<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASAv Smart Licensing Registration fails (certificate validation fa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290851#M1121021</link>
    <description>&lt;P&gt;Sure. Removed any company data from the outputs (companyxyz and xxx sections). No&amp;nbsp;Cisco Licensing Root is currently installed which brings me back to my question if I need to do it manually and why it is not on the ASA by default.&lt;/P&gt;&lt;P&gt;show version&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Cisco Adaptive Security Appliance Software Version 9.18(4)53
SSP Operating System Version 2.12(1.96)
Device Manager Version 7.18(1)152

Compiled on Thu 20-Feb-25 05:43 GMT by builders
System image file is "disk0:/asa9-18-4-53-smp-k8.bin"
Config file at boot was "startup-config"

xxxxxxx up 54 mins 14 secs
Start-up time 11 secs

Hardware:   ASAv, 2048 MB RAM, CPU Pentium II 2000 MHz,
Internal ATA Compact Flash, 1024MB
Slot 1: ATA Compact Flash, 8192MB
BIOS Flash Firmware Hub @ 0x1, 0KB


 0: Ext: Management0/0       : address is 0050.56ad.cf70, irq 10
 1: Ext: GigabitEthernet0/0  : address is 0050.56ad.8e28, irq 7
 2: Ext: GigabitEthernet0/1  : address is 0050.56ad.8dc6, irq 9
 3: Ext: GigabitEthernet0/2  : address is 0050.56ad.46ba, irq 11
 4: Ext: GigabitEthernet0/3  : address is 0050.56ad.1a8f, irq 10
 5: Ext: GigabitEthernet0/4  : address is 0050.56ad.b126, irq 7
 6: Ext: GigabitEthernet0/5  : address is 0050.56ad.8abd, irq 9
 7: Ext: GigabitEthernet0/6  : address is 0050.56ad.9e3b, irq 11
 8: Ext: GigabitEthernet0/7  : address is 0050.56ad.76a0, irq 10
 9: Ext: GigabitEthernet0/8  : address is 0050.56ad.11e1, irq 7
10: Int: Internal-Data0/0    : address is 0000.0100.0001, irq 0

License mode: Smart Licensing
ASAv Platform License State: Unlicensed
Active entitlement: ASAv-STD-1G, enforce mode: Eval period
Firewall throughput limited to 100 Kbps

Licensed features for this platform:
Maximum VLANs                     : 50
Inside Hosts                      : Unlimited
Failover                          : Active/Active
Encryption-DES                    : Enabled
Encryption-3DES-AES               : Enabled
Security Contexts                 : 2
Carrier                           : Disabled
AnyConnect Premium Peers          : 2
AnyConnect Essentials             : Disabled
Other VPN Peers                   : 250
Total VPN Peers                   : 250
AnyConnect for Mobile             : Disabled
AnyConnect for Cisco VPN Phone    : Disabled
Advanced Endpoint Assessment      : Disabled
Shared License                    : Disabled
Total TLS Proxy Sessions          : 2
Botnet Traffic Filter             : Enabled
Cluster                           : Enabled

Serial Number: xxx

Image type          : Release
Key version         : A

Configuration has not been modified since last system restart.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show run call-home&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;no call-home reporting anonymous
call-home
 contact-email-addr sch-smart-licensing@cisco.com
 source-interface inside
 profile License
  destination address http https://xxxxxx.com/Transportgateway/services/DeviceRequestHandler
  destination transport-method http
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show crypto ca certificates&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;CA Certificate
  Status: Available
  Certificate Serial Number: 0a0142800000014523c844b500000002
  Certificate Usage: General Purpose
  Public Key Type: RSA (4096 bits)
  Signature Algorithm: RSA-SHA256
  Issuer Name:
    CN=IdenTrust Commercial Root CA 1
    O=IdenTrust
    C=US
  Subject Name:
    CN=IdenTrust Commercial Root CA 1
    O=IdenTrust
    C=US
  Validity Date:
    start date: 18:12:23 UTC Jan 16 2014
    end   date: 18:12:23 UTC Jan 16 2034
  Storage: config
  Associated Trustpoints: _SmartCallHome_ServerCA

CA Certificate
  Status: Available
  Certificate Serial Number: 0509
  Certificate Usage: General Purpose
  Public Key Type: RSA (4096 bits)
  Signature Algorithm: RSA-SHA1
  Issuer Name:
    CN=QuoVadis Root CA 2
    O=QuoVadis Limited
    C=BM
  Subject Name:
    CN=QuoVadis Root CA 2
    O=QuoVadis Limited
    C=BM
  Validity Date:
    start date: 18:27:00 UTC Nov 24 2006
    end   date: 18:23:33 UTC Nov 24 2031
  Storage: config
  Associated Trustpoints: _SmartCallHome_ServerCA2

