<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA / SSL Proxy with client-certificates in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-ssl-proxy-with-client-certificates/m-p/2237969#M346263</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If by "&lt;EM&gt;validate SSL client-certificates against Microsofts Active Directory&lt;/EM&gt;" you mean have the ASA confirm that the certificate the client holds is valid, it does it by checking its CRL, in case it uses that method, can also use OCSP as you might know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, as for the "&lt;EM&gt;act as a SSL proxy between server and clien&lt;/EM&gt;t" thingy, i know that the newest member of the ASA-frewall family, the ASA CX [it's actually a module], has a&amp;nbsp; TLS/SSL proxy feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Couldn't find a document stating that fact though, i guess you can always reach out for your Cisco rep and get that clarified. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Jul 2013 18:46:00 GMT</pubDate>
    <dc:creator>Favaloro.</dc:creator>
    <dc:date>2013-07-17T18:46:00Z</dc:date>
    <item>
      <title>Cisco ASA / SSL Proxy with client-certificates</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssl-proxy-with-client-certificates/m-p/2237968#M346261</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A customer want to replace his old Microsoft ISA firewall with another device.&lt;/P&gt;&lt;P&gt;I thought of a redundant Cisco ASA pair. The new firewall has to meet the following requirement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The new Firewall has to validate SSL client-certificates against Microsofts Active Directory&lt;/P&gt;&lt;P&gt;and act as a SSL proxy between server and client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does somebody know if that is possible with a Cisco ASA? Or maybe with another Cisco product?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank a ton,&lt;/P&gt;&lt;P&gt;Johannes&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:13:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssl-proxy-with-client-certificates/m-p/2237968#M346261</guid>
      <dc:creator>jm</dc:creator>
      <dc:date>2019-03-12T02:13:20Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA / SSL Proxy with client-certificates</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-ssl-proxy-with-client-certificates/m-p/2237969#M346263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If by "&lt;EM&gt;validate SSL client-certificates against Microsofts Active Directory&lt;/EM&gt;" you mean have the ASA confirm that the certificate the client holds is valid, it does it by checking its CRL, in case it uses that method, can also use OCSP as you might know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, as for the "&lt;EM&gt;act as a SSL proxy between server and clien&lt;/EM&gt;t" thingy, i know that the newest member of the ASA-frewall family, the ASA CX [it's actually a module], has a&amp;nbsp; TLS/SSL proxy feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Couldn't find a document stating that fact though, i guess you can always reach out for your Cisco rep and get that clarified. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 18:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-ssl-proxy-with-client-certificates/m-p/2237969#M346263</guid>
      <dc:creator>Favaloro.</dc:creator>
      <dc:date>2013-07-17T18:46:00Z</dc:date>
    </item>
  </channel>
</rss>

