<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987197#M28641</link>
    <description>&lt;P&gt;The answer I've been looking for! Thank you so much, I have been avoiding software updates on the ASA because of this. Now I can go ahead (after making a proper CA) &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Nov 2019 12:19:08 GMT</pubDate>
    <dc:creator>cristianpop</dc:creator>
    <dc:date>2019-11-21T12:19:08Z</dc:date>
    <item>
      <title>Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3828893#M28629</link>
      <description>&lt;P&gt;I get this message now when I add a new user for in the local CA server.&amp;nbsp; Is Cisco removing the local CA server completely from the 5506-X?? WHY?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 14:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3828893#M28629</guid>
      <dc:creator>dsart</dc:creator>
      <dc:date>2019-03-29T14:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3829127#M28630</link>
      <description>&lt;P&gt;Yes you are correct as per 9.12 release notes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa912/release/notes/asarn912.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa912/release/notes/asarn912.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 21:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3829127#M28630</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-03-29T21:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940128#M28631</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The 9.12 release notes states that "&lt;SPAN&gt;This feature &lt;/SPAN&gt;&lt;SPAN&gt;has become &lt;/SPAN&gt;&lt;SPAN&gt;obsolete...&lt;/SPAN&gt;". Is there another feature replacing it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm running a Local CA server and issue certificates for devices that connect to VPN. This adds a layer of security since a valid certificate besides a password is required to be able to connect to the VPN service. Is there another way of doing this in the future if ASAs will no longer have the Local CA feature?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 12:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940128#M28631</guid>
      <dc:creator>cristianpop</dc:creator>
      <dc:date>2019-10-14T12:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940219#M28632</link>
      <description>Hi,&lt;BR /&gt;The other options are getting the certificate signed by a public CA such as Verisign or Comodo. Alternatively you could use a Cisco IOS router as a CA or a Windows Server. &lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Mon, 14 Oct 2019 14:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940219#M28632</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-10-14T14:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940626#M28633</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your response. Can you please point me to some documentation on how to configure the user certificates on the ASA if they are from a public CA? Until now I always issued the user certificates from the ASA's local CA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I mentioned before, we use both a valid user certificate and a valid username\password combo to authenticate AnyConnect VPN clients.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 06:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940626#M28633</guid>
      <dc:creator>cristianpop</dc:creator>
      <dc:date>2019-10-15T06:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940649#M28634</link>
      <description>&lt;P&gt;here is the guide for PKI :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 07:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940649#M28634</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-10-15T07:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940661#M28635</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm talking about the User Certificates. If the Local CA will be gone, how do I install certs from other CA's in the ASA for the AnyConnect VPN users (AAA/Local Users). I am authenticating them with username\password and a certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 07:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940661#M28635</guid>
      <dc:creator>cristianpop</dc:creator>
      <dc:date>2019-10-15T07:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940789#M28636</link>
      <description>&lt;P&gt;The document provide you to generate Certifiace from Public CA and install on ASA for the users to use.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 11:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3940789#M28636</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-10-15T11:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3955617#M28637</link>
      <description>&lt;DIV&gt;&lt;STRONG&gt;&lt;SPAN class="et_breadcrumbs_title"&gt;Use the following to deploy Window sCertificat eServicves to do the same job&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0001616" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;SPAN class="et_breadcrumbs_title"&gt;ASA Local CA Depreciated: Use Windows CA&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Pete&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 14:21:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3955617#M28637</guid>
      <dc:creator>Peter Long</dc:creator>
      <dc:date>2019-11-08T14:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987147#M28638</link>
      <description>&lt;P&gt;Hi. Great video! I think there's some misunderstanding in this thread though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our ASA has a certificate from a public CA, that's not the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remote AnyConnect client software (mobile and laptops) connect to our ASA via IPSec tunnel and are required to have a valid username\password combination AND A VALID USER CERTIFICATE. This user certificate (which is installed on the clients both mobile devices and laptops) is issued by the ASA's Local CA by adding a user, see the attached pic. If I start issuing certs to my users from a public CA will the ASA accept the certificate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 10:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987147#M28638</guid>
      <dc:creator>cristianpop</dc:creator>
      <dc:date>2019-11-21T10:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987176#M28639</link>
      <description>The cert on your ‘outside’ interface can be publicly signed, if you want to use self CA Signed user certificates from your own CA (usually by domain auto enrolment), then you just need to import the root CA from your Windows CA into the firewall and the firewall will trust those certs &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 21 Nov 2019 11:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987176#M28639</guid>
      <dc:creator>Peter Long</dc:creator>
      <dc:date>2019-11-21T11:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987179#M28640</link>
      <description>&lt;P&gt;At present you have a public signed Cert on the ASA, and privately signed certs for your users, from ASA CA&lt;/P&gt;&lt;P&gt;If you switch to&lt;/P&gt;&lt;P&gt;Publicly signed certificate on the ASA and privately signed certificates from Windows CA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then nothing changes with your public cert, leave it where it is its fine.&lt;/P&gt;&lt;P&gt;You simply need to&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Issue user certs to your users (Auto enrolment will do that for you)&lt;/P&gt;&lt;P&gt;2. Import the Root CA cert from your Windows CA onto the ASA and it will trust your user certs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pete&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 11:45:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987179#M28640</guid>
      <dc:creator>Peter Long</dc:creator>
      <dc:date>2019-11-21T11:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987197#M28641</link>
      <description>&lt;P&gt;The answer I've been looking for! Thank you so much, I have been avoiding software updates on the ASA because of this. Now I can go ahead (after making a proper CA) &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 12:19:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987197#M28641</guid>
      <dc:creator>cristianpop</dc:creator>
      <dc:date>2019-11-21T12:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987255#M28642</link>
      <description>So the private certs generated from the ASA and generated from the Windows&lt;BR /&gt;CA will work simultaneously?&lt;BR /&gt;</description>
      <pubDate>Thu, 21 Nov 2019 14:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987255#M28642</guid>
      <dc:creator>dsart</dc:creator>
      <dc:date>2019-11-21T14:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987268#M28643</link>
      <description>&lt;P&gt;YES! If they are both in date, and both the CA Certificates are in date &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 14:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/3987268#M28643</guid>
      <dc:creator>Peter Long</dc:creator>
      <dc:date>2019-11-21T14:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/4075564#M1069573</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are also using the local CA server at present.&amp;nbsp; I understand that once it's gone we won't be able to issue new certificates, but does anyone know if it will also render current certificates invalid?&amp;nbsp; My assumption is that it will as there will be no CA to validate the certificates against.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know it's probably a bit of a stab in the dark but does anyone have any guesses as to when Cisco are likely to remove CA server completely, i.e. how much time do I realistically have to implement an alternative?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 13:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/4075564#M1069573</guid>
      <dc:creator>MarkJones42868</dc:creator>
      <dc:date>2020-04-28T13:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X The crypto ca server command is being deprecated in future release?? Why?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/4075612#M1069578</link>
      <description>&lt;P&gt;As long as the client still trusts the CA then the issued certificates will remain valid, (as long as they are in date, and not on a revoke list).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for when it will be retired - who knows &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 14:03:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-the-crypto-ca-server-command-is-being/m-p/4075612#M1069578</guid>
      <dc:creator>Peter Long</dc:creator>
      <dc:date>2020-04-28T14:03:31Z</dc:date>
    </item>
  </channel>
</rss>

