<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA to FTD migration - SSL trustpoint for multiple domain question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139336#M1113960</link>
    <description>&lt;P&gt;Right. Looking at the sniffer trace I can confirm that AnyConnect 4.10 sends SNI. Looks like Cisco fixed this issue at some point, but forgot to update CSCvh77602.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291127"&gt;@Matus Kozak&lt;/a&gt;, the solution is to generate new FTD certificate and include all of FTD hostnames into the SAN certificate field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Jul 2024 08:57:15 GMT</pubDate>
    <dc:creator>tvotna</dc:creator>
    <dc:date>2024-07-03T08:57:15Z</dc:date>
    <item>
      <title>ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138791#M1113920</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;on the old ASA FW I had ssl configuration for multiple domain... for VPN and Anyconnect use. If user wrote to Anyconnect vpn.domaina.example it matches correct certificate and Anyconnect client was without warning about untrusted certificate...&lt;/P&gt;
&lt;P&gt;example:&lt;BR /&gt;&lt;EM&gt;ssl trust-point TRUSTPOINT-A &lt;STRONG&gt;domain&lt;/STRONG&gt; &lt;STRONG&gt;vpn.domainA.example&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssl trust-point TRUSTPOINT-B &lt;STRONG&gt;domain vpn.domainB.example&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;etc.&lt;/P&gt;
&lt;P&gt;Is it possible to do this on FMC/FTD? 7.2.5&lt;BR /&gt;I did not find it, I tried to look at flex config,&amp;nbsp; maybe I miss something...&lt;/P&gt;
&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 08:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138791#M1113920</guid>
      <dc:creator>Matus Kozak</dc:creator>
      <dc:date>2024-07-02T08:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138834#M1113923</link>
      <description>&lt;P&gt;can you more elaborate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 10:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138834#M1113923</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-02T10:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138900#M1113927</link>
      <description>&lt;P&gt;it is simple...&lt;/P&gt;
&lt;P&gt;how to move ASA config:&lt;BR /&gt;"&lt;EM&gt;ssl trust-point TRUSTPOINT-A &lt;STRONG&gt;domain&lt;/STRONG&gt; &lt;STRONG&gt;vpn.domainA.example&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssl trust-point TRUSTPOINT-B &lt;STRONG&gt;domain vpn.domainB.example&lt;/STRONG&gt;&lt;/EM&gt;"&lt;/P&gt;
&lt;P&gt;to FTD. That you have more domains (vpn domains/url) on same FTD with matching correct start (*) certificate (*.domain.xyz) to avoid that user will see warnings about untrusted site certificate if it does not match.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 12:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138900#M1113927</guid>
      <dc:creator>Matus Kozak</dc:creator>
      <dc:date>2024-07-02T12:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138912#M1113928</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291127"&gt;@Matus Kozak&lt;/a&gt;, are you sure that adding "domain" option to the "ssl trust-point" command solves untrusted certificate issue because ASA is able to choose correct trustpoint when client connects? How do you start connection, from the browser or right from the AnyConnect client?&lt;/P&gt;&lt;P&gt;I'm confused, because AnyConnect client doesn't support TLS SNI extension yet, which is a design bug CSCue35947 / CSCvh77602. So, if the client doesn't send SNI, the ASA doesn't know which "virtual server" the client connects to during TLS handshake and hence cannot choose correct certificate for the respective domain (group-url)...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 12:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138912#M1113928</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-02T12:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138948#M1113929</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt; well, I'm sure that I dont have an issue with cert and untrusted domain, on the ASA 9.12(4) it is working and does not matter if it is Anyconnect or browser. So if I go to one url I have correct cert and if I go to second url again I have correct cert for second domain.&lt;/P&gt;
&lt;P&gt;I migrated ASA to FTD and I would like to use similar config on FTD that I have more domains and need to match correct cert (webserver? cert)&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 13:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5138948#M1113929</guid>
      <dc:creator>Matus Kozak</dc:creator>
      <dc:date>2024-07-02T13:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139061#M1113933</link>
      <description>&lt;P&gt;I'm puzzled. I don't understand how this can work on ASA. Let's ask &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481123"&gt;@ccieexpert&lt;/a&gt; , maybe he can shed some light.&lt;/P&gt;&lt;P&gt;FMC doesn't have an option to configure "domain" as you mentioned. So, the only option is to use flexconfig here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139061#M1113933</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-02T17:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139250#M1113958</link>
      <description>&lt;P&gt;the secure client does support SNI.. unfortunately from what I can see flexconfig does not support it. you may want to talk to your partner or Cisco account team to take it up with the business unit...&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ccieexpert_0-1719988395911.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/222168iA74A3DB5863D8038/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ccieexpert_0-1719988395911.png" alt="ccieexpert_0-1719988395911.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 06:34:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139250#M1113958</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-03T06:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139336#M1113960</link>
      <description>&lt;P&gt;Right. Looking at the sniffer trace I can confirm that AnyConnect 4.10 sends SNI. Looks like Cisco fixed this issue at some point, but forgot to update CSCvh77602.&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291127"&gt;@Matus Kozak&lt;/a&gt;, the solution is to generate new FTD certificate and include all of FTD hostnames into the SAN certificate field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 08:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139336#M1113960</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-03T08:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139442#M1113966</link>
