<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect Client VPN authentication in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358257#M1026588</link>
    <description>Essentially that post i sent in the first link goes through the steps to authenticate and enroll a certificate on the ASA.&lt;BR /&gt;&lt;BR /&gt;Authenticate = Importing the GlobalSign Root Cert. I assume they have a Root &amp;amp; Intermediate, I think you can just copy and paste both at the sametime before typing "quit" &amp;lt; as per the instructions.&lt;BR /&gt;&lt;BR /&gt;Enroll = Generating the CSR, sending it off to get signed by GlobalSign and then importing the signed certificate.&lt;BR /&gt;&lt;BR /&gt;As per that post you'd enter the authenticate &amp;amp; enroll commands specific for that Trustpoint - SSL_VPN in your case.</description>
    <pubDate>Fri, 30 Mar 2018 20:20:59 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-03-30T20:20:59Z</dc:date>
    <item>
      <title>Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358086#M1026579</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/116111-11611-config-double-authen-00.html#anc7" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/116111-11611-config-double-authen-00.html#anc7&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I m following the above link for anyconnect client vpn double authentication, but the documents is not clear to me so how the double authentication occurs I have mentioned in below steps please correct me if I'm not wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Each user has to generate a signing request from his windows PC ,, &amp;nbsp;the CSR has to signed by the CA and CA Root certificate has to be available as a trustpoint in the ASA to authenticate, but I don’t find any configuration of trustpoint mapping configuration for the tunnel-group which I created becz I don’t want default certificate authentication for all tunnel groups. Also I have one more question here , the user certificate that was signed by CA can be used with multiple users ??? I hope it should not but how each user will be unique from others if they are authenticating by the certificate as an double authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358086#M1026579</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2020-02-21T15:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358152#M1026580</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2018/03/11/ccnp-simos-asa-anyconnect-ikev2-ipsec-vpn/" target="_self"&gt;This &lt;/A&gt;webpage has an example to configure trustpoint on ASA and enable certificate authentication configuration on separate tunnel-group, not default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Each user should be issued with their own unique certificate. I assume you are using Windows, therefore the certificate should be installed in the Users Certificate store, this means only that user who is logged on can use that certificate for authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using Active Directory, a Windows Group Policy can be configured to enroll each user with a certificate to use for authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 17:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358152#M1026580</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-03-30T17:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358224#M1026581</link>
      <description>&lt;P&gt;Dear RJI&lt;/P&gt;
&lt;P&gt;thanks for the reply,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Attached are the logs,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have already enabled on the tunnel-group certificate authentication &amp;nbsp;but how this tunnel-group will authenticate to the trustpoint, if I am not wrong by this command &lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;ssl trust-point LAB_PKI OUTSIDE&lt;/EM&gt;&lt;/SPAN&gt;, this command is already enabled on my ASA for the ssl vpn, and the trustpoint&amp;nbsp;is signed by the global sign&amp;nbsp;with common&amp;nbsp;name as a&amp;nbsp;CN=&amp;lt;outside interface public ip&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created a signing request from the windows PC and I get it signed by the global sign CA,&lt;/P&gt;
&lt;P&gt;when I initiate a request from the client the certificate authentication fails and says no trustpoint found, actually it authenticates on basis of what for the user ??? by the basis of username or on basis of what ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 19:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358224#M1026581</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-30T19:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358238#M1026582</link>
      <description>Can you upload the ASA configuration and the output of the following commands:&lt;BR /&gt;&lt;BR /&gt;show crypto ca trustpoints&lt;BR /&gt;show crypto ca certificates&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Mar 2018 19:29:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358238#M1026582</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-03-30T19:29:11Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358247#M1026583</link>
      <description>&lt;P&gt;Dear&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is the attached&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 19:53:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358247#M1026583</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-30T19:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358253#M1026585</link>
