<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to authenticate trustpoint in Cisco IOS router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993791#M1107772</link>
    <description>&lt;PRE&gt;show crypto pki certificates&lt;/PRE&gt;
&lt;P&gt;Share this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jan 2024 17:35:14 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-01-10T17:35:14Z</dc:date>
    <item>
      <title>Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993741#M1107763</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I am trying to install Godaddy SSL certificate in a Cisco 921 ISR router (IOS). I got the CSR issuing the following command&amp;nbsp;crypto pki enroll godaddy.trustpoint and the related config goes like this:&lt;BR /&gt;&lt;BR /&gt;crypto pki trustpoint godaddy.trustpoint&lt;BR /&gt;enrollment terminal&lt;BR /&gt;fqdn XXXX&lt;BR /&gt;subject-name CN=XXXX&lt;BR /&gt;revocation-check crl&lt;BR /&gt;rsakeypair GD_KEYPAIR&lt;BR /&gt;&lt;BR /&gt;When I tried to authenticate, I get this error&lt;BR /&gt;&lt;BR /&gt;Host(config)#crypto pki authenticate godaddy.trustpoint&lt;BR /&gt;% Please delete your existing CA certificate first.&lt;BR /&gt;% You must use 'no crypto pki trustpoint &amp;lt;trustpoint-name&amp;gt;' to delete the CA certificate.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;------------------------------&lt;BR /&gt;&lt;BR /&gt;Also, if I tried to import the intermediate or main certificate, I get the following error:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;AbrasiveHost(config)#crypto pki import godaddy.trustpoint certificate&lt;/P&gt;&lt;P&gt;Enter the base 64 encoded certificate.&lt;BR /&gt;End with a blank line or the word "quit" on a line by itself&lt;/P&gt;&lt;P&gt;MIIJggYJKoZIhvcNAQcCoIIJczCCCW8CAQExADALBgkqhkiG9w0BBwGggglVMIIE&lt;BR /&gt;0DCCA7igAwIBAgIBBzANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMxEDAO&lt;/P&gt;&lt;P&gt;&amp;lt;trimmed output&amp;gt;&lt;BR /&gt;r6EAMQA=&lt;/P&gt;&lt;P&gt;% Failed to parse or verify imported certificate&lt;BR /&gt;&lt;BR /&gt;I have got 3 files from Godaddy to install certificates. Names are as follows:&lt;BR /&gt;b47e0a.crt&lt;BR /&gt;b47e0a.pem&lt;BR /&gt;gd-g2_iis_intermediates.p7b&lt;BR /&gt;&lt;BR /&gt;Kindly tell me if there's anything I am missing out in my config or during cert installation.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you!&lt;BR /&gt;&lt;BR /&gt;Rajesh&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 15:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993741#M1107763</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-01-10T15:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993743#M1107764</link>
      <description>&lt;P&gt;you need to contact your CA get CA cert. and add it under&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;crypto pki trustpoint godaddy.trustpoint&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;enrollment terminal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;fqdn vpn.asimn.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;subject-name CN=vpn.asimn.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;revocation-check crl&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;rsakeypair GD_KEYPAIR&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Host(config)#crypto pki authenticate godaddy.trustpoint&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;add CA Cert. under this&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;OR try use URL to download it auotmatic (under trustpoint)&lt;BR /&gt;&lt;BR /&gt;MHM&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 16:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993743#M1107764</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-10T16:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993775#M1107768</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481413"&gt;@Rajesh11735&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Contact Godady to obtain the CA certificate. They usually provide this in a file or may direct you to a URL to download the CA certificate.&lt;/P&gt;&lt;P&gt;Download the CA certificate (usually a .crt or .pem file) from GoDaddy a you can add this CA certificate directly to your trustpoint configuration using the `crypto pki authenticate` command:&lt;/P&gt;&lt;P&gt;crypto pki authenticate godaddy.trustpoint&lt;/P&gt;&lt;P&gt;...Follow the prompts to enter the base64-encoded CA certificate. This will associate the CA certificate with the trustpoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 16:47:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993775#M1107768</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-01-10T16:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993785#M1107770</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;and @M02@rt37,&lt;/P&gt;&lt;P&gt;Thanks for your responses. When I tried this command, I get only the following error, though I have deleted other trustpoints.