<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Certificate on ASA - Missing something? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273808#M1077390</link>
    <description>Ah right okay so I just give the users the the FQDN and leave it at that then .. well that was easy thank you for clarification:)&lt;BR /&gt;</description>
    <pubDate>Sat, 16 Jan 2021 20:20:11 GMT</pubDate>
    <dc:creator>machine23</dc:creator>
    <dc:date>2021-01-16T20:20:11Z</dc:date>
    <item>
      <title>SSL Certificate on ASA - Missing something?</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273802#M1077388</link>
      <description>&lt;P&gt;Hello All ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have added an SSL cert for the ASA - ciscoasa.ladderbar.com (195.36.189.55) and applied the certificate on the SSL settings on the ASA so when users use anyconnect using the DNS name (ciscoasa.ladderbar.com) it works good and no risk message is shown , but when they use the IP it comes up with certificate not trusted message.&lt;/P&gt;&lt;P&gt;Same issue when I browse - &lt;A href="https://195.36.189.55" target="_blank" rel="noopener"&gt;https://195.36.189.55&lt;/A&gt; - website shows not secure but &lt;A href="https://ciscoasa.ladderbar.com" target="_blank" rel="noopener"&gt;https://ciscoasa.ladderbar.com&lt;/A&gt; - shows secure.&lt;/P&gt;&lt;P&gt;Any settings on the ASA that i might have missed ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jan 2021 19:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273802#M1077388</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2021-01-16T19:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate on ASA - Missing something?</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273807#M1077389</link>
      <description>&lt;P&gt;Nothing that you missed here. That's the way it works. The IP address is not part of the certificate and with that not trusted by the client.&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jan 2021 20:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273807#M1077389</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2021-01-16T20:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate on ASA - Missing something?</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273808#M1077390</link>
      <description>Ah right okay so I just give the users the the FQDN and leave it at that then .. well that was easy thank you for clarification:)&lt;BR /&gt;</description>
      <pubDate>Sat, 16 Jan 2021 20:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273808#M1077390</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2021-01-16T20:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate on ASA - Missing something?</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273907#M1077393</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;No settings on ASA will fix this. You missed to add your ASA IP to the&lt;BR /&gt;certificate. Try to regenerate the certificate with CN as&lt;BR /&gt;ciscoasa.ladderbar.com and have the IP added to SAN names in the&lt;BR /&gt;certificate. This will resolve the issue properly.&lt;BR /&gt;&lt;BR /&gt;**** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Sun, 17 Jan 2021 07:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273907#M1077393</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-01-17T07:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate on ASA - Missing something?</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273939#M1077394</link>
      <description>&lt;P&gt;Hi , thanks for this , I thought I did put the ip in ... but I will rekey and make sure , also in the fortigates it works without adding the ip in the fortigates.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jan 2021 08:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273939#M1077394</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2021-01-17T08:49:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificate on ASA - Missing something?</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273946#M1077395</link>
      <description>&lt;P&gt;In my opinion it's not worth the effort to put the IP in the certificate. The CA needs a stricter validation process that you must follow to get the certificate, the certificates are more expensive and if you are using Windows, it will likely not work with older versions than Win10.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jan 2021 09:05:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificate-on-asa-missing-something/m-p/4273946#M1077395</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2021-01-17T09:05:32Z</dc:date>
    </item>
  </channel>
</rss>