      <description>&lt;P&gt;Are you using the Trustpoint &lt;STRONG&gt;GS_Intermediate ASDM_TrustPoint0&lt;/STRONG&gt;?&lt;/P&gt;
&lt;P&gt;Or Trustpoint &lt;STRONG&gt;SSL_VPN&lt;/STRONG&gt;? - this trustpoint is not authenticated, but the issuer is Globalsign also.&lt;/P&gt;
&lt;P&gt;The certificate with hostname = FW.xyz.gov.om is associated to Trustpoint: self, which is obviously incorrect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume your intention is to issue certificates to the &lt;STRONG&gt;ASA&lt;/STRONG&gt; and &lt;STRONG&gt;users&lt;/STRONG&gt; from the Globalsign CA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 20:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358253#M1026585</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-03-30T20:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358256#M1026587</link>
      <description>&lt;P&gt;Dear RJI&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The SSL_VPN trust point, recently I get it signed by global sign becz when users are accessing the https://public ip of the outside interface for the VPN they use to get the certificate error so I get it signed by the CA and the CN=X.X.X.X &amp;lt;public IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now my goal is to authenticate anyconnect client users by certificate and local authentication, so how I can do that.&lt;/P&gt;
&lt;P&gt;how I shld get the ssl_vpn trustpoint&amp;nbsp;authenticated ???&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;group-policy CERT internal&lt;BR /&gt;group-policy CERT attributes&lt;BR /&gt;&amp;nbsp;dns-server value 172.31.20.24&lt;BR /&gt;&amp;nbsp;vpn-simultaneous-logins 3&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ssl-client &lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value slit-tunnel&lt;BR /&gt;&amp;nbsp;default-domain value xyz.local&lt;BR /&gt;&amp;nbsp;split-dns value xyz.gov.om&lt;BR /&gt;&amp;nbsp;address-pools value easypool&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect modules value posture&lt;BR /&gt;&amp;nbsp; anyconnect ask none default anyconnect&lt;/P&gt;
&lt;P&gt;tunnel-group CERT type remote-access&lt;BR /&gt;tunnel-group CERT general-attributes&lt;BR /&gt;&amp;nbsp;address-pool easypool&lt;BR /&gt;&amp;nbsp;default-group-policy CERT&lt;/P&gt;
&lt;P&gt;tunnel-group CERT webvpn-attributes&lt;BR /&gt;&amp;nbsp;authentication certificate&lt;BR /&gt;&amp;nbsp;group-alias CERT enable&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssl trust-point SSL_VPN outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 20:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358256#M1026587</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-30T20:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358257#M1026588</link>
      <description>Essentially that post i sent in the first link goes through the steps to authenticate and enroll a certificate on the ASA.&lt;BR /&gt;&lt;BR /&gt;Authenticate = Importing the GlobalSign Root Cert. I assume they have a Root &amp;amp; Intermediate, I think you can just copy and paste both at the sametime before typing "quit" &amp;lt; as per the instructions.&lt;BR /&gt;&lt;BR /&gt;Enroll = Generating the CSR, sending it off to get signed by GlobalSign and then importing the signed certificate.&lt;BR /&gt;&lt;BR /&gt;As per that post you'd enter the authenticate &amp;amp; enroll commands specific for that Trustpoint - SSL_VPN in your case.</description>
      <pubDate>Fri, 30 Mar 2018 20:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358257#M1026588</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-03-30T20:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358259#M1026589</link>
      <description>&lt;P&gt;I have the root CA of the global sign,i have just added their intermediate but not their root so this is the reason it is showing me as a not authenticated ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will enter the root certificate now&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 20:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358259#M1026589</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-30T20:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358264#M1026590</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;It is failing to add&amp;nbsp;by the below error&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;INFO: Certificate has the following attributes:&lt;BR /&gt;Fingerprint: c5efg849 ca043355 e32dba1a c44eb028&lt;BR /&gt;Do you accept this certificate? [yes/no]: yes&lt;BR /&gt;% Error in saving certificate: status = FAIL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what I have to do ?? , the other Global sign intermediate is doing nothing in the configuration I guess please correct me if I m not wrong,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I want to know for each user I have generate csr and get it signed by the CA ??&amp;nbsp; for example lets assume after ca signed the csr for the user A and he will install in the trusted root certificate personal folder, the same certificate cant be used for another user, how unique this user will be identified by the ASA in the certificate&amp;nbsp;OR &amp;nbsp;the CSR which is generated from the PC makes the authentication successful &amp;nbsp;regardless who the user it is ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please elaborate&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 21:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358264#M1026590</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-30T21:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358275#M1026591</link>
