<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA certificates in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268593#M1077105</link>
    <description>&lt;P&gt;Client-ASA&lt;BR /&gt;SSL use cert to make client auth the ASA and ASA auth the client.&lt;BR /&gt;so ASA have it is identity cert.&lt;BR /&gt;Now if client send cert to ASA how the ASA know that this cert is valid or not?&lt;BR /&gt;hmm&lt;BR /&gt;it need CA cert, but why?&lt;BR /&gt;simply the CA cert contain public CA key, when ASA receive the client cert there is digital signature in end of cert which is type of hash process, and this hash process use private key of CA.&lt;BR /&gt;note:- any hash use private key we can use public key to valid it, reverse process.&lt;BR /&gt;NOW the ASA has CA public and it receive the client cert,&amp;nbsp;&lt;BR /&gt;it use public key of CA to check digital signature "hash" it valid or not.&lt;BR /&gt;that why we need CA cert.&lt;/P&gt;</description>
    <pubDate>Thu, 07 Jan 2021 20:19:26 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2021-01-07T20:19:26Z</dc:date>
    <item>
      <title>ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268430#M1077098</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;When adding certificates to the ASA for anyconnect access, how come we need to add the cert of the Root CA on there?&lt;/P&gt;&lt;P&gt;what is that used for here?&lt;/P&gt;&lt;P&gt;I normally add the identity cert as well as the Root.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 13:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268430#M1077098</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2021-01-07T13:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268485#M1077101</link>
      <description>&lt;P&gt;You need CA certificate for FQDN&lt;/P&gt;
&lt;P&gt;here is the steps :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 15:37:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268485#M1077101</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-01-07T15:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268560#M1077104</link>
      <description>&lt;P&gt;We add the issuing root CA certificate (and - recommended - intermediate CA certificates) so that the ASA itself and any clients can verify a complete chain of trust for the ASA's certificate. Some auditors and third party checkers (like Qualys) will tell you your ASA is less secure if you don't present the entire chain to a connecting client.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 18:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268560#M1077104</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-07T18:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268593#M1077105</link>
      <description>&lt;P&gt;Client-ASA&lt;BR /&gt;SSL use cert to make client auth the ASA and ASA auth the client.&lt;BR /&gt;so ASA have it is identity cert.&lt;BR /&gt;Now if client send cert to ASA how the ASA know that this cert is valid or not?&lt;BR /&gt;hmm&lt;BR /&gt;it need CA cert, but why?&lt;BR /&gt;simply the CA cert contain public CA key, when ASA receive the client cert there is digital signature in end of cert which is type of hash process, and this hash process use private key of CA.&lt;BR /&gt;note:- any hash use private key we can use public key to valid it, reverse process.&lt;BR /&gt;NOW the ASA has CA public and it receive the client cert,&amp;nbsp;&lt;BR /&gt;it use public key of CA to check digital signature "hash" it valid or not.&lt;BR /&gt;that why we need CA cert.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 20:19:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268593#M1077105</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-01-07T20:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268597#M1077106</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="lllll.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/101113iD1B73C57997039DE/image-size/large?v=v2&amp;amp;px=999" role="button" title="lllll.png" alt="lllll.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 20:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268597#M1077106</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-01-07T20:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268607#M1077107</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;so what certificate would the client present ?&lt;/P&gt;&lt;P&gt;also does the ASA need to talk to the CA?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Can you break it down in a process, I.e when the client connects what exactly happens ?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 20:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268607#M1077107</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2021-01-07T20:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268663#M1077111</link>
      <description>&lt;P&gt;client&amp;nbsp;&lt;/P&gt;&lt;P&gt;CA cert&lt;/P&gt;&lt;P&gt;user cert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA&lt;/P&gt;&lt;P&gt;CA cert&lt;/P&gt;&lt;P&gt;identity cert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-CA server no need in this case because as I thing you use copy paste&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what exactly happened see below photo, any connect use SSL and this is general for all SSL.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 22:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268663#M1077111</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-01-07T22:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268771#M1077113</link>
      <description>&lt;P&gt;I think I misunderstood the original question.&lt;/P&gt;
&lt;P&gt;When the CLIENT is authenticating using a certificate, the ASA needs to know that it can trust that certificate. The way it does so is by examining the certificate presented by the client to ascertain the issuing root CA. Only if it trusts the issuing root CA does it accept the client's certificate as trusted for authentication purposes. An ASA by default doesn't trust any third party root CAs, thus we need to add them onto the ASA.&lt;/P&gt;
&lt;P&gt;Clients themselves don't usually have this problem when connecting to the ASA (assuming you've used a well-known public CA for your ASA identity certificate) since they rely on the operating system Trusted Root CA store which is updated by the OS vendor (Microsoft, Apple etc.) to include the most public CAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 05:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4268771#M1077113</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-08T05:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4269081#M1077123</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my case, we do not use certificate based authentication for our VPN, we just put a certificate on our ASA so when we connnect to it the clients trust it.&lt;/P&gt;&lt;P&gt;In this case how does it work? do we still need the CA and Identity cert on our ASA?&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 16:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4269081#M1077123</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2021-01-08T16:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4269144#M1077129</link>
      <description>&lt;P&gt;You don't strictly require the root (or issuing in case an intermediate CA issued the certificate) CA certificate but it's a best practice.&lt;/P&gt;
&lt;P&gt;The certificate on your ASA used for the VPN clients IS an identity cert.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 18:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-certificates/m-p/4269144#M1077129</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-08T18:13:25Z</dc:date>
    </item>
  </channel>
</rss>