CA Certificate
  Status: Available
  Certificate Serial Number: xxx
  Certificate Usage: Signature
  Public Key Type: RSA (4096 bits)
  Signature Algorithm: RSA-SHA256
  Issuer Name:
    CN=COMPANYXYZ Root CA 2
    O=COMPANYXYZ
    C=XX
  Subject Name:
    CN=COMPANYXYZ Root CA 2
    O=COMPANYXYZ
    C=XX
  Validity Date:
    start date: 07:59:43 UTC Oct 4 2018
    end   date: 08:09:42 UTC Oct 4 2048
  Storage: config
  Associated Trustpoints: COMPANYXYZ-Root-CA2
&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show run all | in ssl&lt;/P&gt;&lt;LI-CODE lang="markup"&gt; id-usage ssl-ipsec
 no ignore-ssl-keyusage
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
 validation-usage ipsec-client ssl-client
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
 validation-usage ipsec-client ssl-client
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
 validation-usage ipsec-client ssl-client
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
 validation-usage ipsec-client ssl-client
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
ssl server-version tlsv1.2 dtlsv1.2
ssl client-version tlsv1.2
ssl cipher default high
ssl cipher tlsv1 fips
ssl cipher tlsv1.1 fips
ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256"
ssl cipher dtlsv1 fips
ssl cipher dtlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256"
ssl dh-group group15
ssl ecdh-group group19
ssl certificate-authentication fca-timeout 2
 no ssl-server-check
  anyconnect ssl dtls enable
  anyconnect ssl keepalive 20
  anyconnect ssl rekey time none
  anyconnect ssl rekey method none
  anyconnect ssl compression none
  anyconnect ssl df-bit-ignore disable
compression anyconnect-ssl http-comp&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show run crypto ca trustpoint&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;crypto ca trustpoint _SmartCallHome_ServerCA
 no validation-usage
 crl configure
crypto ca trustpoint _SmartCallHome_ServerCA2
 no validation-usage
 crl configure
crypto ca trustpoint COMPANYXYZ-Root-CA2
 enrollment terminal
 crl configure&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 May 2025 05:25:35 GMT</pubDate>
    <dc:creator>Counterdoc</dc:creator>
    <dc:date>2025-05-15T05:25:35Z</dc:date>
    <item>
      <title>ASAv Smart Licensing Registration fails (certificate validation failed</title>
      <link>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290691#M1121011</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I am trying to register a ASAv&amp;nbsp;9.18(4)53 to a Cisco SSM On-Prem Smart Licensing Server. On the ASA I get the following error:&lt;/P&gt;&lt;PRE&gt;%ASA-6-120003: Call-Home is processing license event Smart Licensing.
%ASA-6-725001: Starting SSL handshake with server inside:xxxxxxx/24359 to xxxxxx/443 for TLS session
&lt;STRONG&gt;%ASA-3-717009: Certificate validation failed. serial number: 01, subject name: CN=Cisco Licensing Root CA,O=Cisco.
%ASA-3-717027: Certificate chain failed validation. Generic validation failure occurred.&lt;/STRONG&gt;
%ASA-4-120006: Call-Home license message to https://xxxxxxx&amp;nbsp;.com/Transportgateway/services/DeviceRequestHandler&amp;nbsp; failed. Reason: CONNECT_FAILED
%ASA-4-120005: Call-Home license message to https://xxxxxxx.com/Transportgateway/services/DeviceRequestHandler&amp;nbsp; was dropped. Reason: CONNECT_FAILED
%ASA-3-444303: %SMART_LIC-3-COMM_FAILED:Communications failure with the Cisco Smart Software Manager (CSSM) : Communication message send error&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;So the issue is that the certificate validation fails. Trying it with http instead of https works fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Shouldn't that certificate exist on the ASA by default? Or do I need to install the Cisco Licensing Root CA manually?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I check the certificates on the ASA I see the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;CA Certificate
  Status: Available
  Certificate Serial Number: 0a0142800000014523c844b500000002
  Certificate Usage: General Purpose
  Public Key Type: RSA (4096 bits)
  Signature Algorithm: RSA-SHA256
  Issuer Name:
    CN=IdenTrust Commercial Root CA 1
    O=IdenTrust
    C=US
  Subject Name:
    CN=IdenTrust Commercial Root CA 1
    O=IdenTrust
    C=US
  Validity Date:
    start date: 18:12:23 UTC Jan 16 2014
    end   date: 18:12:23 UTC Jan 16 2034
  Storage: config
  Associated Trustpoints: _SmartCallHome_ServerCA

