<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic %ASA-3-717002: Certificate enrollment failed for trustpoint ASDM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045333#M396305</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the URL actually resolve to an ip address on the ASA?&lt;/P&gt;&lt;P&gt;The ASA needs to be able to resolve 2k8server.test.local, otherwise, i won't be able to perform the enrollment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try the enrollment url with ip address instead of fqdn and see if it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Nov 2012 12:03:10 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-11-02T12:03:10Z</dc:date>
    <item>
      <title>%ASA-3-717002: Certificate enrollment failed for trustpoint ASDM_TrustPoint4. Reason: Denied by the CA.</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045332#M396304</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to auto enroll an identity certificate on our Cisco ASA firewall based on the " Web server With Private Key" template in Windows server 2008 CA.&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did all the steps nessecary on the Windows 2008 CA to configure auto-enrollment, modified the template for auto enrollment, modified the default domain policy and the certificate services client - Auto-enrollment policy and restarted the CA service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA firewall I configured the following and started debugging:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; crypto ca trustpoint ASDM_TrustPoint4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; revocation-check none&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; password 91777F69D5399B20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; id-usage ssl-ipsec &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no fqdn&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; email &lt;A href="mailto:mail@mail.com" target="_blank"&gt;mail@mail.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subject-name CN=asa5500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; enrollment url &lt;A href="http://2k8server.test.local:80/certsrv/mscep/mscep.dll" target="_blank"&gt;http://2k8server.test.local:80/certsrv/mscep/mscep.dll&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; crypto ca authenticate ASDM_TrustPoint4 nointeractive&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; crypto ca enroll ASDM_TrustPoint4 noconfirm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I got the following message on the monitor:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-3-717002: Certificate enrollment failed for trustpoint ASDM_TrustPoint4. Reason: Denied by the CA.&lt;/P&gt;&lt;P&gt;,CN=CDP,CN=Publi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is this request denied by the CA, and why can't I see this in the "Failed Requests" in de CA itself?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the application event log of the server this message appears:&lt;/P&gt;&lt;P&gt;The Network Device Enrollment Service cannot submit the certificate request (0x800706ba).&amp;nbsp; The RPC server is unavailable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help, I lost almost all my hair over this &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot...&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045332#M396304</guid>
      <dc:creator>orsonjoon</dc:creator>
      <dc:date>2019-03-12T00:17:17Z</dc:date>
    </item>
    <item>
      <title>%ASA-3-717002: Certificate enrollment failed for trustpoint ASDM</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045333#M396305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the URL actually resolve to an ip address on the ASA?&lt;/P&gt;&lt;P&gt;The ASA needs to be able to resolve 2k8server.test.local, otherwise, i won't be able to perform the enrollment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try the enrollment url with ip address instead of fqdn and see if it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 12:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045333#M396305</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-02T12:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045334#M396307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Thanks for the reply, unfortunalty even with the ip adress in place Same result.&lt;BR /&gt;Strange because the CA certificate enrolled by SCEP with no problems&lt;BR /&gt;&lt;BR /&gt;I would appreciate any suggestions trying to figure this out.&lt;BR /&gt;&lt;BR /&gt;Thanks again...&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 18:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045334#M396307</guid>
      <dc:creator>orsonjoon</dc:creator>
