the trust point.&lt;/P&gt;
&lt;LI-CODE lang="ruby"&gt;crypto pki trustpoint WILDCARD_TP
 enrollment pkcs12
 revocation-check none
 rsakeypair WILDCARD_TP
!
crypto pki certificate chain WILDCARD_TP
  30820676 3082055E A0030201 02021006 245011EF 815DF299 C14D422D AC6F9830 
  0D06092A 864886F7 0D01010B 05003060 310B3009 06035504 06130255 53311530 
  13060355 040A130C 44696769 43657274 20496E63 31193017 06035504 0B131077 
  77772E64 69676963 6572742E 636F6D31 1F301D06 03550403 13164765 6F547275&lt;/LI-CODE&gt;
&lt;P&gt;5. Show crypto pki certificates can be used to display information about the wildcard certificate and the certificate of the CA.&lt;/P&gt;
&lt;LI-CODE lang="ruby"&gt;CUBE_ROUTER#sh crypto pki certificates WILDCARD_TP 

Certificate 
  Status: Available 
  Certificate Serial Number (hex): 00D868B5A81343A259 
  Certificate Usage: General Purpose 
  Issuer: 
    cn=Go Daddy Secure Certificate Authority - G2 
    ou=http://certs.godaddy.com/repository/ 
    o=GoDaddy.com Inc. 
    l=Scottsdale 
    st=Arizona 
    c=US 
  Subject: 
    Name: *.example.com 
    cn=*.example.com 
    ou=Domain Control Validated 
  CRL Distribution Points: 
    http://crl.godaddy.com/gdig2s1-2592.crl 
  Validity Date: 
    start date: 22:36:28 UTC Jan 6 2021 
    end date: 22:36:28 UTC Jan 6 2022 
  Associated Trustpoints: WILDCARD_TP 
  Storage: nvram:GoDaddySecur#A259.cer 

CA Certificate 
  Status: Available 
  Certificate Serial Number (hex): 07 
  Certificate Usage: Signature 
  Issuer: 
    cn=Go Daddy Root Certificate Authority - G2 
    o=GoDaddy.com Inc. 
    l=Scottsdale 
    st=Arizona 
    c=US
  Subject: 
    cn=Go Daddy Secure Certificate Authority - G2
    ou=http://certs.godaddy.com/repository/ 
    o=GoDaddy.com Inc. 
    l=Scottsdale 
    st=Arizona 
    c=US
  CRL Distribution Points: 
    http://crl.godaddy.com/gdroot-g2.crl 
  Validity Date: 
    start date: 07:00:00 UTC May 3 2011 
    end date: 07:00:00 UTC May 3 2031 
  Associated Trustpoints: WILDCARD_TP
  Storage: nvram:GoDaddyRootC#7CA.cer
&lt;/LI-CODE&gt;
&lt;P&gt;6. Specify the default trust point under sip-ua.&lt;/P&gt;
&lt;LI-CODE lang="ruby"&gt;sip-ua 
  crypto signaling default trustpoint WILDCARD_TP&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 14:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5004625#M49839</guid>
      <dc:creator>Vaijanath Sonvane</dc:creator>
      <dc:date>2024-01-24T14:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5140468#M50332</link>
      <description>&lt;P&gt;I followed the same steps, however not able to import the wildcard certificate,&amp;nbsp; its going till reading the file but I am not getting the import confirmation prompt and the certificate is not shown in the running configuration.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto pki import lifenew pkcs12 flash:wildcard.pfx password xxxxx&lt;BR /&gt;% Importing pkcs12...Reading file from bootflash:wildcard.pfx&lt;BR /&gt;SBC01#&lt;BR /&gt;SBC01#&lt;/P&gt;
&lt;P&gt;Have you faced this issue or any pointer.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aneesh&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2024 06:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5140468#M50332</guid>
      <dc:creator>aneesh.abraham</dc:creator>
      <dc:date>2024-07-05T06:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5140571#M50336</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/96016"&gt;@aneesh.abraham&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Yes I did face similar issue. It was related to certificate format. If you have wildcard certificate in .p12 format. That will work too.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2024 12:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5140571#M50336</guid>
      <dc:creator>Vaijanath Sonvane</dc:creator>
      <dc:date>2024-07-05T12:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5140592#M50337</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/294890"&gt;@Vaijanath Sonvane&lt;/a&gt;&amp;nbsp;, let me check and let you know how it goes.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2024 12:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5140592#M50337</guid>
      <dc:creator>aneesh.abraham</dc:creator>
      <dc:date>2024-07-05T12:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5233567#M50725</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/96016"&gt;@aneesh.abraham&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;crypto pki import lifenew pkcs12 flash:wildcard.pfx password xxxxx&lt;BR /&gt;% Importing pkcs12...Reading file from bootflash:wildcard.pfx&lt;BR /&gt;SBC01#&lt;BR /&gt;SBC01#&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Got the same issue.&lt;BR /&gt;Problem was solved by using keys "-macalg sha1" and&amp;nbsp; "-legacy" in "openssl pkcs12 -export ..." command.&lt;BR /&gt;openssl pkcs12 -export -in star.mycompany.com_cert.pem -inkey star.mycompany.com_key.pem -certfile chain.crt -out bundle.p12 &lt;STRONG&gt;-macalg sha1 -legacy&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2024 21:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5233567#M50725</guid>
      <dc:creator>MrSerge</dc:creator>
      <dc:date>2024-12-06T21:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: CUBE - Wildcard certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5238071#M50740</link>
      <description>&lt;P&gt;I can confirm that the p12 or adding the legacy format works with the wildcard certs.&amp;nbsp; I used this procedure for &lt;FONT size="3"&gt;our situation.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Be sure the star cert is issued without any special characters in the passphrase.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Prepare the certificate for the CUBEs.&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Concatenate the GoDaddy Intermediate and Root Certificates to form a root/intermediate chain.&lt;/FONT&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="3"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;cat gd-intermediate.crt gdroot-g2.crt &amp;gt; int-root-chain.crt&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Run openssl using legacy flags the rsa.key, star.crt and the int-root-chain.crt chain&amp;nbsp;to build a .p12 bundled cert.&lt;/FONT&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;openssl pkcs12 -export \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -inkey rsa.key \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -in star.crt \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -certfile int-root-chain.crt \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -name wc-bundle \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -legacy -macalg sha1 \&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; -out wc_Bundle.p12&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H4&gt;&lt;FONT size="3"&gt;CLI on the ISR&lt;/FONT&gt;&lt;/H4&gt;&lt;H4&gt;&lt;FONT size="3"&gt;Import the cert into the router directly or upload it to the flash and import it.&lt;/FONT&gt;&lt;/H4&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;crypto pki import&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;wc-bundle pkcs12 sftp://username:password@sftphost.westernu.edu/&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;wc_Bundle.p12 password&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;xxxxxxxxxxx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;% Do you also want to create trustpoints for CAs higher in&lt;BR /&gt;% the hierarchy? [yes/no]: &lt;SPAN&gt;&lt;SPAN&gt;yes&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;CRYPTO_PKI: Imported PKCS12 file successfully.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;conf t&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip http server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no ip http secure-server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip http server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip http secure-server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip http secure-trustpoint wc-20260105&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sip-ua&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;crypto signaling default trustpoint wc-bundle&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;end&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;write memory&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 18:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/cube-wildcard-certificates/m-p/5238071#M50740</guid>
      <dc:creator>Rich_U</dc:creator>
      <dc:date>2024-12-17T18:10:19Z</dc:date>
    </item>
  </channel>
</rss>