CA Certificate
  Status: Available
  Certificate Serial Number: 0509
  Certificate Usage: General Purpose
  Public Key Type: RSA (4096 bits)
  Signature Algorithm: RSA-SHA1
  Issuer Name:
    CN=QuoVadis Root CA 2
    O=QuoVadis Limited
    C=BM
  Subject Name:
    CN=QuoVadis Root CA 2
    O=QuoVadis Limited
    C=BM
  Validity Date:
    start date: 18:27:00 UTC Nov 24 2006
    end   date: 18:23:33 UTC Nov 24 2031
  Storage: config
  Associated Trustpoints: _SmartCallHome_ServerCA2&lt;/PRE&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;Marius&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2025 14:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290691#M1121011</guid>
      <dc:creator>Counterdoc</dc:creator>
      <dc:date>2025-05-14T14:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv Smart Licensing Registration fails (certificate validation fa</title>
      <link>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290793#M1121019</link>
      <description>&lt;P&gt;Can you share the outputs from the following commands:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;show version&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;show run call-home&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;show crypto ca certificates&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;show run all | in ssl&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;show run crypto ca trustpoint&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 14 May 2025 20:08:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290793#M1121019</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2025-05-14T20:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv Smart Licensing Registration fails (certificate validation fa</title>
      <link>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290851#M1121021</link>
      <description>&lt;P&gt;Sure. Removed any company data from the outputs (companyxyz and xxx sections). No&amp;nbsp;Cisco Licensing Root is currently installed which brings me back to my question if I need to do it manually and why it is not on the ASA by default.&lt;/P&gt;&lt;P&gt;show version&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Cisco Adaptive Security Appliance Software Version 9.18(4)53
SSP Operating System Version 2.12(1.96)
Device Manager Version 7.18(1)152

Compiled on Thu 20-Feb-25 05:43 GMT by builders
System image file is "disk0:/asa9-18-4-53-smp-k8.bin"
Config file at boot was "startup-config"

xxxxxxx up 54 mins 14 secs
Start-up time 11 secs

Hardware:   ASAv, 2048 MB RAM, CPU Pentium II 2000 MHz,
Internal ATA Compact Flash, 1024MB
Slot 1: ATA Compact Flash, 8192MB
BIOS Flash Firmware Hub @ 0x1, 0KB


 0: Ext: Management0/0       : address is 0050.56ad.cf70, irq 10
 1: Ext: GigabitEthernet0/0  : address is 0050.56ad.8e28, irq 7
 2: Ext: GigabitEthernet0/1  : address is 0050.56ad.8dc6, irq 9
 3: Ext: GigabitEthernet0/2  : address is 0050.56ad.46ba, irq 11
 4: Ext: GigabitEthernet0/3  : address is 0050.56ad.1a8f, irq 10
 5: Ext: GigabitEthernet0/4  : address is 0050.56ad.b126, irq 7
 6: Ext: GigabitEthernet0/5  : address is 0050.56ad.8abd, irq 9
 7: Ext: GigabitEthernet0/6  : address is 0050.56ad.9e3b, irq 11
 8: Ext: GigabitEthernet0/7  : address is 0050.56ad.76a0, irq 10
 9: Ext: GigabitEthernet0/8  : address is 0050.56ad.11e1, irq 7
10: Int: Internal-Data0/0    : address is 0000.0100.0001, irq 0

License mode: Smart Licensing
ASAv Platform License State: Unlicensed
Active entitlement: ASAv-STD-1G, enforce mode: Eval period
Firewall throughput limited to 100 Kbps

Licensed features for this platform:
Maximum VLANs                     : 50
Inside Hosts                      : Unlimited
Failover                          : Active/Active
Encryption-DES                    : Enabled
Encryption-3DES-AES               : Enabled
Security Contexts                 : 2
Carrier                           : Disabled
AnyConnect Premium Peers          : 2
AnyConnect Essentials             : Disabled
Other VPN Peers                   : 250
Total VPN Peers                   : 250
AnyConnect for Mobile             : Disabled
AnyConnect for Cisco VPN Phone    : Disabled
Advanced Endpoint Assessment      : Disabled
Shared License                    : Disabled
Total TLS Proxy Sessions          : 2
Botnet Traffic Filter             : Enabled
Cluster                           : Enabled

