<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active Authentication with FTD &amp;amp; FMC and Chrome issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/4159647#M1074301</link>
    <description>&lt;P&gt;can you tell me how you configure the csr with openssl thats included the DNS and IP SAN?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you,&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 19:50:50 GMT</pubDate>
    <dc:creator>chong00011</dc:creator>
    <dc:date>2020-09-30T19:50:50Z</dc:date>
    <item>
      <title>Active Authentication with FTD &amp; FMC and Chrome issues</title>
      <link>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/3367357#M975106</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've been developing a lab of integrating FTD and FMC with an Active Directory to test Passive and Active Authentication. With Passive it works like a charm, I applied several policies like URL and Application filtering to users authenticated by starting Windows session, and effectively they are blocked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With Active Authentication, it's different: it asks for credentials, I provide them and it works, applying URL filering policies correctly. However, I have the following issues related to authentication process:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;When using Google Chrome to try to access the Internet by HTTP (e.g. just typing google.com), it just says "Connect to the network" and when I click Connect, it opens a new window in the same page.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;When doing the same with IE or Firefox I get a certificate error (even if I downloaded the certificate and added to trusted certificates in Windows), but I get the option to continue. Then it prompts credentials, and I can access successfully.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;I've attached some screenshots of what I've dealing with. I'm trying to find out if this is a Chrome issue or if I'm missing some configuration in my firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks for your help.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/3367357#M975106</guid>
      <dc:creator>supportgns</dc:creator>
      <dc:date>2020-02-21T15:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Active Authentication with FTD &amp; FMC and Chrome issues</title>
      <link>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/3678444#M975108</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After months of dealing with it, I think I've found the solution. It's an issue related to certificate used in Active Authentication tab in Identity Policy. I generated a CSR in FMC but I found out that Google Chrome was annoying me because of the SAN missing... and FMC actually does not support SAN field in CSR generator.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I decided to:&lt;/P&gt;
&lt;P&gt;1. Create a new root CA, CSR and private key all from OpenSSL (and distribute my local OpenSSL CA between all computers&amp;nbsp;covered by&amp;nbsp;Active Authentication).&lt;/P&gt;
&lt;P&gt;2. CSR in OpenSSL include DNS SAN and IP SAN. In my case, these are the inside IP of the Firepower and its corresponding DNS register.&lt;/P&gt;
&lt;P&gt;3. Issue a certificate to DNS name of inside IP.&lt;/P&gt;
&lt;P&gt;4. Import certificate and it's private key associated, into FMC &amp;gt; Objects &amp;gt; Internal Certs.&lt;/P&gt;
&lt;P&gt;5. Use the certificate in Identity Policy &amp;gt; Active Authentication.&lt;/P&gt;
&lt;P&gt;6. Deploy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now it's working as I expected. And I can verify that because from a computer that has my OpenSSL Root CA certificate installed in Certificate Store, but it's not covered by Active Authentication policy, if I access to https://&amp;lt;Inside-IP&amp;gt;:885 or https://&amp;lt;DNS-Name-Inside-IP&amp;gt;:885, I get the green padlock in Firefox and Chrome.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So when dealing with certificates and Active Authentication, ensure that you can issue a certificate with SAN (and if possible include IP in the SAN), and the most important: get rid of CSR generator in FMC!&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jul 2018 16:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/3678444#M975108</guid>
      <dc:creator>supportgns</dc:creator>
      <dc:date>2018-07-31T16:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Active Authentication with FTD &amp; FMC and Chrome issues</title>
      <link>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/3678445#M975109</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After months of dealing with it, I think I've found the solution. It's an issue related to certificate used in Active Authentication tab in Identity Policy. I generated a CSR in FMC but I found out that Google Chrome was annoying me because of the SAN missing... and FMC actually does not support SAN field in CSR generator.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I decided to:&lt;/P&gt;
&lt;P&gt;1. Create a new root CA, CSR and private key all from OpenSSL (and distribute my local OpenSSL CA between all computers&amp;nbsp;covered by&amp;nbsp;Active Authentication).&lt;/P&gt;
&lt;P&gt;2. CSR in OpenSSL include DNS SAN and IP SAN. In my case, these are the inside IP of the Firepower and its corresponding DNS register.&lt;/P&gt;
&lt;P&gt;3. Issue a certificate to DNS name of inside IP.&lt;/P&gt;
&lt;P&gt;4. Import certificate and it's private key associated, into FMC &amp;gt; Objects &amp;gt; Internal Certs.&lt;/P&gt;
&lt;P&gt;5. Use the certificate in Identity Policy &amp;gt; Active Authentication.&lt;/P&gt;
&lt;P&gt;6. Deploy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now it's working as I expected. And I can verify that because from a computer that has my OpenSSL Root CA certificate installed in Certificate Store, but it's not covered by Active Authentication policy, if I access to https://&amp;lt;Inside-IP&amp;gt;:885 or https://&amp;lt;DNS-Name-Inside-IP&amp;gt;:885, I get the green padlock in Firefox and Chrome.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So when dealing with certificates and Active Authentication, ensure that you can issue a certificate with SAN (and if possible include IP in the SAN), and the most important: get rid of CSR generator in FMC!&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jul 2018 16:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/3678445#M975109</guid>
      <dc:creator>supportgns</dc:creator>
      <dc:date>2018-07-31T16:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Active Authentication with FTD &amp; FMC and Chrome issues</title>
      <link>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/4159647#M1074301</link>
      <description>&lt;P&gt;can you tell me how you configure the csr with openssl thats included the DNS and IP SAN?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you,&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 19:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/active-authentication-with-ftd-amp-fmc-and-chrome-issues/m-p/4159647#M1074301</guid>
      <dc:creator>chong00011</dc:creator>
      <dc:date>2020-09-30T19:50:50Z</dc:date>
    </item>
  </channel>
</rss>