&lt;BR /&gt;&lt;BR /&gt;Host(config)#crypto pki authenticate godaddy.trustpoint&lt;BR /&gt;% Please delete your existing CA certificate first.&lt;BR /&gt;% You must use 'no crypto pki trustpoint &amp;lt;trustpoint-name&amp;gt;' to delete the CA certificate.&lt;BR /&gt;&lt;BR /&gt;Host#sh run | i crypto pki&lt;BR /&gt;crypto pki trustpoint godaddy.trustpoint&lt;BR /&gt;crypto pki certificate chain godaddy.trustpoint&lt;BR /&gt;&lt;BR /&gt;When i tried to import the files as well, it didnt work out.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;AbrasiveHost(config)#crypto pki import godaddy.trustpoint certificate&lt;/P&gt;&lt;P&gt;Enter the base 64 encoded certificate.&lt;BR /&gt;End with a blank line or the word "quit" on a line by itself&lt;/P&gt;&lt;P&gt;MIIJggYJKoZIhvcNAQcCoIIJczCCCW8CAQExADALBgkqhkiG9w0BBwGggglVMIIE&lt;BR /&gt;0DCCA7igAwIBAgIBBzANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMxEDAO&lt;BR /&gt;r6EAMQA=&lt;/P&gt;&lt;P&gt;% Failed to parse or verify imported certificate&lt;BR /&gt;&lt;BR /&gt;Later, I tried to add the cert path in the trustpoint configuration and authenticate, but no luck.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;crypto pki trustpoint godaddy.trustpoint&lt;BR /&gt;enrollment url flash:b4aa33ff86a07e0a.crt&lt;BR /&gt;fqdn XXXX&lt;BR /&gt;subject-name CN=XXXX&lt;BR /&gt;revocation-check crl&lt;BR /&gt;rsakeypair GD_KEYPAIR&lt;/P&gt;&lt;P&gt;I have the cert files provided by GoDaddy and I can confirm the&amp;nbsp;&lt;SPAN&gt;64 encoded certificate value given to them matches the one in the router.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am trying to figure out why it still asks me to delete other trustpoints or failing to verify the imported cert.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 17:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993785#M1107770</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-01-10T17:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993787#M1107771</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481413"&gt;@Rajesh11735&lt;/a&gt; If you have received the files from GoDaddy that implies you have already generated a CSR and sent to them for signing. I assume you created the CSR on this router? as this would explain why you cannot authenticate the trustpoint, you must have already done this prior to generating the CSR.&lt;/P&gt;
&lt;P&gt;You just need to import the signed identity certificate.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 17:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993787#M1107771</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-10T17:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993791#M1107772</link>
      <description>&lt;PRE&gt;show crypto pki certificates&lt;/PRE&gt;
&lt;P&gt;Share this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 17:35:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993791#M1107772</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-10T17:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993828#M1107774</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;, below is the output&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Host#show crypto pki cert&lt;BR /&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 1BE715&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;ou=Go Daddy Class 2 Certification Authority&lt;BR /&gt;o=The Go Daddy Group&lt;BR /&gt;Inc.&lt;BR /&gt;c=US&lt;BR /&gt;Subject:&lt;BR /&gt;cn=Go Daddy Root Certificate Authority - G2&lt;BR /&gt;o=GoDaddy.com&lt;BR /&gt;Inc.&lt;BR /&gt;l=Scottsdale&lt;BR /&gt;st=Arizona&lt;BR /&gt;c=US&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://crl.godaddy.com/gdroot.crl" target="_blank"&gt;http://crl.godaddy.com/gdroot.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 02:00:00 EST Jan 1 2014&lt;BR /&gt;end date: 03:00:00 summer May 30 2031&lt;BR /&gt;Associated Trustpoints: godaddy.trustpoint&lt;BR /&gt;Storage: nvram:GoDaddyClass#E715CA.cer&lt;/P&gt;&lt;P&gt;Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 0389F26B&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=ACT2 SUDI CA&lt;BR /&gt;o=Cisco&lt;BR /&gt;Subject:&lt;BR /&gt;Name: C921-4P&lt;BR /&gt;Serial Number: PID:C921-4P SN:PSZ44601KN2&lt;BR /&gt;cn=C921-4P&lt;BR /&gt;ou=ACT-2 Lite SUDI&lt;BR /&gt;o=Cisco&lt;BR /&gt;serialNumber=PID:C921-4P SN:PSZ44601KN2&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 02:17:20 EST Feb 22 2019&lt;BR /&gt;end date: 16:25:41 summer May 14 2029&lt;BR /&gt;Associated Trustpoints: CISCO_IDEVID_SUDI&lt;/P&gt;&lt;P&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 61096E7D00000000000C&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Root CA 2048&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;Subject:&lt;BR /&gt;cn=ACT2 SUDI CA&lt;BR /&gt;o=Cisco&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://www.cisco.com/security/pki/crl/crca2048.