      <description>Turn on debugging - debug crypto ca&lt;BR /&gt;&lt;BR /&gt;Please send me the configuration of the trustpoint AND send an output of the commands you run and the debug information&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Mar 2018 21:16:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358275#M1026591</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-03-30T21:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358281#M1026592</link>
      <description>&lt;P&gt;please find the file attached for the trustpoint, actual I made a mistake in installing the file I used different&amp;nbsp; trustpoint names&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cannot provide the debug itself I am out of the office,&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT size="2"&gt;crypto ca authenticate SSL_VPN&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT size="2"&gt;&amp;lt; and I am pasting the entire root certificate of the GS&amp;gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT size="2"&gt;quit&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT size="2"&gt;send an output of the commands you run and the debug information ??? which command ??&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 21:39:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358281#M1026592</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-30T21:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358290#M1026593</link>
      <description>&lt;P&gt;I managed to install the root certificate and now it is in the authenticated status, we send the debugs tomorrow for certificate authentication failure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 22:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358290#M1026593</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-30T22:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358411#M1026594</link>
      <description>If you've now authenticated the certficiate don't need the debugs. You now need to enroll the certficiate, which will regenerate the CSR, then you need to get this signed by GlobalSign and import.</description>
      <pubDate>Sat, 31 Mar 2018 11:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358411#M1026594</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-03-31T11:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358484#M1026595</link>
      <description>&lt;P&gt;Dear RJI&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just want to tell you that the actual root certificate was giving me an error so I authenticated with an Intermediate certificate provided by the CA and it worked,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;before authentication of the&amp;nbsp;intermediate certificate &amp;nbsp;I already did the enrollment of the CSR , i don't have access to the FW to checks the debugs y still the certificate ssl vpn users are&amp;nbsp;still failing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also it will be appreciable if u can answer my question asked in above thread, to have a clear visibility.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Mar 2018 15:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358484#M1026595</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-31T15:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358674#M1026596</link>
      <description>&lt;P&gt;Dear&lt;/P&gt;
&lt;P&gt;Please find the attached logs for the certificate authentication failure.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 01 Apr 2018 17:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358674#M1026596</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-04-01T17:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358685#M1026597</link>
      <description>&lt;P&gt;Error: CRYPTO_PKI: No suitable trustpoints found to validate certificate serial number:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the output from the command &lt;EM&gt;&lt;STRONG&gt;show crypto ca certificates&lt;/STRONG&gt;&lt;/EM&gt;?&lt;/P&gt;</description>
      <pubDate>Sun, 01 Apr 2018 17:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358685#M1026597</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-04-01T17:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358697#M1026598</link>
      <description>&lt;P&gt;Dear RJI&lt;/P&gt;
&lt;P&gt;FW(config)# sh crypto ca trustpoints&lt;/P&gt;
&lt;P&gt;Trustpoint self:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configured for self-signed certificate generation.&lt;/P&gt;
