<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco AnyConnect falsely reports that Certificate has expired in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112746#M1112847</link>
    <description>&lt;P&gt;Do you maybe have a link to a how to guide on how this can be checked?&lt;/P&gt;</description>
    <pubDate>Wed, 22 May 2024 05:37:59 GMT</pubDate>
    <dc:creator>tibor-mraovic</dc:creator>
    <dc:date>2024-05-22T05:37:59Z</dc:date>
    <item>
      <title>Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5111918#M1112827</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I have a client issue where they claim that&amp;nbsp;Cisco AnyConnect falsely reports that Certificate has expired. When I connect with my own AnyConnect client version 4.10.05111, I do not get this false/positive error. Screenshot attached. Interestingly this has just started to manifest itself after we have changed the active ASA in the cluster. (2 ASA in cluster, active/passive)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tibormraovic_1-1716291918523.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218777i8E3CF8F26B6054FC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="tibormraovic_1-1716291918523.png" alt="tibormraovic_1-1716291918523.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Things that I have done/checked:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Checked the certificate string on both active and passive ASA. Both are valid&lt;/LI&gt;&lt;LI&gt;Told the client to change to a newer AnyConnect client version. Did not help&lt;/LI&gt;&lt;LI&gt;Told the client to uncheck "Block connections to untrusted servers" within AnyConnect. Did not help&lt;/LI&gt;&lt;LI&gt;Added this missing line to Cisco ASA: "crypto ikev2 remote-access trustpoint "CERT_NAME"". Did not help&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I am at a roadblock and would appreciate if someone can give me some hints on what to check further. Keep in mind that I do not have a lot of experience with troubleshooting AnyConnect/certificate issues.&lt;/P&gt;&lt;P&gt;Please let me know what other information I need to share.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tibor&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 11:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5111918#M1112827</guid>
      <dc:creator>tibor-mraovic</dc:creator>
      <dc:date>2024-05-21T11:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5111984#M1112830</link>
      <description>&lt;P&gt;have you checked / verified that the certificate the client is using is valid?&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 12:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5111984#M1112830</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-05-21T12:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5111994#M1112831</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have not asked them, but I assume they are using the correct one as they had no issues until ASA active change. Also if they are not using the correct certificate, they would not be able to connect after they click "Connect anyway", or am I wrong?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tibor&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 12:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5111994#M1112831</guid>
      <dc:creator>tibor-mraovic</dc:creator>
      <dc:date>2024-05-21T12:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112010#M1112832</link>
      <description>&lt;P&gt;When you say "ASA active change" do you mean a failover or replaced the active ASA?&lt;/P&gt;
&lt;P&gt;Unless the certiicate being used is also for authenticating access, access to the ASA will be permitted even if the client has no certificate from the same CA.&amp;nbsp; All that is required is that a certificate is allocated on the ASA internet facing interface for use with RA VPN.&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 12:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112010#M1112832</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-05-21T12:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112156#M1112837</link>
      <description>&lt;P&gt;Try having them check the FQDN used by AnyConnect in their browser. There you can inspect the actual certificate they are getting and validate the expiration date.&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 15:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112156#M1112837</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-21T15:22:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112168#M1112838</link>
      <description>&lt;P&gt;One other thing is to verify the time/date is correct on the client machine.&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 15:30:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112168#M1112838</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2024-05-21T15:30:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112744#M1112845</link>
      <description>&lt;P&gt;I mean a failover.&lt;/P&gt;&lt;P&gt;How can I check for what is the certificate used on ASA? Which commands can I use? I can paste you the output here if needed. (with hiding sensitive info of course)&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 05:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112744#M1112845</guid>
      <dc:creator>tibor-mraovic</dc:creator>
      <dc:date>2024-05-22T05:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112745#M1112846</link>
      <description>&lt;P&gt;I don't think this would be an issue because everything worked before ASA failover. I will confirm the time with them to be 100% sure, but multiple clients have reported this issue right after we have done ASA failover.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 05:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112745#M1112846</guid>
      <dc:creator>tibor-mraovic</dc:creator>
      <dc:date>2024-05-22T05:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112746#M1112847</link>
      <description>&lt;P&gt;Do you maybe have a link to a how to guide on how this can be checked?&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 05:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112746#M1112847</guid>
      <dc:creator>tibor-mraovic</dc:creator>
      <dc:date>2024-05-22T05:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112841#M1112848</link>
      <description>&lt;P&gt;&lt;STRONG&gt;show run crypto | in trustpoint&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;!(look for output similar to "crypto ikev2 remote-access trustpoint &amp;lt;certificate&amp;gt;)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show crypto ca certificates &amp;lt;certificate&amp;gt;&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;!(to see the certificate details)&lt;/P&gt;