      <description>&lt;P&gt;I think you need two point here if I am correct&amp;nbsp;&lt;BR /&gt;1- FTD using wildcard&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn/ftd-vpn-wildcard-certificate/td-p/4184374" target="_blank"&gt;https://community.cisco.com/t5/vpn/ftd-vpn-wildcard-certificate/td-p/4184374&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;2- FTD using cert mapping&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2023/07/14/ftd-anyconnect-certificate-map/" target="_blank"&gt;https://integratingit.wordpress.com/2023/07/14/ftd-anyconnect-certificate-map/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;this make FTD use wildcard for both anyconnect two group and FTD use user cert to mapping it to correct profile&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 12:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139442#M1113966</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-03T12:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139486#M1113969</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt; , I dont need more FTD hostnames and include them into the SAN. I need multiple certificates (wildcards) to match multiple domain names as I wrote in first post.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; , thanks. 2-FTD cert mapping is for user authenticatioin, it's good but I dont need this.&lt;BR /&gt;I have two wildcard certs for two different domains... I need similar functionality how it was on the ASA... domain cert match. So I have trust-point for one domain, second trust-pont for second domain an if somebody write to anyconnect or browser &lt;A href="https://firstdomain" target="_blank"&gt;https://firstdomain&lt;/A&gt; it matches first cert and &lt;A href="https://seconddomain" target="_blank"&gt;https://seconddomain&lt;/A&gt; it matches second trustpoint. Two (or more) domains on outside interface, same IP. Hope it is clear.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 14:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139486#M1113969</guid>
      <dc:creator>Matus Kozak</dc:creator>
      <dc:date>2024-07-03T14:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139490#M1113970</link>
      <description>&lt;P&gt;in ftd when you add anyconnect connection profile you can select which cert. Ftd will use for this profile abd here you can use wildcard cert.&lt;/P&gt;
&lt;P&gt;So first add two cert to ftd one for each CA (trsut point) and then use each one for different anyconnect profile.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You have two choice 1- use pkts 2- use manual' i.e. generate csr and sign identity cert of ftd from ca.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/215849-certificate-installation-and-renewal-on.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/215849-certificate-installation-and-renewal-on.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;That it.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 14:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139490#M1113970</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-03T14:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139535#M1113976</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291127"&gt;@Matus Kozak&lt;/a&gt;, instead of multiple certificates use single certificate and include *.domainA.example and *.domainB.example into the SAN field. You can put as many hostnames or domainnames into the SAN as you need when creating certificate signing request on Windows or with OpenSSL (ASA/FTD cannot do this). That simple.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 15:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139535#M1113976</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-03T15:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139614#M1113983</link>
      <description>&lt;P&gt;the problem or challenge is that multiple engineers can file bug and they become duplicate... and at times a QA/developer may file a new bug...you can open a TAC case and have them link all of these as duplicates to the bug that added the feature..&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 18:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139614#M1113983</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-03T18:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139616#M1113985</link>
      <description>&lt;P&gt;I think until they implement that features, the suggestion to use multiple wildcard in one cert maybe the way to go &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 19:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5139616#M1113985</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-07-03T19:00:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5152259#M1114684</link>
      <description>&lt;P&gt;one option which worked for me was to change HostName and HostAddress in XML profile...&lt;/P&gt;
&lt;P&gt;for example:&lt;/P&gt;
&lt;P&gt;&amp;lt;HostName&amp;gt;domain1.example.com&amp;lt;/HostName&amp;gt;&lt;BR /&gt;&amp;lt;HostAddress&amp;gt;domain2.example.com&amp;lt;/HostAddress&amp;gt;&lt;/P&gt;
&lt;P&gt;or vice versa.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jul 2024 19:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5152259#M1114684</guid>
      <dc:creator>Matus Kozak</dc:creator>
      <dc:date>2024-07-27T19:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5326820#M1122547</link>
      <description>&lt;P&gt;Hi Matus&lt;/P&gt;
&lt;P&gt;Is it correct that you did not solve the issue and had to do a workaround?&lt;/P&gt;
&lt;P&gt;I have the same issue, and yes, we can implement a workaround, but this is a feature working on a ASA but is blocked on FTD/FMC.&lt;/P&gt;
&lt;P&gt;regards Thomas&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 13:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5326820#M1122547</guid>
      <dc:creator>tkiel</dc:creator>
      <dc:date>2025-09-03T13:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA to FTD migration - SSL trustpoint for multiple domain question</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5326822#M1122548</link>
      <description>&lt;P&gt;Make new post please&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 03 Sep 2025 13:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-ssl-trustpoint-for-multiple-domain-question/m-p/5326822#M1122548</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-03T13:30:26Z</dc:date>
    </item>
  </channel>
</rss>