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/crca2048.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 13:56:57 summer Jun 30 2011&lt;BR /&gt;end date: 16:25:42 summer May 14 2029&lt;BR /&gt;Associated Trustpoints: CISCO_IDEVID_SUDI&lt;/P&gt;&lt;P&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 5FF87B282B54DC8D42A315B568C9ADFF&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Root CA 2048&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;Subject:&lt;BR /&gt;cn=Cisco Root CA 2048&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 16:17:12 summer May 14 2004&lt;BR /&gt;end date: 16:25:42 summer May 14 2029&lt;BR /&gt;Associated Trustpoints: CISCO_IDEVID_SUDI0 Trustpool&lt;BR /&gt;&lt;BR /&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;Thanks for pitching in. I tried importing the certs first in all possible commands either the URL method (or) copy pasting the 64bit encoded cert. It throws errors in the below fashion.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Should I use a different trustpoint while importing any of these files? and is there any particular cert I have to target?&lt;BR /&gt;&lt;BR /&gt;b47e0a.crt&lt;BR /&gt;b47e0a.pem&lt;BR /&gt;gd-g2_iis_intermediates.p7b&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Host(config)#crypto pki import godaddy.trustpoint certificate&lt;/P&gt;&lt;P&gt;Enter the base 64 encoded certificate.&lt;BR /&gt;End with a blank line or the word "quit" on a line by itself&lt;/P&gt;&lt;P&gt;MIIJggYJKoZIhvcNAQcCoIIJczCCCW8CAQExADALBgkqhkiG9w0BBwGggglVMIIE&lt;BR /&gt;0DCCA7igAwIBAgIBBzANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMxEDAO&lt;BR /&gt;r6EAMQA=&lt;/P&gt;&lt;P&gt;% Failed to parse or verify imported certificate&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Host(config)#crypto pki import godaddy.trustpoint pem url flash:b4aa33ff86a07e0a.pem password cisco123&lt;BR /&gt;% Trustpoint 'godaddy.trustpoint' is in use.&lt;BR /&gt;% Please delete it or use a different label.&lt;/P&gt;&lt;P&gt;Host(config)#crypto pki import godaddy.trustpoint pkcs12 flash:gd-g2_iis_intermediates.p7b password cisco123&lt;BR /&gt;% Trustpoint 'godaddy.trustpoint' is in use.&lt;BR /&gt;% Please delete it or use a different label.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 18:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993828#M1107774</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-01-10T18:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993833#M1107775</link>
      <description>&lt;P&gt;You have a CA cert. And it valid until 2031.&lt;/P&gt;
&lt;P&gt;So no need to auth trustpoint.&lt;/P&gt;
&lt;P&gt;For get cert. For your device let me check your config&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 18:46:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993833#M1107775</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-10T18:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993834#M1107776</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481413"&gt;@Rajesh11735&lt;/a&gt; Right, but did you generate the CSR on this router or not when you initially created this trustpoint and authenticated it ?&lt;/P&gt;
&lt;P&gt;Which certificate did you paste when running - crypto pki import godaddy.trustpoint certificate? It needs to be the signed identity certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 18:49:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993834#M1107776</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-10T18:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993835#M1107777</link>
      <description>&lt;P&gt;There are two type of enrollment'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here you use copy paste so you use manaul enrollment&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to export csr and then send it to your ca signed it then&amp;nbsp; import it.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.ciscopress.com/articles/article.asp?p=1684781" target="_blank" rel="noopener"&gt;https://www.ciscopress.com/articles/article.asp?p=1684781&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 18:57:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993835#M1107777</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-10T18:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993838#M1107778</link>
