<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL CERT Issue   CiscoASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883158#M26980</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/469611"&gt;@dtsteinb&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I did the CSR request via command line and sent it to Godaddy.&amp;nbsp; I got the SSL cert back and I imported it via the command line.&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Which command line did you use? Only if you use the ASA cli will you have the CSR signed with your ASA's private key and then have a pending certificate signing request. Otherwise you need to supply the ASA with both the private key used to sign the CSR as well as the CA-signed certificate.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jul 2019 11:57:44 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-07-02T11:57:44Z</dc:date>
    <item>
      <title>SSL CERT Issue   CiscoASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3882828#M26969</link>
      <description>&lt;P&gt;I did the CSR request via command line and sent it to Godaddy.&amp;nbsp; I got the SSL cert back and I imported it via the command line.&amp;nbsp; I opened the crt in notepad and copied it in the command line. If I do &lt;SPAN&gt;sh crypto ca certificate&lt;/SPAN&gt; cert_vpn I see 2.&amp;nbsp; The new one which expires 7/4/2019 and the new one which expires 7/4/2020.&amp;nbsp;&amp;nbsp; In the ASDM - Configuration - Certificate Management - Identify certificates I see both.&amp;nbsp; I thought last time I highlighted the new one and did install.&amp;nbsp;&amp;nbsp; Install is not enabled at all.&amp;nbsp;&amp;nbsp; How do I complete the SSL Cert request?&amp;nbsp;&amp;nbsp; When I try to assign the new cert to the outside interface it tells me something about trustpoint ( I think because ADSM_Trustpoint7 does not exist)&amp;nbsp; The new cert also has 2 trustpoints.&amp;nbsp; I have no idea how both got in.&amp;nbsp; &amp;nbsp;It tells me:&lt;/P&gt;&lt;P&gt;Associated TrustPoints&lt;/P&gt;&lt;P&gt;ADSM_Trustpoint7, ADSM_Trustpoint3&amp;nbsp; &amp;nbsp; &amp;nbsp;I have no idea where it got ADSM_Trustpoint7 from.&amp;nbsp;&amp;nbsp; Is there a way to remove that and leave it just ADSM_Trustpoint3 ?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 20:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3882828#M26969</guid>
      <dc:creator>dtsteinb</dc:creator>
      <dc:date>2019-07-01T20:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSL CERT Issue   CiscoASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883158#M26980</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/469611"&gt;@dtsteinb&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I did the CSR request via command line and sent it to Godaddy.&amp;nbsp; I got the SSL cert back and I imported it via the command line.&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Which command line did you use? Only if you use the ASA cli will you have the CSR signed with your ASA's private key and then have a pending certificate signing request. Otherwise you need to supply the ASA with both the private key used to sign the CSR as well as the CA-signed certificate.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 11:57:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883158#M26980</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-02T11:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL CERT Issue   CiscoASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883175#M26992</link>
