<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect Via Client Certificates - Questions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013974#M23116</link>
    <description>&lt;P&gt;&lt;SPAN&gt;So is that trustpoint enabled for ssl? &amp;nbsp;Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Do the ASA and User trust each others certificate? &amp;nbsp;Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;So you have a computer certificate that works but it's just the user certificate that does not work? Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I’ll get back to you on template differences&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is the difference in the certificate template used?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Enable debugging on the ASA and upload for review.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 18 Jan 2020 17:53:36 GMT</pubDate>
    <dc:creator>s1nsp4wn</dc:creator>
    <dc:date>2020-01-18T17:53:36Z</dc:date>
    <item>
      <title>AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013921#M23104</link>
      <description />
      <pubDate>Tue, 21 Jan 2020 20:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013921#M23104</guid>
      <dc:creator>s1nsp4wn</dc:creator>
      <dc:date>2020-01-21T20:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013925#M23105</link>
      <description>Hi,&lt;BR /&gt;Yes it's possible to authenticate to ASA using certificates only and just send authorisation to ISE.&lt;BR /&gt;&lt;BR /&gt;The AnyConnect user must have a certificate that is mutually trusted by the ASA. The ASA would usually have an identity certificate issued by an internal CA, which is the same CA that issued the user certificate.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sat, 18 Jan 2020 14:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013925#M23105</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-18T14:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013938#M23108</link>
      <description>&lt;P&gt;What would the ASA cli config look like? &amp;nbsp;Should I remove authentication myiseserver from tunnel group? &amp;nbsp;Also I have my internal root and intermediate in CA on the ASA already but it will not accept the computer client cert I have with error:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;File: CTransportWinHttp.cpp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Line: 1255&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Invoked Function: HttpSendRequest&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Return Code: 12186 (0x00002F9A)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Description: The client certificate credentials were not recognized.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;********************************************************&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Function: ConnectIfc::TranslateStatusCode&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;File: ConnectIfc.cpp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Line: 3157&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Invoked Function: ConnectIfc::TranslateStatusCode&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Return Code: -&lt;A href="tel:29949918" target="_blank"&gt;29949918&lt;/A&gt; (0xFE370022)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Description: CTRANSPORT_ERROR_USER_CERT&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Internal Error (client certificate error).&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 15:55:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013938#M23108</guid>
      <dc:creator>s1nsp4wn</dc:creator>
      <dc:date>2020-01-18T15:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013942#M23111</link>
      <description>You need to use a user certificate</description>
      <pubDate>Sat, 18 Jan 2020 16:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013942#M23111</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-18T16:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013944#M23112</link>
      <description>&lt;P&gt;Error above is from a user cert. &amp;nbsp;I have a machine cert that doesn’t get this error.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 16:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013944#M23112</guid>
      <dc:creator>s1nsp4wn</dc:creator>
      <dc:date>2020-01-18T16:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013946#M23113</link>
      <description>&lt;P&gt;Configuration below from my lab, which successfully authenticates the user to the ASA using certificates and passes the CN to ISE for authorisation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;aaa-server ISE protocol radius&lt;BR /&gt; authorize-only&lt;BR /&gt; interim-accounting-update periodic 24&lt;BR /&gt; dynamic-authorization&lt;BR /&gt;aaa-server ISE (INSIDE) host 192.168.10.10&lt;BR /&gt; key *****&lt;BR /&gt; authentication-port 1812&lt;BR /&gt; accounting-port 1813&lt;BR /&gt; radius-common-pw *****&lt;BR /&gt;&lt;BR /&gt;tunnel-group TG-1 general-attributes&lt;BR /&gt; authorization-server-group ISE&lt;BR /&gt;tunnel-group TG-1 webvpn-attributes&lt;BR /&gt; authentication certificate&lt;BR /&gt; group-alias TG-1 enable&lt;BR /&gt;&lt;BR /&gt;crypto ca trustpoint LAB_PKI&lt;BR /&gt; enrollment terminal&lt;BR /&gt; fqdn asa-1.lab.net&lt;BR /&gt; subject-name CN=asa-1.lab.net,OU=LAB,ST=London,C=GB&lt;BR /&gt; keypair VPN_KEY&lt;BR /&gt; crl configure&lt;BR /&gt;&lt;BR /&gt;ssl trust-point LAB_PKI OUTSIDE&lt;/PRE&gt;&lt;P&gt;The identity certificate on the ASA trustpoint LAB_PKI is signed by the same Internal CA that issued the user certificate on my computer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Provide your configuration if you still have issues, errors without context make it harder to troubleshoot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 16:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013946#M23113</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-18T16:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013953#M23114</link>
      <description>&lt;P&gt;keys, hostnames, addresses etc removed:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group test type remote-access&lt;BR /&gt;tunnel-group test general-attributes&lt;BR /&gt;authentication-server-group test&lt;BR /&gt;authorization-server-group test&lt;BR /&gt;accounting-server-group test&lt;BR /&gt;default-group-policy test&lt;BR /&gt;authorization-required&lt;BR /&gt;tunnel-group test webvpn-attributes&lt;BR /&gt;authentication aaa certificate&lt;BR /&gt;group-url https://fqdn/test enable&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;aaa-server test protocol radius&lt;BR /&gt;authorize-only&lt;BR /&gt;interim-accounting-update periodic 24&lt;BR /&gt;dynamic-authorization&lt;BR /&gt;aaa-server test (INSIDE) host mypriserver&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;BR /&gt;raaa-server test (INSIDE) host mysecserver&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa-server test protocol radius&lt;BR /&gt;aaa-server test (INSIDE) host mypriserver&lt;BR /&gt;authentication-port 1812&lt;BR /&gt;accounting-port 1813&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ca trustpoint root&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint intermediate&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;(two trust points because I could not combine my root and intermediate into one cert)&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 17:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013953#M23114</guid>
      <dc:creator>s1nsp4wn</dc:creator>
      <dc:date>2020-01-18T17:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013959#M23115</link>
      <description>So is that trustpoint enabled for ssl?&lt;BR /&gt;Do the ASA and User trust each others certificate?&lt;BR /&gt;So you have a computer certificate that works but it's just the user certificate that does not work? What is the difference in the certificate template used?&lt;BR /&gt;Enable debugging on the ASA and upload for review.</description>
      <pubDate>Sat, 18 Jan 2020 17:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013959#M23115</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-18T17:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect Via Client Certificates - Questions</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013974#M23116</link>
      <description>&lt;P&gt;&lt;SPAN&gt;So is that trustpoint enabled for ssl? &amp;nbsp;Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Do the ASA and User trust each others certificate? &amp;nbsp;Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;So you have a computer certificate that works but it's just the user certificate that does not work? Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I’ll get back to you on template differences&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is the difference in the certificate template used?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Enable debugging on the ASA and upload for review.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2020 17:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-via-client-certificates-questions/m-p/4013974#M23116</guid>
      <dc:creator>s1nsp4wn</dc:creator>
      <dc:date>2020-01-18T17:53:36Z</dc:date>
    </item>
  </channel>
</rss>