      <description>&lt;P&gt;Rob,&lt;/P&gt;&lt;P&gt;I did generate the CSR in this router and while running the command -&amp;nbsp;&lt;SPAN&gt;crypto pki import godaddy.trustpoint certificate, I used the 64 bit cert from each of the the following file in every attempt&lt;BR /&gt;&lt;BR /&gt;b47e0a.crt&lt;BR /&gt;b47e0a.pem&lt;BR /&gt;gd-g2_iis_intermediates.p7b&lt;BR /&gt;&lt;BR /&gt;The intended validity is for 1 year (till May 2024).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 18:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993838#M1107778</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-01-10T18:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993844#M1107779</link>
      <description>&lt;P&gt;Check link I share it good source to understand manaul enrollment&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 19:13:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993844#M1107779</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-10T19:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993853#M1107780</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Thanks for the link. I was checking the same and figured out one issue.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;When I gave CSR request, I sent the 64 bit value which I got in the terminal using the "crypto pki enroll godaddy.trustpoint" command. While the link suggests us to use the below and send the 64 bit value for signing.&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;crypto pki export godaddy.trustpoint pem terminal&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;The 64 bit value from the above command and the one I gave to Godaddy doesnt match.&lt;BR /&gt;&lt;BR /&gt;I may have to redo the trustpoint again and get it signed by them.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 19:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993853#M1107780</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-01-10T19:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993862#M1107782</link>
      <description>&lt;P&gt;I wish you Good luck friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 19:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993862#M1107782</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-10T19:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993874#M1107783</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481413"&gt;@Rajesh11735&lt;/a&gt; no you don't need to use that export command, that link refers to using a Two-Tier CA on Cisco routers, where the router is signing the certificates.&lt;/P&gt;
&lt;P&gt;You've probably authenticated the root certificate into the trustpoint you are attempting to import the identity certificate, but that root certificate did not issue the certificate, the intermediate CA did. You need to create 2 trustpoints. The 1st trustpoint is for the Root CA and the second for the intermediate root. Generate the CSR and import the sign identity certificate into the 2nd trustpoint (the trustpoint which has the intermediate root certificate).&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 19:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4993874#M1107783</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-10T19:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate trustpoint in Cisco IOS router</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4994344#M1107802</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your input again. In the first trustpoint (godaddy.trustpoint), I was able to import the intermediate certificate (gd-g2_iis_intermediates.p7b) by converting it to .crt file.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;As you suggested, I have imported the identity certificate (b47e0a.crt) In the 2nd truspoint (godaddy). Now both are showing up in the router, &lt;EM&gt;but I am not able to use it in the webvpn for authentication&lt;/EM&gt;. Below is the config:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;crypto pki trustpoint godaddy.trustpoint&lt;BR /&gt;enrollment terminal&lt;BR /&gt;fqdn XXXX&lt;BR /&gt;subject-name CN=XXXX&lt;BR /&gt;revocation-check crl&lt;BR /&gt;rsakeypair GD_KEYPAIR&lt;/P&gt;&lt;P&gt;crypto pki trustpoint godaddy&lt;BR /&gt;enrollment terminal pem&lt;BR /&gt;fqdn XXXX&lt;BR /&gt;subject-name CN=XXXX&lt;BR /&gt;revocation-check crl&lt;BR /&gt;rsakeypair GD_KEYPAIR&lt;/P&gt;&lt;P&gt;AbrasiveHost#sh crypto pki trustpoint&lt;BR /&gt;Trustpoint CISCO_IDEVID_SUDI:&lt;BR /&gt;Subject Name:&lt;BR /&gt;cn=ACT2 SUDI CA&lt;BR /&gt;o=Cisco&lt;BR /&gt;Serial Number (hex): 61096E7D00000000000C&lt;BR /&gt;Certificate configured.