      <description>&lt;P&gt;I think you are confused between the Identity and CA certificates. For CA certificates, you can have the same CA certificates associated with multiple trustpoints. So if you had cert1 issued by GoDaddy CA installed on Trustpoint3, and then installed a new cert on Trustpoint7, then the Godaddy CA is associated with both TP3 and 7.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Paste your "show crypto ca certificate" output from the ASA after removing any names/private data if you can.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 12:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883175#M26992</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2019-07-02T12:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: SSL CERT Issue   CiscoASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883177#M26996</link>
      <description>&lt;P&gt;I did -&amp;nbsp; crypto ca enroll adsm_Trustpoint3&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 12:28:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883177#M26996</guid>
      <dc:creator>dtsteinb</dc:creator>
      <dc:date>2019-07-02T12:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: SSL CERT Issue   CiscoASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883508#M27002</link>
      <description>&lt;P&gt;This is an Identity Cert&lt;/P&gt;&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number: XXXXXXa78db&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Public Key Type: RSA (2048 bits)&lt;BR /&gt;Signature Algorithm: SHA256 with RSA Encryption&lt;BR /&gt;Issuer Name:&lt;BR /&gt;cn=Go Daddy Secure Certificate Authority - G2&lt;BR /&gt;ou=&lt;A href="http://certs.godaddy.com/repository/" target="_blank" rel="noopener"&gt;http://certs.godaddy.com/repository/&lt;/A&gt;&lt;BR /&gt;o=GoDaddy.com\, Inc.&lt;BR /&gt;l=Scottsdale&lt;BR /&gt;st=Arizona&lt;BR /&gt;c=US&lt;BR /&gt;Subject Name:&lt;BR /&gt;cn=vpn.XXXX.com&lt;BR /&gt;ou=Domain Control Validated&lt;BR /&gt;OCSP AIA:&lt;BR /&gt;URL: &lt;A href="http://ocsp.godaddy.com/" target="_blank" rel="noopener"&gt;http://ocsp.godaddy.com/&lt;/A&gt;&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;[1] &lt;A href="http://crl.godaddy.com/gdig2s1-1092.crl" target="_blank" rel="noopener"&gt;http://crl.godaddy.com/gdig2s1-1092.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 06:12:09 EDT May 5 2019&lt;BR /&gt;end date: 22:25:38 EDT Jul 4 2020&lt;BR /&gt;Associated Trustpoints: ASDM_TrustPoint7 ASDM_TrustPoint3&lt;/P&gt;&lt;P&gt;Certificate&lt;BR /&gt;Status: Available&lt;BR /&gt;Certificate Serial Number: XXXXXXXXXXXXXXX9308&lt;BR /&gt;Certificate Usage: General Purpose&lt;BR /&gt;Public Key Type: RSA (2048 bits)&lt;BR /&gt;Signature Algorithm: SHA256 with RSA Encryption&lt;BR /&gt;Issuer Name:&lt;BR /&gt;cn=Go Daddy Secure Certificate Authority - G2&lt;BR /&gt;ou=&lt;A href="http://certs.godaddy.com/repository/" target="_blank" rel="noopener"&gt;http://certs.godaddy.com/repository/&lt;/A&gt;&lt;BR /&gt;o=GoDaddy.com\, Inc.&lt;BR /&gt;l=Scottsdale&lt;BR /&gt;st=Arizona&lt;BR /&gt;c=US&lt;BR /&gt;Subject Name:&lt;BR /&gt;cn=vpn.XXXX.com&lt;BR /&gt;ou=Domain Control Validated&lt;BR /&gt;OCSP AIA:&lt;BR /&gt;URL: &lt;A href="http://ocsp.godaddy.com/" target="_blank" rel="noopener"&gt;http://ocsp.godaddy.com/&lt;/A&gt;&lt;BR /&gt;CRL Distribution Points:&lt;BR /&gt;[1] &lt;A href="http://crl.godaddy.com/gdig2s1-842.crl" target="_blank" rel="noopener"&gt;http://crl.godaddy.com/gdig2s1-842.crl&lt;/A&gt;&lt;BR /&gt;Validity Date:&lt;BR /&gt;start date: 09:40:14 EDT Jun 28 2018&lt;BR /&gt;end date: 22:25:38 EDT Jul 4 2019&lt;BR /&gt;Associated Trustpoints: ASDM_TrustPoint3&lt;/P&gt;&lt;P&gt;Again, I have I no idea where&amp;nbsp;ASDM_TrustPoint7 came from.&lt;/P&gt;&lt;P&gt;However when I go to the site and look at the cert info it does show the correct Serial # and Date.&amp;nbsp; &amp;nbsp; In the ADSM it shows both and I cant&amp;nbsp; get rid of either because it tells me it is tied to the outside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 20:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-cert-issue-ciscoasa-5510/m-p/3883508#M27002</guid>
      <dc:creator>dtsteinb</dc:creator>
      <dc:date>2019-07-02T20:28:11Z</dc:date>
    </item>
  </channel>
</rss>