      <dc:date>2012-11-02T18:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045335#M396309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you pls run debug and share the output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug cry ca 255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 20:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045335#M396309</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-02T20:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045336#M396310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1- did you have the clock settings correctly on the ASA itself using NTP servers?&lt;/P&gt;&lt;P&gt;2- did you have the clock settings correctly on the Win2k8 server using NTP servers?&lt;/P&gt;&lt;P&gt;3- did you install SCEP on the Win2k8 box?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I run into the exact same issue you're experiencing when I use my router to enroll certificate using Windows 2008R2.&lt;/P&gt;&lt;P&gt;No such issue on Windows 2003 Server whatsoever so I know the issue is on Windows 2008, something is mis-configured on that Windows 2008 box but I don't have time to troubleshoot it right now.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why don't you use Windows 2003 with SCEP installed and see if you see the same issue.&amp;nbsp; I am willing to bet the answer is no.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the certificate request from a router to Windows 2003 Certificate Authority Server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c3845(config)#crypto ca trustpoint exchange2010&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)# enrollment retry count 5&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)# enrollment retry period 3&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;c3845(ca-trustpoint)# enrollment url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://192.168.70.129:80/certsrv/mscep/mscep.dll"&gt;http://192.168.70.129:80/certsrv/mscep/mscep.dll&lt;/A&gt;&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)# crl optional&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)#&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)#crypto ca authenticate exchange2010&lt;/P&gt;&lt;P&gt;Certificate has the following attributes:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fingerprint MD5: 54213BA2 8D41C3BF 683DE9D5 510ACB11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fingerprint SHA1: ABA434E6 CE349335 CE912A32 B479D691 C1804FF9&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% Do you accept this certificate? [yes/no]: yes&lt;/P&gt;&lt;P&gt;Trustpoint CA certificate accepted.&lt;/P&gt;&lt;P&gt;c3845(config)#crypto ca enroll exchange2010&lt;/P&gt;&lt;P&gt;%&lt;/P&gt;&lt;P&gt;% Start certificate enrollment ..&lt;/P&gt;&lt;P&gt;% Create a challenge password. You will need to verbally provide this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; password to the CA Administrator in order to revoke your certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; For security reasons your password will not be saved in the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Please make a note of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Re-enter password:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% The subject name in the certificate will include: c3845&lt;/P&gt;&lt;P&gt;% Include the router serial number in the subject name? [yes/no]: no&lt;/P&gt;&lt;P&gt;% Include an IP address in the subject name? [no]:&lt;/P&gt;&lt;P&gt;Request certificate from CA? [yes/no]: yes&lt;/P&gt;&lt;P&gt;% Certificate request sent to Certificate Authority&lt;/P&gt;&lt;P&gt;% The 'show crypto pki certificate verbose exchange2010' commandwill show the fingerprint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c3845(config)#&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 3 22:11:18.289: CRYPTO_PKI:&amp;nbsp; Certificate Request Fingerprint MD5: 11C23B80 FE62AFCC 794A516F 001DD3F8&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 3 22:11:18.289: CRYPTO_PKI:&amp;nbsp; Certificate Request Fingerprint SHA1: 31BF71AE 85379C32 A9F5E001 05B7D8AF 6E30DBA2&lt;/P&gt;&lt;P&gt;c3845(config)#&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 3 22:11:19.525: %PKI-6-CERTRET: Certificate received from Certificate Authority&lt;/P&gt;&lt;P&gt;c3845(config)#&lt;/P&gt;&lt;P&gt;c3845(config)#end&lt;/P&gt;&lt;P&gt;c3845#&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 3 22:11:23.509: %SYS-5-CONFIG_I: Configured from console by cisco on vty0 (192.168.15.7)&lt;/P&gt;&lt;P&gt;c3845#show crypto pki certificate verbose exchange2010&lt;/P&gt;&lt;P&gt;Certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;&lt;P&gt;&amp;nbsp; Version: 3&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 241C56D7000000000010&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;/P&gt;&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=exchange2010&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dc=exchange2010&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dc=com&lt;/P&gt;&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name: c3845&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostname=c3845&lt;/P&gt;&lt;P&gt;&amp;nbsp; CRL Distribution Points:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ldap:///CN=exchange2010,CN=lab-exc2010-dc1,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=exchange2010,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://lab-exc2010-dc1.exchange2010.com/CertEnroll/exchange2010.crl"&gt;http://lab-exc2010-dc1.exchange2010.com/CertEnroll/exchange2010.crl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 21:15:56 UTC Nov 3 2012&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 21:15:56 UTC Nov 3 2014&lt;/P&gt;&lt;P&gt;&amp;nbsp; Subject Key Info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Public Key Algorithm: rsaEncryption&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; RSA Public Key: (512 bit)&lt;/P&gt;&lt;P&gt;&amp;nbsp; Signature Algorithm: SHA1 with RSA Encryption&lt;/P&gt;&lt;P&gt;&amp;nbsp; Fingerprint MD5: 88E0522E E2C1637A AE5E7CC9 103E03C1&lt;/P&gt;&lt;P&gt;&amp;nbsp; Fingerprint SHA1: 5678D733 1EB3C5CD 4E07248E 3DC4BC5F