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Trustpoint CISCO_IDEVID_SUDI0:&lt;BR /&gt;Subject Name:&lt;BR /&gt;cn=Cisco Root CA 2048&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;Serial Number (hex): 5FF87B282B54DC8D42A315B568C9ADFF&lt;BR /&gt;Certificate configured.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Trustpoint godaddy.trustpoint:&lt;BR /&gt;Subject Name:&lt;BR /&gt;cn=Go Daddy Root Certificate Authority - G2&lt;BR /&gt;o=GoDaddy.com&lt;BR /&gt;Inc.&lt;BR /&gt;l=Scottsdale&lt;BR /&gt;st=Arizona&lt;BR /&gt;c=US&lt;BR /&gt;Serial Number (hex): 1BE715&lt;BR /&gt;Certificate configured.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Trustpoint godaddy:&lt;BR /&gt;Subject Name:&lt;BR /&gt;cn=vpn.asimn.com&lt;BR /&gt;Serial Number (hex): 00B4AA33FF86A07E0A&lt;BR /&gt;Certificate configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AbrasiveHost# sh crypto pki certificates&lt;BR /&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 00B4AA33FF86A07E0A&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Go Daddy Secure Certificate Authority - G2&lt;BR /&gt;ou=&lt;A href="http://certs.godaddy.com/repository/" target="_blank"&gt;http://certs.godaddy.com/repository/&lt;/A&gt;&lt;BR /&gt;o=GoDaddy.com&lt;BR /&gt;Inc.&lt;BR /&gt;l=Scottsdale&lt;BR /&gt;st=Arizona&lt;BR /&gt;c=US&lt;BR /&gt;Subject:&lt;BR /&gt;cn=vpn.asimn.com&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://crl.godaddy.com/gdig2s1-5871.crl" target="_blank"&gt;http://crl.godaddy.com/gdig2s1-5871.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 03:22:04 summer May 29 2023&lt;BR /&gt;end date: 16:33:06 summer May 27 2024&lt;BR /&gt;Associated Trustpoints: godaddy&lt;BR /&gt;Storage: nvram:GoDaddySecur#7E0ACA.cer&lt;/P&gt;&lt;P&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 1BE715&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;ou=Go Daddy Class 2 Certification Authority&lt;BR /&gt;o=The Go Daddy Group&lt;BR /&gt;Inc.&lt;BR /&gt;c=US&lt;BR /&gt;Subject:&lt;BR /&gt;cn=Go Daddy Root Certificate Authority - G2&lt;BR /&gt;o=GoDaddy.com&lt;BR /&gt;Inc.&lt;BR /&gt;l=Scottsdale&lt;BR /&gt;st=Arizona&lt;BR /&gt;c=US&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://crl.godaddy.com/gdroot.crl" target="_blank"&gt;http://crl.godaddy.com/gdroot.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 02:00:00 EST Jan 1 2014&lt;BR /&gt;end date: 03:00:00 summer May 30 2031&lt;BR /&gt;Associated Trustpoints: godaddy.trustpoint&lt;BR /&gt;Storage: nvram:GoDaddyClass#E715CA.cer&lt;/P&gt;&lt;P&gt;Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 0389F26B&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=ACT2 SUDI CA&lt;BR /&gt;o=Cisco&lt;BR /&gt;Subject:&lt;BR /&gt;Name: C921-4P&lt;BR /&gt;Serial Number: PID:C921-4P SN:PSZ23081KN2&lt;BR /&gt;cn=C921-4P&lt;BR /&gt;ou=ACT-2 Lite SUDI&lt;BR /&gt;o=Cisco&lt;BR /&gt;serialNumber=PID:C921-4P SN:PSZ23081KN2&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 02:17:20 EST Feb 22 2019&lt;BR /&gt;end date: 16:25:41 summer May 14 2029&lt;BR /&gt;Associated Trustpoints: CISCO_IDEVID_SUDI&lt;/P&gt;&lt;P&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 61096E7D00000000000C&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Root CA 2048&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;Subject:&lt;BR /&gt;cn=ACT2 SUDI CA&lt;BR /&gt;o=Cisco&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;&lt;A href="http://www.cisco.com/security/pki/crl/crca2048.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/crca2048.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 13:56:57 summer Jun 30 2011&lt;BR /&gt;end date: 16:25:42 summer May 14 2029&lt;BR /&gt;Associated Trustpoints: CISCO_IDEVID_SUDI&lt;BR /&gt;&lt;BR /&gt;CA Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number (hex): 5FF87B282B54DC8D42A315B568C9ADFF&lt;BR /&gt;Certificate Usage: Signature&lt;BR /&gt;Issuer:&lt;BR /&gt;cn=Cisco Root CA 2048&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;Subject:&lt;BR /&gt;cn=Cisco Root CA 2048&lt;BR /&gt;o=Cisco Systems&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 16:17:12 summer May 14 2004&lt;BR /&gt;end date: 16:25:42 summer May 14 2029&lt;BR /&gt;Associated Trustpoints: CISCO_IDEVID_SUDI0 Trustpool&lt;BR /&gt;&lt;BR /&gt;Is there anything I should configure (or) check with Godaddy?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 13:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-authenticate-trustpoint-in-cisco-ios-router/m-p/4994344#M1107802</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-01-11T13:40:04Z</dc:date>
    </item>
  </channel>
</rss>

