<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS CA Server - Subordinate CA Server problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756652#M1034125</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well I upgraded to 12.4(16)LD and there is no change in my results. If I remove the revocation-check then it authenticates properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course that's lame though because without that my revoked certificates will not be denied access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Jul 2007 16:54:34 GMT</pubDate>
    <dc:creator>mlipsey</dc:creator>
    <dc:date>2007-07-10T16:54:34Z</dc:date>
    <item>
      <title>IOS CA Server - Subordinate CA Server problems</title>
      <link>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756649#M1034122</link>
      <description>&lt;P&gt;I'm doing a proof of concept using Cisco's IOS CA Server to do our DMVPN authentication. When I use a stand alone CA Server this stuff works great but that doesn't have any "redundancy" in it were we to have a failure. So we want to use the subordinate ca server architecture so that we can have 2 servers available. the other option is an RA server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen both of these options work but in my proof of concept I have never been able to get the Subordinate CA to work correctly and the RA  mode I was able to get to work but after a few hours it would mysteriously stop working (I haven't opend a TAC case on the RA problems yet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, I've got a TAC case opened and they walked me through this last week. I took extensive notes, their process was not without problems but eventually we got it working in Subordinate CA mode. Okay, it works - I've seen it. I attempted to recreate it afterwords using my notes and the CCO documentation and it doesn't work. My DMVPN hub says the client's cert is "bad."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My debugging isn't very helpful the run down of my configuration is attached as text.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, here are my steps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Root CA, I generate a general key, export it out to nvram and then reimport it non-exportable. Then I create the CA configuration which generates the Root CA certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next I move on to the Subordinate, create its general rsa key, export and reimport it non-exportable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I create the ca server on it in "sub-cs" mode. It gets generates a "Subordinate-CA" certificate request which I then have to go approve on the Root CA server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next I move on to the DMVPN Hub router. I generate its rsa general key, export and then re import. Then I create the Root trustpoint and authenticate to it to retrieve the Root Certificate. Then I add the subordinate-ca trustpoint and authenticate to it, then enroll in it. Should be done there - usually goes off without a hitch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last is the DMVPN Client router; same process as above to be honest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once that is complete - everyone has a certificate and the DMVPN tunnel attempts to authenticate; the DMVPN hub tries to check the crl on the subordinate CA server and it says it fails and that it is a bad certificate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756649#M1034122</guid>
      <dc:creator>mlipsey</dc:creator>
      <dc:date>2020-02-21T09:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: IOS CA Server - Subordinate CA Server problems</title>
      <link>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756650#M1034123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Incidentally this is my primary source for documentation of this process:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/ps6441/products_configuration_guide_chapter09186a008051eafa.html#wp1144411" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/ps6441/products_configuration_guide_chapter09186a008051eafa.html#wp1144411&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2007 23:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756650#M1034123</guid>
      <dc:creator>mlipsey</dc:creator>
      <dc:date>2007-07-09T23:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: IOS CA Server - Subordinate CA Server problems</title>
      <link>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756651#M1034124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've just found some notes here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/ps6660/products_white_paper0900aecd805249e3.shtml" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/ps6660/products_white_paper0900aecd805249e3.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They indicate that I may need to be using 12.4(11)T or better to get the Sub-CA thing working properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try that tomorrow...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2007 23:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756651#M1034124</guid>
      <dc:creator>mlipsey</dc:creator>
      <dc:date>2007-07-09T23:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: IOS CA Server - Subordinate CA Server problems</title>
      <link>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756652#M1034125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well I upgraded to 12.4(16)LD and there is no change in my results. If I remove the revocation-check then it authenticates properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course that's lame though because without that my revoked certificates will not be denied access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2007 16:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756652#M1034125</guid>
      <dc:creator>mlipsey</dc:creator>
      <dc:date>2007-07-10T16:54:34Z</dc:date>
    </item>
    <item>
      <title>Try to change the trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756653#M1034126</link>
      <description>&lt;P&gt;Try to change the trustpoint names on the DMVPN routers to something completely different than what you have used for the Root CA and the SubCA&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 06:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-ca-server-subordinate-ca-server-problems/m-p/756653#M1034126</guid>
      <dc:creator>amhashem</dc:creator>
      <dc:date>2016-08-31T06:42:58Z</dc:date>
    </item>
  </channel>
</rss>

