<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multi Certificate authenication with anyconnect vpn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multi-certificate-authenication-with-anyconnect-vpn/m-p/4610263#M1090076</link>
    <description>&lt;P&gt;What is the CLI config of the trustpoint?&lt;/P&gt;</description>
    <pubDate>Sat, 14 May 2022 20:00:10 GMT</pubDate>
    <dc:creator>Peter Koltl</dc:creator>
    <dc:date>2022-05-14T20:00:10Z</dc:date>
    <item>
      <title>Multi Certificate authenication with anyconnect vpn</title>
      <link>https://community.cisco.com/t5/network-security/multi-certificate-authenication-with-anyconnect-vpn/m-p/4609779#M1090053</link>
      <description>&lt;P&gt;i 'Im currently setting up a anyconnect vpn using multi certificate, and finding that the CRL or OCSP is not working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im using a yubikey with the personal certificate on it and a device certificate form a laptop, both of these are signed by our own internal CA. using the the CRL and the OCSP url which is imbedded in the certificate. The the virtual FTD is running version 7.&lt;/P&gt;&lt;P&gt;What im finding is that when the any of the certificates are revoked by the CA,&amp;nbsp; anyconnect still connects, when it shouldn't.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have looked in the logs and can't tell if the FTD is doing a CRL or a OCSP check, on the certificates, when to see if they are revoked like it should be.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be greatly apreaciated to see how i would get this working.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2022 12:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-certificate-authenication-with-anyconnect-vpn/m-p/4609779#M1090053</guid>
      <dc:creator>key_tone_9926</dc:creator>
      <dc:date>2022-05-13T12:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Certificate authenication with anyconnect vpn</title>
      <link>https://community.cisco.com/t5/network-security/multi-certificate-authenication-with-anyconnect-vpn/m-p/4609799#M1090054</link>
      <description>&lt;P&gt;can I see the any connect tunnel-group and group-policy config ?&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2022 13:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-certificate-authenication-with-anyconnect-vpn/m-p/4609799#M1090054</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-13T13:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Certificate authenication with anyconnect vpn</title>
      <link>https://community.cisco.com/t5/network-security/multi-certificate-authenication-with-anyconnect-vpn/m-p/4610263#M1090076</link>
      <description>&lt;P&gt;What is the CLI config of the trustpoint?&lt;/P&gt;</description>
      <pubDate>Sat, 14 May 2022 20:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-certificate-authenication-with-anyconnect-vpn/m-p/4610263#M1090076</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2022-05-14T20:00:10Z</dc:date>
    </item>
  </channel>
</rss>

