<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cert for ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685768#M13832</link>
    <description>&lt;P&gt;Yes but&lt;BR /&gt;&lt;BR /&gt;1) did you install a single CA certificate concatening the chain from root to the final intermediate CA ?&lt;BR /&gt;&lt;BR /&gt;2) or did you install each CA certificate needed from root to the final intermediate CA ?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;To my mind, the good option to get it working is the option 2.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Aug 2018 13:21:28 GMT</pubDate>
    <dc:creator>Jerome BERTHIER</dc:creator>
    <dc:date>2018-08-10T13:21:28Z</dc:date>
    <item>
      <title>Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685221#M13815</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we have a ASA5585-x that has our VPN.&amp;nbsp; Recently we started get the "Invaild Cert" when users connect.&amp;nbsp; I brought a new Godaddy Cert and had one of the other tech install the information.&amp;nbsp; After doing the CSR for the ASA and getting the Godaddy bundle we are still have that problem.&amp;nbsp; I have checked the identity cert and found only self-signed certs.&amp;nbsp; In my ca cert section I see the Godaddy cert!&amp;nbsp; I have the document on installing cert so what am I missing?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685221#M13815</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2020-02-21T16:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685285#M13818</link>
      <description>&lt;P&gt;Here's a great article for setting up the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Without knowing you're full configuration, I would verify the following:&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp; You have a DNS entry for the FQDN on the certificate.&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; Verify the correct certificate is configured on the correct interface (Configuration&amp;gt;Remote Access VPN&amp;gt;Advanced&amp;gt;SSL Settings)&lt;/P&gt;
&lt;P&gt;3.&amp;nbsp; Verify you're users are going to the FQDN on the certificate and not the public IP or a different FQDN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 19:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685285#M13818</guid>
      <dc:creator>croll9898</dc:creator>
      <dc:date>2018-08-09T19:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685321#M13819</link>
      <description>&lt;P&gt;Thanks for the quick reply. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;all of those settings have been triple checked.&amp;nbsp; I think my issue is that the old CA cert was changed and is being used as the default.&amp;nbsp; The naming convention for the ASA is the same but different since we had a name change.&amp;nbsp; I am contacting Godaddy to get rekeyed.&amp;nbsp; That way I can start from the beginning. &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Aug 2018 20:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685321#M13819</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-09T20:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685520#M13822</link>
      <description>&lt;P&gt;have you verified that the client that try to connect have all the intermediate certs that are used in the new Godaddy cert?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 04:10:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685520#M13822</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-08-10T04:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685531#M13823</link>
      <description>&lt;P&gt;Your site&amp;nbsp;&lt;A href="https://srhvpn.srh.noaa.gov/" target="_blank"&gt;https://srhvpn.srh.noaa.gov/&lt;/A&gt; is currently showing the certificate from the SRH root CA, not the one from GoDaddy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check that you have bound the GoDaddy certificate to the outside interface:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ssl trust-point&amp;nbsp;ASDM_TrustPoint7 outside&lt;/PRE&gt;
&lt;P&gt;(assuming the nameif is "outside")&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 04:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685531#M13823</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-08-10T04:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685712#M13825</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does the CA certificat contain a chain of certicate (CA root and subsequent CA intermediate) ?&lt;BR /&gt;&lt;BR /&gt;If yes than you have to install all certificate in this chain separetely in the ASA under Configuration &amp;gt; Device Management &amp;gt; Certificate Management &amp;gt; CA Certificates.&lt;BR /&gt;&lt;BR /&gt;If you installed the CA certificate containing the chain, I guess it won't be recognized on clients.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 12:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685712#M13825</guid>
      <dc:creator>Jerome BERTHIER</dc:creator>
      <dc:date>2018-08-10T12:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685750#M13826</link>
      <description>Hi Dennis,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Yes all client have the intermediate cert loaded on deivice.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Aug 2018 13:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685750#M13826</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-10T13:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685754#M13829</link>
      <description>Marvin,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;That is the real issue.  I have rekeyed the ASA with the godaddy cert this&lt;BR /&gt;morning and still get the same error&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Aug 2018 13:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685754#M13829</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-10T13:12:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685761#M13831</link>
      <description>Jerome,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks for the reply,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I have made sure that the CA chain is there on the ASA and the laptop.  At&lt;BR /&gt;the moment the problem is loading the new cert.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Aug 2018 13:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685761#M13831</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-10T13:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685768#M13832</link>
      <description>&lt;P&gt;Yes but&lt;BR /&gt;&lt;BR /&gt;1) did you install a single CA certificate concatening the chain from root to the final intermediate CA ?&lt;BR /&gt;&lt;BR /&gt;2) or did you install each CA certificate needed from root to the final intermediate CA ?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;To my mind, the good option to get it working is the option 2.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 13:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685768#M13832</guid>
      <dc:creator>Jerome BERTHIER</dc:creator>
      <dc:date>2018-08-10T13:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685773#M13835</link>
