<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Certificates for AnyConnect VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281590#M1077770</link>
    <description>&lt;P&gt;@Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178811"&gt;@Heino Human&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I create the CSR outside FTD (try openSSL) and then import the certificate to FTD&lt;/P&gt;&lt;P&gt;Check the following guide, I use the PKCS12 option.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/215849-certificate-installation-and-renewal-on.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/215849-certificate-installation-and-renewal-on.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jan 2021 18:08:06 GMT</pubDate>
    <dc:creator>Panos Bouras</dc:creator>
    <dc:date>2021-01-28T18:08:06Z</dc:date>
    <item>
      <title>SSL Certificates for AnyConnect VPN</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281023#M1077729</link>
      <description>&lt;P&gt;Hi guys,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm a bit confused in why we would use two signed certificates for anyconnect VPN to establish a trust point on the outside interface of the firewall. If look at the below article and follow the steps, it would go like this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a CSR on the FTD via CLI&lt;/P&gt;&lt;P&gt;2. Send it to a CA to be signed&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Go to Objects &amp;gt; Object Management &amp;gt; PKI &amp;gt; Cert Enrollment, click on Add Cert Enrollment. Here we add the CA signed certificate (which is the first one)&lt;/P&gt;&lt;P&gt;4. Then we go to Devices &amp;gt; Certificates &amp;gt; Add &amp;gt; New Certificate. Here we select the cert enrollment we did in step 3, create another CSR to be signed by a CA again.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I reading this incorrectly or not understanding the process?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any insight would be amazing so I can get my head around this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Heino&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 00:01:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281023#M1077729</guid>
      <dc:creator>Heino Human</dc:creator>
      <dc:date>2021-01-28T00:01:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates for AnyConnect VPN</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281031#M1077731</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Step 3 is for upload the certificate signed by the CA, and the step 4 is to assign the certificate (uploaded on step 3) to FTD.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 00:20:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281031#M1077731</guid>
      <dc:creator>Omar Sandoval</dc:creator>
      <dc:date>2021-01-28T00:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates for AnyConnect VPN</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281074#M1077732</link>
      <description>&lt;P&gt;Hi Omar,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is correct, though when you assign the certificate in step 4, a new CSR is raised. Please see the screenshots attached.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Heino&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 02:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281074#M1077732</guid>
      <dc:creator>Heino Human</dc:creator>
      <dc:date>2021-01-28T02:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates for AnyConnect VPN</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281590#M1077770</link>
      <description>&lt;P&gt;@Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178811"&gt;@Heino Human&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I create the CSR outside FTD (try openSSL) and then import the certificate to FTD&lt;/P&gt;&lt;P&gt;Check the following guide, I use the PKCS12 option.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/215849-certificate-installation-and-renewal-on.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/215849-certificate-installation-and-renewal-on.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 18:08:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281590#M1077770</guid>
      <dc:creator>Panos Bouras</dc:creator>
      <dc:date>2021-01-28T18:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Certificates for AnyConnect VPN</title>
      <link>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281603#M1077774</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178811"&gt;@Heino Human&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are getting confused between 2 different methods to import a certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;|You generate the CSR via openssl from the CLI, sign the certificate and create a PKCS12 file. On the FMC you then you select the Certificate Enrollment type as PKCS12 and import the file (this doesn't generate a new CSR). &lt;A href="https://integratingit.wordpress.com/2018/11/10/ftd-vpn-with-certificates/" target="_self"&gt;Example&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another method is select the Certificate Enrollment type as Manual, import the CA certificate and then generate the CSR and import the signed file. This method does not require you to generate a CSR on the CLI.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2021 18:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-certificates-for-anyconnect-vpn/m-p/4281603#M1077774</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-01-28T18:24:16Z</dc:date>
    </item>
  </channel>
</rss>