Serial Number: xxx

Image type          : Release
Key version         : A

Configuration has not been modified since last system restart.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show run call-home&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;no call-home reporting anonymous
call-home
 contact-email-addr sch-smart-licensing@cisco.com
 source-interface inside
 profile License
  destination address http https://xxxxxx.com/Transportgateway/services/DeviceRequestHandler
  destination transport-method http
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show crypto ca certificates&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;CA Certificate
  Status: Available
  Certificate Serial Number: 0a0142800000014523c844b500000002
  Certificate Usage: General Purpose
  Public Key Type: RSA (4096 bits)
  Signature Algorithm: RSA-SHA256
  Issuer Name:
    CN=IdenTrust Commercial Root CA 1
    O=IdenTrust
    C=US
  Subject Name:
    CN=IdenTrust Commercial Root CA 1
    O=IdenTrust
    C=US
  Validity Date:
    start date: 18:12:23 UTC Jan 16 2014
    end   date: 18:12:23 UTC Jan 16 2034
  Storage: config
  Associated Trustpoints: _SmartCallHome_ServerCA

CA Certificate
  Status: Available
  Certificate Serial Number: 0509
  Certificate Usage: General Purpose
  Public Key Type: RSA (4096 bits)
  Signature Algorithm: RSA-SHA1
  Issuer Name:
    CN=QuoVadis Root CA 2
    O=QuoVadis Limited
    C=BM
  Subject Name:
    CN=QuoVadis Root CA 2
    O=QuoVadis Limited
    C=BM
  Validity Date:
    start date: 18:27:00 UTC Nov 24 2006
    end   date: 18:23:33 UTC Nov 24 2031
  Storage: config
  Associated Trustpoints: _SmartCallHome_ServerCA2

CA Certificate
  Status: Available
  Certificate Serial Number: xxx
  Certificate Usage: Signature
  Public Key Type: RSA (4096 bits)
  Signature Algorithm: RSA-SHA256
  Issuer Name:
    CN=COMPANYXYZ Root CA 2
    O=COMPANYXYZ
    C=XX
  Subject Name:
    CN=COMPANYXYZ Root CA 2
    O=COMPANYXYZ
    C=XX
  Validity Date:
    start date: 07:59:43 UTC Oct 4 2018
    end   date: 08:09:42 UTC Oct 4 2048
  Storage: config
  Associated Trustpoints: COMPANYXYZ-Root-CA2
&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show run all | in ssl&lt;/P&gt;&lt;LI-CODE lang="markup"&gt; id-usage ssl-ipsec
 no ignore-ssl-keyusage
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
 validation-usage ipsec-client ssl-client
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
 validation-usage ipsec-client ssl-client
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
 validation-usage ipsec-client ssl-client
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
 validation-usage ipsec-client ssl-client
 id-usage ssl-ipsec
 no ignore-ssl-keyusage
ssl server-version tlsv1.2 dtlsv1.2
ssl client-version tlsv1.2
ssl cipher default high
ssl cipher tlsv1 fips
ssl cipher tlsv1.1 fips
ssl cipher tlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256"
ssl cipher dtlsv1 fips
ssl cipher dtlsv1.2 custom "ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256"
ssl dh-group group15
ssl ecdh-group group19
ssl certificate-authentication fca-timeout 2
 no ssl-server-check
  anyconnect ssl dtls enable
  anyconnect ssl keepalive 20
  anyconnect ssl rekey time none
  anyconnect ssl rekey method none
  anyconnect ssl compression none
  anyconnect ssl df-bit-ignore disable
compression anyconnect-ssl http-comp&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show run crypto ca trustpoint&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;crypto ca trustpoint _SmartCallHome_ServerCA
 no validation-usage
 crl configure
crypto ca trustpoint _SmartCallHome_ServerCA2
 no validation-usage
 crl configure
crypto ca trustpoint COMPANYXYZ-Root-CA2
 enrollment terminal
 crl configure&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 May 2025 05:25:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290851#M1121021</guid>
      <dc:creator>Counterdoc</dc:creator>
      <dc:date>2025-05-15T05:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv Smart Licensing Registration fails (certificate validation fa</title>
      <link>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290924#M1121026</link>
      <description>&lt;P&gt;I fixed it by replacing the product.pem certificate on the licensing servers frontend docker container which was self-signed (Cisco Licensing Root) by a signed certificate from my Company which is also deployed to our devices. Now it works.&lt;/P&gt;</description>
      <pubDate>Thu, 15 May 2025 08:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-smart-licensing-registration-fails-certificate-validation/m-p/5290924#M1121026</guid>
      <dc:creator>Counterdoc</dc:creator>
      <dc:date>2025-05-15T08:32:03Z</dc:date>
    </item>
  </channel>
</rss>