      <description>Jerome,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If I am correct when using GoDaddy you have to install one in the CA cert&lt;BR /&gt;(which is the bundle ) and the other cert under Identity!  Please correct&lt;BR /&gt;me if I am wrong, but when using the ASDM you only have those options.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Aug 2018 13:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685773#M13835</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-10T13:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685776#M13836</link>
      <description />
      <pubDate>Fri, 10 Aug 2018 13:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685776#M13836</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-10T13:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685801#M13837</link>
      <description>&lt;P&gt;Its quite simple to install a certificate :&lt;/P&gt;
&lt;P&gt;1) generate a CSR request (and a key pair if needed)&lt;/P&gt;
&lt;P&gt;2) go to sign it from your SSL certificate provider&lt;/P&gt;
&lt;P&gt;3) install each CA certificate :&lt;/P&gt;
&lt;P&gt;Configuration &amp;gt; Device Management &amp;gt; Certificate Management &amp;gt; CA Certificates&lt;/P&gt;
&lt;P&gt;4) install server certificate (signed from your SSL certificate provider) :&lt;/P&gt;
&lt;P&gt;Configuration &amp;gt; Device Management &amp;gt; Certificate Management &amp;gt; Identity Certificates&lt;/P&gt;
&lt;P&gt;5) choose the new certificate to apply it to your SSL interface :&lt;/P&gt;
&lt;P&gt;Configuration &amp;gt; Remote Access VPN &amp;gt; Advanced &amp;gt; SSL Settings&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On step 3, I think that you cannot use a single CA certificate file if it contains more than one CA certificate (chain bundle).&lt;BR /&gt;&lt;BR /&gt;Instead, you have to retreive each CA certificate depending on which root signed your server certificate :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://certs.godaddy.com/repository/" target="_blank"&gt;https://certs.godaddy.com/repository/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Then import each one.&lt;/P&gt;
&lt;P&gt;If the chain contains for example, three certs : CA root, CA intermediate 1 (signed from CA root) and CA intermediate 2 (signed from CA intermediate 1) then you should have those three certificates separately under Certificate Management &amp;gt; CA Certificates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 13:52:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685801#M13837</guid>
      <dc:creator>Jerome BERTHIER</dc:creator>
      <dc:date>2018-08-10T13:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685805#M13838</link>
      <description>&lt;P&gt;Check out this article to verify you're generating the correct&amp;nbsp;request (General Usage vs Usage Key)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/other-security-subjects/problems-importing-ssl-certificate-to-asa-7-2/td-p/905671" target="_blank"&gt;https://community.cisco.com/t5/other-security-subjects/problems-importing-ssl-certificate-to-asa-7-2/td-p/905671&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On a side note, what type of machines will be utilizing the VPN?&amp;nbsp; We're using an internally generated certificate (similar to the current certificate on srhvpn.srh.noaa.gov) since our policy is only Active Directory Domain joined machines can access our AnyConnect VPN.&amp;nbsp; In that case, you can use Group Policy to install the SR Root CA on each machine and that should fix the trust issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also test this out by installing the SR Root CA locally (which I did and I'm no longer getting the error).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 14:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3685805#M13838</guid>
      <dc:creator>croll9898</dc:creator>
      <dc:date>2018-08-10T14:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3686028#M13839</link>
      <description>&lt;P&gt;Jerome,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After following the prescribed settings for adding the Identity cert.&amp;nbsp; Step #4 is where I am having the issue.&amp;nbsp; I even tried to paste the base-64&amp;nbsp; into the box.&amp;nbsp; Still says that the failed to parse data and that the public Key is&lt;/P&gt;</description>
      <pubDate>Fri, 10 Aug 2018 17:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3686028#M13839</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-10T17:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687086#M13840</link>
      <description>&lt;P&gt;Could you detail how you are generating your CSR/Key Pair in step one by providing a screen shot of the following?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Image attached.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Aug 2018 13:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687086#M13840</guid>
      <dc:creator>croll9898</dc:creator>
      <dc:date>2018-08-13T13:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687096#M13841</link>
      <description>&lt;P&gt;Here are the errors&lt;/P&gt;</description>
      <pubDate>Mon, 13 Aug 2018 13:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687096#M13841</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-13T13:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687103#M13842</link>
      <description>&lt;P&gt;I understand those are the errors, but I'm trying to determine which key pair you're using to generate your request.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you go to Device Management&amp;gt;Certificate Management&amp;gt;Identity Management and then select "Add" in the top right a new window should appear.&amp;nbsp; In that window, if you select the radio button for "Add a new identity certificate", select the Key Pair you used to generate the CSR and then select "Show", that will show details of the Key Pair.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm looking for the first four details listed in that window.&amp;nbsp; You can also reference the screen shot from my previous post.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Aug 2018 13:52:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687103#M13842</guid>
      <dc:creator>croll9898</dc:creator>
      <dc:date>2018-08-13T13:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687117#M13843</link>
      <description>This is the same keypair name that is already saved into the ASA and used&lt;BR /&gt;with CSR.   Does that not override the CSR I already have made for my&lt;BR /&gt;identity cert sent to third party provider?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 13 Aug 2018 14:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687117#M13843</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-13T14:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cert for ASA</title>
      <link>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687121#M13844</link>
      <description>&lt;P&gt;here is the&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Aug 2018 14:05:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cert-for-asa/m-p/3687121#M13844</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2018-08-13T14:05:56Z</dc:date>
    </item>
  </channel>
</rss>