&lt;P&gt;You might also want to take a look at "&lt;STRONG&gt;show run webvpn&lt;/STRONG&gt;" and "&lt;STRONG&gt;show run tunnel-group &amp;lt;anyconnect tunnel-group&amp;gt;&lt;/STRONG&gt;" to see if there is something there that might be interfering (remember to replace &amp;lt;anyconnect tunnel-group with the actual tunnel group being used).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 06:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112841#M1112848</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-05-22T06:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112866#M1112849</link>
      <description>&lt;P&gt;Output of&amp;nbsp;&lt;STRONG&gt;show run crypto | in trustpoint:&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;crypto ca trustpoint XYZ
crypto ikev2 remote-access trustpoint XYZ&lt;/LI-CODE&gt;&lt;P&gt;Output of&amp;nbsp;&lt;STRONG&gt;show crypto ca certificates XYZ:&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;Certificate
  Status: Available
  Certificate Serial Number: xxxxxxxxxx
  Certificate Usage: General Purpose
  Public Key Type: RSA (2048 bits)
  Signature Algorithm: SHA256 with RSA Encryption
  Issuer Name:
    cn=Sectigo RSA Domain Validation Secure Server CA
    o=Sectigo Limited
    l=Salford
    st=Greater Manchester
    c=GB
  Subject Name:
    cn= "wildcard of the FQDN"
  Validity Date:
    start date: 02:00:00 CEDT Sep 14 2023
    end   date: 01:59:59 CEDT Oct 15 2024
  Storage: config
  Associated Trustpoints: XYZ

CA Certificate
  Status: Available
  Certificate Serial Number: xxxxxxxxxxxxx
  Certificate Usage: Signature
  Public Key Type: RSA (2048 bits)
  Signature Algorithm: SHA384 with RSA Encryption
  Issuer Name:
    cn=USERTrust RSA Certification Authority
    o=The USERTRUST Network
    l=Jersey City
    st=New Jersey
    c=US
  Subject Name:
    cn=Sectigo RSA Domain Validation Secure Server CA
    o=Sectigo Limited
    l=Salford
    st=Greater Manchester
    c=GB
  OCSP AIA:
    URL: http://ocsp.usertrust.com
  CRL Distribution Points:
    [1]  http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl
  Validity Date:
    start date: 01:00:00 CEST Nov 2 2018
    end   date: 00:59:59 CEST Jan 1 2031
  Storage: config
  Associated Trustpoints: XYZ&lt;/LI-CODE&gt;&lt;P&gt;Output of&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;show run webvpn:&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;webvpn
 enable "WAN INTERFACE"
 enable "MGMT INTERFACE"
 hsts
  enable
  max-age 31536000
  include-sub-domains
  no preload
 anyconnect image disk0:/anyconnect-win-4.10.07062-webdeploy-k9.pkg 1
 anyconnect profiles "CLIENT PROFILE" disk0:/"CLIENT_PROFILE".xml
 anyconnect enable
 tunnel-group-list enable
 cache
  disable
 error-recovery disable&lt;/LI-CODE&gt;&lt;P&gt;Output of &lt;STRONG&gt;show run tunnel-group &amp;lt;anyconnect tunnel-group&amp;gt;&lt;/STRONG&gt;:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;tunnel-group "name" type remote-access
tunnel-group "name" general-attributes
 **bleep**-pool anyconnect
 authentication-server-group AAA-RADIUS
 default-group-policy GroupPolicy_"name"
tunnel-group "name" webvpn-attributes
 group-alias "name" enable&lt;/LI-CODE&gt;&lt;P&gt;I have noticed that the old certificate was listed under&amp;nbsp;&lt;STRONG&gt;show run crypto | in trustpoint.&lt;/STRONG&gt; I have now deleted it, maybe that was the culprit. I have told the client to check the situation now.&lt;/P&gt;&lt;P&gt;Do you see anything strange/weird in my config outputs?&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 07:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112866#M1112849</guid>
      <dc:creator>tibor-mraovic</dc:creator>
      <dc:date>2024-05-22T07:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112882#M1112850</link>
      <description>&lt;P&gt;Nothing out of the ordinary here. From the looks of it you are using a wildcard certificate, so there should not be any FQDN naming issues.&amp;nbsp; This leads me to believe that perhaps the root CA certificate on the client machines might be outdated.&amp;nbsp; Would you be able to check this?&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 07:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112882#M1112850</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-05-22T07:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112896#M1112851</link>
      <description>&lt;P&gt;Client has just confirmed that from their test machine everything seems fine now. Will confirm with all clients over the next 7 days. It started working when I removed the old certificate under the trustpoint. I will write a summary bellow of what has been done:&lt;/P&gt;&lt;P&gt;Added the new certificate trustpoint as it was never added:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;crypto ikev2 remote-access trustpoint "NEW CERT"&lt;/LI-CODE&gt;&lt;P&gt;No changes after this.&lt;/P&gt;&lt;P&gt;I have removed the old certificate trustpoint:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;no crypto ikev2 remote-access trustpoint "OLD CERT"&lt;/LI-CODE&gt;&lt;P&gt;After this it started working. Client test machine AnyConnect client does not report "Certificate has expired" any more.&lt;/P&gt;&lt;P&gt;One more thing I see is that the OLD CERT is still configured under ca trustpoint:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;crypto ca trustpoint "OLD CERT"&lt;/LI-CODE&gt;&lt;P&gt;Should this also be removed?&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 07:49:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112896#M1112851</guid>
      <dc:creator>tibor-mraovic</dc:creator>
      <dc:date>2024-05-22T07:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112921#M1112852</link>
      <description>&lt;P&gt;Yes, remove the old certificate so that it does not clutter up the configuration.&lt;/P&gt;
&lt;P&gt;Good to hear that things have started working!&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 08:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5112921#M1112852</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-05-22T08:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5114059#M1112890</link>
      <description>&lt;P&gt;I understand that this is what you did to solve your issue, but please rate and select a correct answer for community contributors that helped you reach your final solution.&amp;nbsp; These correct answers and ratings are the reward that we as contributors strive to get as they help us maintain our status within the community.&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 09:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5114059#M1112890</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-05-23T09:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco AnyConnect falsely reports that Certificate has expired</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5114184#M1112892</link>
      <description>&lt;P&gt;Thank you for the rating.&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 10:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-falsely-reports-that-certificate-has-expired/m-p/5114184#M1112892</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-05-23T10:25:02Z</dc:date>
    </item>
  </channel>
</rss>