D32D6D50&lt;/P&gt;&lt;P&gt;&amp;nbsp; X509v3 extensions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Key Usage: A0000000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Digital Signature&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Key Encipherment&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Subject Key ID: 72DC04D4 343115B0 2DAEFAEF 36F23D29 9D432382&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Basic Constraints:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CA: FALSE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Subject Alternative Name:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c3845&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Authority Key ID: 060E0E2D 0498DB60 606151F5 E0F48DE8 27FAC550&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authority Info Access:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Associated Trustpoints: exchange2010&lt;/P&gt;&lt;P&gt;&amp;nbsp; Key Label: c3845&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CA Certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;&lt;P&gt;&amp;nbsp; Version: 3&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 50271D7CD98632B74ABC894310D34244&lt;/P&gt;&lt;P&gt;&amp;nbsp; Certificate Usage: Signature&lt;/P&gt;&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=exchange2010&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dc=exchange2010&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dc=com&lt;/P&gt;&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=exchange2010&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dc=exchange2010&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dc=com&lt;/P&gt;&lt;P&gt;&amp;nbsp; CRL Distribution Points:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ldap:///CN=exchange2010,CN=lab-exc2010-dc1,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=exchange2010,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://lab-exc2010-dc1.exchange2010.com/CertEnroll/exchange2010.crl"&gt;http://lab-exc2010-dc1.exchange2010.com/CertEnroll/exchange2010.crl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 01:45:14 UTC Oct 24 2012&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 01:54:43 UTC Oct 24 2019&lt;/P&gt;&lt;P&gt;&amp;nbsp; Subject Key Info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Public Key Algorithm: rsaEncryption&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; RSA Public Key: (2048 bit)&lt;/P&gt;&lt;P&gt;&amp;nbsp; Signature Algorithm: SHA1 with RSA Encryption&lt;/P&gt;&lt;P&gt;&amp;nbsp; Fingerprint MD5: 54213BA2 8D41C3BF 683DE9D5 510ACB11&lt;/P&gt;&lt;P&gt;&amp;nbsp; Fingerprint SHA1: ABA434E6 CE349335 CE912A32 B479D691 C1804FF9&lt;/P&gt;&lt;P&gt;&amp;nbsp; X509v3 extensions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Key Usage: 86000000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Digital Signature&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Key Cert Sign&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CRL Signature&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Subject Key ID: 060E0E2D 0498DB60 606151F5 E0F48DE8 27FAC550&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; X509v3 Basic Constraints:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CA: TRUE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authority Info Access:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Associated Trustpoints: exchange2010&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c3845#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 21:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045336#M396310</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2012-11-03T21:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045337#M396312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The time on the ASA firewall and the w2k8 domain controller and the w2k8 CA are all properly synched bij (s)ntp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attached the debug from the request.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2012 18:12:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045337#M396312</guid>
      <dc:creator>orsonjoon</dc:creator>
      <dc:date>2012-11-05T18:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045338#M396314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The time on the ASA firewall and the w2k8 domain controller and the w2k8 CA are all properly synched bij (s)ntp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attached the debug from the request.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2012 18:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045338#M396314</guid>
      <dc:creator>orsonjoon</dc:creator>
