<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks again Karsten! Your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605255#M202056</link>
    <description>&lt;P&gt;Thanks again Karsten! Your help and advice is much appreciated!&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;</description>
    <pubDate>Fri, 19 Dec 2014 15:41:33 GMT</pubDate>
    <dc:creator>rcampb3ll</dc:creator>
    <dc:date>2014-12-19T15:41:33Z</dc:date>
    <item>
      <title>ASA 5515 - SSL certificate - transition from SHA1 to SHA2</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605249#M202045</link>
      <description>&lt;P&gt;We have an ASA 5515 running ver 9.1(2). (Actually 2 of them in an HA Active/Passive cluster)&lt;/P&gt;&lt;P&gt;The ssl cert installed on our ASA that we currently use for SSL VPN is SHA1. This cert is due to expire soon, so we are looking to renew it before it expires. We would want the new cert to be SHA2.&lt;/P&gt;&lt;P&gt;I've looked over this cisco technote for SSL cert renewal information:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/107956-renew-ssl.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/107956-renew-ssl.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It doesn't specifically address if transitioning from a SHA1 cert to an SHA2 cert. Am I safe to follow the steps in this doc, considering that we will be requesting an SHA2 SSL cert? Any caveats that I need to be aware of?&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:14:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605249#M202045</guid>
      <dc:creator>rcampb3ll</dc:creator>
      <dc:date>2019-03-12T05:14:43Z</dc:date>
    </item>
    <item>
      <title>It all depends on the CA you</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605250#M202046</link>
      <description>&lt;P&gt;It all depends on the CA you use. Two examples:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Entrust&lt;BR /&gt;You can generate your CSR on the ASA, and in the Entrust web-portal you choose that you want your cert to be signed with SHA2.&lt;/LI&gt;&lt;LI&gt;StartSSL&lt;BR /&gt;If you generate your CSR on the ASA it will be signed with SHA-1. You will get a SHA-1 signed certificate back.&lt;BR /&gt;If you generate a CSR with openSSL (or any tool that is capable of that) and sign your request with SHA2, the certificate will also be signed with SHA2&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 18 Dec 2014 20:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605250#M202046</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-12-18T20:59:34Z</dc:date>
    </item>
    <item>
      <title>Thanks for the response</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605251#M202048</link>
      <description>&lt;P&gt;Thanks for the response Karsten!&lt;/P&gt;&lt;P&gt;When I am generating the CSR from my ASA, because I will be choosing a SHA2 cert (from the Entrust portal actually), do I use my existing key pair, or do I need to create a new key pair?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 21:16:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605251#M202048</guid>
      <dc:creator>rcampb3ll</dc:creator>
      <dc:date>2014-12-18T21:16:42Z</dc:date>
    </item>
    <item>
      <title>You can keep your old key.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605252#M202050</link>
      <description>&lt;P&gt;You can keep your old key. But if it's only a 2048 bit key (or even less), this is the time to increase the bitsize for some added security. I typically use 3072 Bit keys. Probably the keys that I will&amp;nbsp;renew&amp;nbsp;next year will all be 4096 bit.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 21:40:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605252#M202050</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-12-18T21:40:29Z</dc:date>
    </item>
    <item>
      <title>One more question for you</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605253#M202052</link>
      <description>&lt;P&gt;One more question for you.&lt;/P&gt;&lt;P&gt;Considering that our intended use of this new SSL cert will be for SSL VPN, what are the potential negative ramifications of chosing the 4096 bit over the 2048 bit? From the remote user perspective, would any slowdown occur only during initial setup of the VPN session, or would it be throughout the entire VPN session?&lt;/P&gt;&lt;P&gt;(ok...so it was actually 2 questions.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 22:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605253#M202052</guid>
      <dc:creator>rcampb3ll</dc:creator>
      <dc:date>2014-12-18T22:54:54Z</dc:date>
    </item>
    <item>
      <title>The sessio-setup will be</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605254#M202054</link>
      <description>&lt;P&gt;The sessio-setup will be slightly slower. The session-data&amp;nbsp;is protected with symetric crypto like AES256/SHA1 (or AES-GCM in the future), they don't need the public key crypto any more.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2014 07:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605254#M202054</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-12-19T07:17:24Z</dc:date>
    </item>
    <item>
      <title>Thanks again Karsten! Your</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605255#M202056</link>
      <description>&lt;P&gt;Thanks again Karsten! Your help and advice is much appreciated!&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Dec 2014 15:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605255#M202056</guid>
      <dc:creator>rcampb3ll</dc:creator>
      <dc:date>2014-12-19T15:41:33Z</dc:date>
    </item>
    <item>
      <title>Hi All,I have this problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605256#M202058</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have this problem too. My IOS version is 9.2.2(4) and using 5585-X. Is there any solution for generating CSR enabled SHA2? Or we have to upgrade first to 9.3 or newer to support SHA2.&lt;/P&gt;&lt;P&gt;For you info, i will buy certificate from Cybertrust, not Entrust.&lt;/P&gt;&lt;P&gt;Kindly waiting for your reply.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jun 2015 02:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-ssl-certificate-transition-from-sha1-to-sha2/m-p/2605256#M202058</guid>
      <dc:creator>irvan.tambunan</dc:creator>
      <dc:date>2015-06-09T02:58:28Z</dc:date>
    </item>
  </channel>
</rss>

