<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks for the info, it in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809334#M160252</link>
    <description>&lt;P&gt;Thanks for the info, it helped!&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;Erik&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jan 2016 20:05:04 GMT</pubDate>
    <dc:creator>erikorrsjo</dc:creator>
    <dc:date>2016-01-29T20:05:04Z</dc:date>
    <item>
      <title>AnyConnect/SSL using wrong certificate</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809331#M160249</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a Cisco ASA5508 and have set up for AnyConnect.&lt;/P&gt;
&lt;P&gt;I have installed a GlobalSign certificate properly:&lt;/P&gt;
&lt;P&gt;GOTFW001(config)# show ssl&lt;BR /&gt;Accept connections using SSLv3 or greater and negotiate to TLSv1.2 or greater&lt;BR /&gt;Start connections using TLSv1.2 and negotiate to TLSv1.2 or greater&lt;BR /&gt;SSL DH Group: group5 (1536-bit modulus)&lt;BR /&gt;SSL ECDH Group: group19 (256-bit EC)&lt;BR /&gt;&lt;BR /&gt;SSL trust-points:&lt;BR /&gt;&amp;nbsp; Self-signed (RSA 2048 bits RSA-SHA256) certificate available&lt;BR /&gt;&amp;nbsp; Self-signed (EC 256 bits ecdsa-with-SHA256) certificate available&lt;BR /&gt;&amp;nbsp; Interface internet: ASDM_TrustPoint1 (RSA 2048 bits RSA-SHA256)&lt;BR /&gt;Certificate authentication is not enabled&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But when I connect to the portal through the internet interface I get certificate error and when checking it I can see that the self-signed certificate is used. Why is that? Anybody got any ideas?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Erik&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:12:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809331#M160249</guid>
      <dc:creator>erikorrsjo</dc:creator>
      <dc:date>2019-03-12T07:12:36Z</dc:date>
    </item>
    <item>
      <title>Dear Erik</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809332#M160250</link>
      <description>&lt;P&gt;Dear Erik&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Have you set in your configuration a command such as &amp;nbsp;:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssl trust-point theRightTrustPoint&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where&amp;nbsp;&lt;SPAN&gt;theRightTrustPoint is the trust point for your&amp;nbsp;GlobalSign certificate&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Vincent&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 16:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809332#M160250</guid>
      <dc:creator>vincent.monnier</dc:creator>
      <dc:date>2016-01-28T16:12:35Z</dc:date>
    </item>
    <item>
      <title>Hi Erik,</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809333#M160251</link>
      <description>&lt;P&gt;Hi Erik,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are you using the firewall version 9.4.1 or above. If yes then you will see that self signed certificate will be used. This is an expected &amp;nbsp;behaviour.&lt;/P&gt;
&lt;P&gt;When the client sends an SSL hello packets, an elliptic curve-capable SSL negotiation is used in version 9.4, and the ASA will present the SSL VPN client with an elliptic curve certificate, even when the corresponding interface has been configured with an RSA-based trustpoint.&amp;nbsp; That's why the ASA is presenting the self-signed Cert "Self-signed (EC 256 bits ecdsa-with-SHA256)".&lt;/P&gt;
&lt;P&gt;So To avoid this, we need&amp;nbsp; to remove the corresponding cipher suites using the ssl cipher command.&lt;BR /&gt;we can execute the following command so that only RSA based ciphers are negotiated (&lt;/P&gt;
&lt;P&gt;ssl cipher tlsv1.2 custom "AES256-SHA:AES128-SHA:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:DES-CBC3-SHA:DES-CBC-SHA:RC4-SHA:RC4-MD5"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please refer the below documents.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa94/release/notes/asarn94.html&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/12524736/asa-x-ios-941-anyconnect-windows-81-untrusted-vpn-server-blocked&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Shivapramod M&lt;BR /&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 16:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809333#M160251</guid>
      <dc:creator>Shivapramod M</dc:creator>
      <dc:date>2016-01-28T16:33:17Z</dc:date>
    </item>
    <item>
      <title>Thanks for the info, it</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809334#M160252</link>
      <description>&lt;P&gt;Thanks for the info, it helped!&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;Erik&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 20:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-ssl-using-wrong-certificate/m-p/2809334#M160252</guid>
      <dc:creator>erikorrsjo</dc:creator>
      <dc:date>2016-01-29T20:05:04Z</dc:date>
    </item>
  </channel>
</rss>