&lt;P&gt;Trustpoint GS_Intermediate:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Subject Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=GlobalSign Organization Validation CA - SHA256 - G2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=GlobalSign nv-sa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=BE&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Serial Number: 040000000001444ef04247&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Certificate configured.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Trustpoint SSL_VPN:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Subject Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=GlobalSign Organization Validation CA - SHA256 - G2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=GlobalSign nv-sa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=BE&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Serial Number: 040000000001444ef04247&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Certificate configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;ASAFW(config)# sh crypto ca certificates&lt;BR /&gt;Certificate&lt;BR /&gt;&amp;nbsp; Status: Available&lt;BR /&gt;&amp;nbsp; Certificate Serial Number: 399b2171ccad01c3c98414f0&lt;BR /&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;BR /&gt;&amp;nbsp; Public Key Type: RSA (2048 bits)&lt;BR /&gt;&amp;nbsp; Signature Algorithm: SHA256 with RSA Encryption&lt;BR /&gt;&amp;nbsp; Issuer Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=GlobalSign Organization Validation CA - SHA256 - G2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=GlobalSign nv-sa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=BE&lt;BR /&gt;&amp;nbsp; Subject Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=1.1.1.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=xyz&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=IT&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; l=mazga&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; st=maharash&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=IN&lt;BR /&gt;&amp;nbsp; Validity Date:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 15:57:07 GMT Mar 21 2018&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 13:46:04 GMT Mar 21 2020&lt;BR /&gt;&amp;nbsp; Storage: config&lt;BR /&gt;&amp;nbsp; Associated Trustpoints: SSL_VPN&lt;/P&gt;
&lt;P&gt;CA Certificate&lt;BR /&gt;&amp;nbsp; Status: Available&lt;BR /&gt;&amp;nbsp; Certificate Serial Number: 040000000001444ef04247&lt;BR /&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;BR /&gt;&amp;nbsp; Public Key Type: RSA (2048 bits)&lt;BR /&gt;&amp;nbsp; Signature Algorithm: SHA256 with RSA Encryption&lt;BR /&gt;&amp;nbsp; Issuer Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=GlobalSign Root CA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=Root CA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=GlobalSign nv-sa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=BE&lt;BR /&gt;&amp;nbsp; Subject Name:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=GlobalSign Organization Validation CA - SHA256 - G2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=GlobalSign nv-sa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=BE&lt;BR /&gt;&amp;nbsp; OCSP AIA:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL: &lt;A href="http://ocsp.globalsign.com/rootr1" target="_blank"&gt;http://ocsp.globalsign.com/rootr1&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; CRL Distribution Points:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1]&amp;nbsp; &lt;A href="http://crl.globalsign.net/root.crl" target="_blank"&gt;http://crl.globalsign.net/root.crl&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; Validity Date:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 14:00:00 GMT Feb 20 2014&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 14:00:00 GMT Feb 20 2024&lt;BR /&gt;&amp;nbsp; Storage: config&lt;BR /&gt;&amp;nbsp; Associated Trustpoints: SSL_VPN GS_Intermediate ASDM_TrustPoint0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please clear one point for me,&lt;/P&gt;
&lt;P&gt;i have generated a csr from windows 10 and get it signed by GS CA, while creating the csr i have mentioned only the username of the user and key modulus of 2048 nothing apart from that,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am asking u from previous post something is not clear for me is on basis of what user certificate will be authenticated to the trustpoint , but at present&amp;nbsp; we are not hitting to the trustpoint, is it so that i have to keep The IKEv2 and SSL trustpoints&amp;nbsp;to be the same&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sun, 01 Apr 2018 17:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358697#M1026598</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-04-01T17:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358701#M1026599</link>
      <description>&lt;P&gt;It looks like the windows client certificate is issued from a different globalsign CA - &lt;EM&gt;&lt;STRONG&gt;issuer name: cn=GlobalSign PersonalSign 2 CA - SHA256 - G3 - Staging&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which is not the same CA as on your ASA, therefore trustpoint is not matching.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't understand you other question??&lt;/P&gt;</description>
      <pubDate>Sun, 01 Apr 2018 18:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358701#M1026599</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-04-01T18:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Client VPN authentication</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358702#M1026600</link>
      <description>&lt;P&gt;this is what i wanted to tell u that when i created the csr from the windows client i mentioned the cn as a username and not the GS as a CN,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't understand you other question??&lt;/P&gt;
&lt;P&gt;i will try to make simple when creating csr from windows 10 pc what attributes i have to fill to match&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 01 Apr 2018 18:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-vpn-authentication/m-p/3358702#M1026600</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-04-01T18:11:01Z</dc:date>
    </item>
  </channel>
</rss>

