<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wildcard SSL cert on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748674#M192465</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have ASA Firewall that will host&amp;nbsp;both our Anyconnect VPN and clientless SSL Webvpn. I am planning to install public CA cert. It will require two certs , one for each vpn. The ASA hostname will not be just a regular firewall hostname.&amp;nbsp;I am cautious as clients browsers or anyconnect client will prompt error message that SSL cert does not match hostname.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the ASA hostname will be ASA1.abcd.com, the anyconnect cert will have CN name vpn.abcd.com, the ssl webvpn cert will have CN name webvpn.abcd.com. This may present a problem as I stated above as the CN names will not match hostname.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are possible solutions? I have read a few things about Wildcard ssl certificate. A&amp;nbsp;Wildcard SSL certificate *.abcd.com may &amp;nbsp;possibly work???&lt;/P&gt;&lt;P&gt;Any suggestions?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:28:52 GMT</pubDate>
    <dc:creator>S891</dc:creator>
    <dc:date>2019-03-12T06:28:52Z</dc:date>
    <item>
      <title>Wildcard SSL cert on ASA</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748674#M192465</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have ASA Firewall that will host&amp;nbsp;both our Anyconnect VPN and clientless SSL Webvpn. I am planning to install public CA cert. It will require two certs , one for each vpn. The ASA hostname will not be just a regular firewall hostname.&amp;nbsp;I am cautious as clients browsers or anyconnect client will prompt error message that SSL cert does not match hostname.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the ASA hostname will be ASA1.abcd.com, the anyconnect cert will have CN name vpn.abcd.com, the ssl webvpn cert will have CN name webvpn.abcd.com. This may present a problem as I stated above as the CN names will not match hostname.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are possible solutions? I have read a few things about Wildcard ssl certificate. A&amp;nbsp;Wildcard SSL certificate *.abcd.com may &amp;nbsp;possibly work???&lt;/P&gt;&lt;P&gt;Any suggestions?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:28:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748674#M192465</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2019-03-12T06:28:52Z</dc:date>
    </item>
    <item>
      <title>There is no problem for the</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748675#M192466</link>
      <description>&lt;P&gt;There is no problem for the VPN when the fqdn doesn't match the hostname.&lt;/P&gt;&lt;P&gt;For your scenario, there are multiple options:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Use a certificate with SANs (subject alternative names). These certificates can have multiple fqdns. This is probably the cheapest solution.&lt;/LI&gt;&lt;LI&gt;Use a wildcard certificate as you mentioned above. With some vendors, these are more expensive then certificates with SANs.&lt;/LI&gt;&lt;LI&gt;If you want to use multiple certificates as mentioned at the beginning of your post, you need a fairly new release. Not sure which one it was, but in 9.3 or 9.4 you van have different certificates on one interface for different fqdns.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Sun, 23 Aug 2015 15:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748675#M192466</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-08-23T15:46:33Z</dc:date>
    </item>
    <item>
      <title>Thanks Karsten. When you say</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748676#M192467</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Thanks Karsten. When you say "t&lt;SPAN style="background-color: rgb(249, 249, 249);"&gt;here is no problem for the VPN when the fqdn doesn't match the hostname" do you mean after applying these options, or generally there is no issue if cert CN name does not match the hostname. I have seen the problem happening many times and it appears as a warning on client side.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="background-color: rgb(249, 249, 249);"&gt;I think option 1 or 2 &amp;nbsp;is the simplest and doable. With option 2 I can have multiple CN names including VPN's and hostname's.&amp;nbsp;&amp;nbsp;So in my example from above there will be CN Name : CN1:&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;ASA1.abcd.com, the anyconnect cert will have CN2:&amp;nbsp;vpn.abcd.com, the ssl webvpn cert will have CN3:&amp;nbsp;webvpn.abcd.com.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Thank&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Aug 2015 18:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748676#M192467</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2015-08-23T18:16:40Z</dc:date>
    </item>
    <item>
      <title>&gt;  I have seen the problem</title>
      <link>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748677#M192468</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;&amp;nbsp;I have seen the problem happening many times and it appears as a warning on client side.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;What kind of warning do you see? If you have a different name in the certificate and you access the VPN with the name in the certificate, there shouldn't be any warning.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;So in my example from above&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;Both in case 1) and 2) there will only be one certificate, but that can be used with more than one name.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 06:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wildcard-ssl-cert-on-asa/m-p/2748677#M192468</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-08-24T06:56:15Z</dc:date>
    </item>
  </channel>
</rss>

