<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower FMC/FTD and Elastic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-fmc-ftd-and-elastic/m-p/4187765#M1076054</link>
    <description>&lt;P&gt;I've been looking for the proper CLI method to import the CA.&lt;/P&gt;&lt;P&gt;I should upload or copy paste the cert info into a file on the FTD then run&amp;nbsp;"openssl pkcs## -info -in "filename"" ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I find plenty of examples of how to do this using FDM but we have FMC managing our HA FTD's and version 6.6.1 doesn't upload certs to the FTD according to the admin guide.&lt;/P&gt;&lt;P&gt;ej&lt;/P&gt;</description>
    <pubDate>Tue, 24 Nov 2020 00:00:31 GMT</pubDate>
    <dc:creator>Eric R. Jones</dc:creator>
    <dc:date>2020-11-24T00:00:31Z</dc:date>
    <item>
      <title>Firepower FMC/FTD and Elastic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-fmc-ftd-and-elastic/m-p/4187212#M1076030</link>
      <description>&lt;P&gt;We have just deployed our FMC/FTD on 6.6.1 and have A10 sending our logs to Elastic. We have the logs going to the server via UDP but would like to use TLS per our requirements. I know I need certs from a CA and those certs must be the signed by the same CA on both ends of the connection.&lt;/P&gt;&lt;P&gt;Do I need to use the certs that exist on the Elastic server, the ones I pull for the FMC/FTD or does it matter as long as they are signed by a CA and are PKCS12?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 03:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-fmc-ftd-and-elastic/m-p/4187212#M1076030</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2020-11-23T03:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FMC/FTD and Elastic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-fmc-ftd-and-elastic/m-p/4187264#M1076033</link>
      <description>It doesn't matter as long as you have the right CA sequence installed.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Mon, 23 Nov 2020 05:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-fmc-ftd-and-elastic/m-p/4187264#M1076033</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2020-11-23T05:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower FMC/FTD and Elastic</title>
      <link>https://community.cisco.com/t5/network-security/firepower-fmc-ftd-and-elastic/m-p/4187765#M1076054</link>
      <description>&lt;P&gt;I've been looking for the proper CLI method to import the CA.&lt;/P&gt;&lt;P&gt;I should upload or copy paste the cert info into a file on the FTD then run&amp;nbsp;"openssl pkcs## -info -in "filename"" ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I find plenty of examples of how to do this using FDM but we have FMC managing our HA FTD's and version 6.6.1 doesn't upload certs to the FTD according to the admin guide.&lt;/P&gt;&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 00:00:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-fmc-ftd-and-elastic/m-p/4187765#M1076054</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2020-11-24T00:00:31Z</dc:date>
    </item>
  </channel>
</rss>

