<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA to FTD migration. Need som help with certificates in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4672489#M1092804</link>
    <description>&lt;P&gt;Just to follow up. We did some test today and we used a temporary public IP on the outside interface to terminate the VPN. The first time we tested, we used this IP address in AnyConnect, but we got a certificate validation error when the client tried to connect. We then added the FQDN that we use for the VPN in the host file and after that the client was able to connect. I wasn't aware of that the FQDN name was required for authentication with client certificates. I thought it was only necessary for the WEB/SSL cert part. Anyway, seems like all is good now.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;</description>
    <pubDate>Fri, 19 Aug 2022 12:09:31 GMT</pubDate>
    <dc:creator>Chess Norris</dc:creator>
    <dc:date>2022-08-19T12:09:31Z</dc:date>
    <item>
      <title>ASA to FTD migration. Need som help with certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4670475#M1092747</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We need to migrate an ASA 5585-X to a FTD with about 1000 AnyConnect users. Authentication is done with both client certificates and Azure MFA. I am looking for some help with the steps required for doing this. I am guessing that I need to install the root certificate under Objects-&amp;gt;PKI-&amp;gt;Trusted CAs in FMC, but what do I need to do more?&lt;/P&gt;
&lt;P&gt;We have already enrolled the SSL certificates, which is a public certificate. But this is just so that the clients trust the VPN gateway and dont get the security warning.&lt;/P&gt;
&lt;P&gt;The question is about the certificates that is used to authenticate the clients. Do I need to enroll the Root CA as well? I only have a .crt file but I think the certificate need to be PKCS12 format. Should I use openssl to convert the .crt to&amp;nbsp;PKCS12 and then enroll it under devices-Certificates in FMC?&lt;/P&gt;
&lt;P&gt;I also looked in ASDM under certificate management to see if it was possible to export the root &amp;nbsp;certificate to a PKCS file, but it doesn’t seems to be any option to export root certificates, only identity certificates.&lt;/P&gt;
&lt;P&gt;Do I also need to change anything in the AnyConnect configuration? At the moment if I look under Devices -&amp;gt; Remote Access -&amp;gt; Access Interfaces, I only see the SSL certificate associated with the interface that the AnyConnect uses.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, when we are going to test this on the new FTD we will activate the VPN on one of the interfaces with a new temporary IP address before the actual migration. Would that be enough for testing. Using an &amp;nbsp;IP address instead of domain name shouldn't cause any issues?&lt;/P&gt;
&lt;P&gt;If the test doesn't work, how should we best troubleshoot this to find out what causing the issues?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 08:27:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4670475#M1092747</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2022-08-17T08:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration. Need som help with certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4670498#M1092749</link>
      <description>&lt;P&gt;for certificate used for VPN-tunnel site-to-site or for anyconnect this process is as below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to install the Root CA and Sub-CA in FMC.&amp;nbsp; Objects---&amp;gt;PKI---&amp;gt;Cert Enrollment--&amp;gt;Add Cert Enrollement&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GoDaddy.PNG" style="width: 691px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/160147i5CD9153248D4353D/image-size/large?v=v2&amp;amp;px=999" role="button" title="GoDaddy.PNG" alt="GoDaddy.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now go to your ASDM on ASA firewall. Go to Configuration---&amp;gt;Device Management--&amp;gt;Certificate Manangement--&amp;gt;Identity Certificates--Chose your Cert Identity and export it as PKCS12 Format.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;once this PKC12 is export to your computer go back to FMC--Devices--Certificates--&amp;gt;Add--&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cert2.PNG" style="width: 581px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/160148i995C602694344B99/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cert2.PNG" alt="Cert2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;here you will select the Firewall you want to call and Cert Enrollemnet you have to call GO-Daddy as showing in first picture.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cert3.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/160149i7D32D005FF3D9530/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cert3.PNG" alt="Cert3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;now you have to click on the arrow as showing in picture. it will give you a "Warning" This operation will generate Certicate Signing Request od you want to continue? click YES.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cert4.PNG" style="width: 665px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/160151i82ECB228746D78EE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cert4.PNG" alt="Cert4.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;here you can import the Identity Certificate the one you save on your computer from your ASA ASDM software.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=ZZRVAFcSZCA" target="_self"&gt;Here&lt;/A&gt; Cisco Youtube channel has provided in detail configuration of Cert Anyconnect FTD managed by FMC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also looked in ASDM under certificate management to see if it was possible to export the root certificate to a PKCS file, but it doesn’t seems to be any option to export root certificates, only identity certificates.&lt;/P&gt;
&lt;P&gt;You can not export the Root CA. but if you have a public CA you can always get a public CA from their website. for example you can check the Root CA serial number from ASA command line."show crypto ca certificate GO-Daddy"&lt;/P&gt;
&lt;P&gt;Status: Available&lt;BR /&gt;Certificate Serial Number: 083be056904246b1a1756ac95991c74a&lt;BR /&gt;Certificate Usage: Signature&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;once you have this serial number you can find the cert-root-ca from CA website and import in to your FMC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 09:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4670498#M1092749</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-08-17T09:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration. Need som help with certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4670903#M1092753</link>
      <description>&lt;P&gt;Thanks. So in order to get the client VPN connection to work,&amp;nbsp;&lt;SPAN&gt;it should be enough to enroll the CA Root certificate in order to properly validate the certificate of the connecting client?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;/Chess&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 13:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4670903#M1092753</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2022-08-17T13:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration. Need som help with certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4670913#M1092755</link>
      <description>&lt;P&gt;Correct. As long as you have Root-CA, Sub-CA in your FMC and also if you have import the Identity Certificate from your ASA firewall and hosted in your FTD (in PKCS12 format) you are good.&lt;/P&gt;
&lt;P&gt;I have done so many VPN-Tunnel FTD certificates so that how I have done it on our FMC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;having said that I assume your anyconnect configuration are pointing the new trust point. you can double check this on FTD CLI. giving a command "show run ssl"&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 13:19:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4670913#M1092755</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-08-17T13:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration. Need som help with certificates</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4672489#M1092804</link>
      <description>&lt;P&gt;Just to follow up. We did some test today and we used a temporary public IP on the outside interface to terminate the VPN. The first time we tested, we used this IP address in AnyConnect, but we got a certificate validation error when the client tried to connect. We then added the FQDN that we use for the VPN in the host file and after that the client was able to connect. I wasn't aware of that the FQDN name was required for authentication with client certificates. I thought it was only necessary for the WEB/SSL cert part. Anyway, seems like all is good now.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;/Chess&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2022 12:09:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-need-som-help-with-certificates/m-p/4672489#M1092804</guid>
      <dc:creator>Chess Norris</dc:creator>
      <dc:date>2022-08-19T12:09:31Z</dc:date>
    </item>
  </channel>
</rss>