      <dc:date>2012-11-05T18:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045339#M396315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I think I've found the issue.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It has to do with Win2k8 CA uses 2048 bits while ASA or IOS routers usually implement either 512 or 1024 bits when you run "crypto ca key generate rsa modulus 1024" or somthing like that.&amp;nbsp; Do this (I did this on my IOS router 12.2(4)24T):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ca key zeroize rsa&lt;/P&gt;&lt;P&gt;crypto ca key generate rsa modulus 2048&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that, go ahead and authticate your certificate process.&amp;nbsp; Here is the output from my router with win2k8R2 CA server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c3845(config)#crypto ca ke&lt;/P&gt;&lt;P&gt;c3845(config)#crypto key zero&lt;/P&gt;&lt;P&gt;c3845(config)#crypto key zeroize rsa&lt;/P&gt;&lt;P&gt;% All RSA keys will be removed.&lt;/P&gt;&lt;P&gt;% All router certs issued using these keys will also be removed.&lt;/P&gt;&lt;P&gt;Do you really want to remove these keys? [yes/no]: yes&lt;/P&gt;&lt;P&gt;c3845(config)#yes&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 9 12:00:31.791: %SSH-5-DISABLED: SSH 1.99 has been disabled&lt;/P&gt;&lt;P&gt;c3845(config)#crypto key ge&lt;/P&gt;&lt;P&gt;c3845(config)#crypto key generate rsa mo&lt;/P&gt;&lt;P&gt;c3845(config)#crypto key generate rsa modulus 2048&lt;/P&gt;&lt;P&gt;The name for the keys will be: c3845.rogerfederer.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% The key modulus size is 2048 bits&lt;/P&gt;&lt;P&gt;% Generating 2048 bit RSA keys, keys will be non-exportable...[OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c3845(config)#&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 9 12:00:45.719: %SSH-5-ENABLED: SSH 1.99 has been enabled&lt;/P&gt;&lt;P&gt;c3845(config)#crypto ca trustpoint rogerfederer&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)# enrollment retry count 5&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)# enrollment retry period 3&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;c3845(ca-trustpoint)# enrollment url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://192.168.244.28:80/certsrv/mscep/mscep.dll"&gt;http://192.168.244.28:80/certsrv/mscep/mscep.dll&lt;/A&gt;&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)# crl optional&lt;/P&gt;&lt;P&gt;c3845(ca-trustpoint)# exit&lt;/P&gt;&lt;P&gt;c3845(config)#&lt;/P&gt;&lt;P&gt;c3845(config)#crypto ca authenticate rogerfederer&lt;/P&gt;&lt;P&gt;Certificate has the following attributes:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fingerprint MD5: 24C7B6CA 54C54574 69229B75 F17E50B0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fingerprint SHA1: 7AD9814C 4B3E06AA BA5134CA 26D5D9A1 3F5DF94C&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% Do you accept this certificate? [yes/no]: yes&lt;/P&gt;&lt;P&gt;Trustpoint CA certificate accepted.&lt;/P&gt;&lt;P&gt;c3845(config)#crypto ca enroll rogerfederer&lt;/P&gt;&lt;P&gt;%&lt;/P&gt;&lt;P&gt;% Start certificate enrollment ..&lt;/P&gt;&lt;P&gt;% Create a challenge password. You will need to verbally provide this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; password to the CA Administrator in order to revoke your certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; For security reasons your password will not be saved in the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Please make a note of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Re-enter password:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% The subject name in the certificate will include: c3845.rogerfederer.com&lt;/P&gt;&lt;P&gt;% Include the router serial number in the subject name? [yes/no]: no&lt;/P&gt;&lt;P&gt;% Include an IP address in the subject name? [no]:&lt;/P&gt;&lt;P&gt;Request certificate from CA? [yes/no]: yes&lt;/P&gt;&lt;P&gt;% Certificate request sent to Certificate Authority&lt;/P&gt;&lt;P&gt;% The 'show crypto pki certificate verbose rogerfederer' commandwill show the fingerprint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c3845(config)#&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 9 12:01:07.579: CRYPTO_PKI:&amp;nbsp; Certificate Request Fingerprint MD5: 63B71575 3F1C06C4 91EC7C95 65F72CB8&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 9 12:01:07.579: CRYPTO_PKI:&amp;nbsp; Certificate Request Fingerprint SHA1: 439A5C53 415BBB29 8F7B7DA2 828833A3 96EDD9DD&lt;/P&gt;&lt;P&gt;c3845(config)#&lt;/P&gt;&lt;P&gt;*Nov&amp;nbsp; 9 12:01:08.535: %PKI-6-CERTRET: Certificate received from Certificate Authority&lt;/P&gt;&lt;P&gt;c3845(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easy right &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2012 11:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045339#M396315</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2012-11-09T11:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045340#M396316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for trying so hard to help me, thank you for that!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried it exactly your way. &lt;/P&gt;&lt;P&gt;Unfortunately my problem is not solved with this, I stil got after the enrollment request was send out of the router, or firewall this message on the console:&lt;/P&gt;&lt;P&gt;pix515e# The certificate enrollment request was denied by CA!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Windows 2008 CA server in the application log I see sthis:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The Network Device Enrollment Service cannot submit the certificate request (0x800706ba). The RPC server is unavailable.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that te problem might be in the Windows 2008 CA server, but I just can't seem to find the problem or solution for this.&lt;/P&gt;&lt;P&gt;It doesnt matter if I try this from an ASA, PIX or our lab 3620 Cisco router, the error is always the same....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is going on with the RPC server???? &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2012 19:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045340#M396316</guid>
      <dc:creator>orsonjoon</dc:creator>
      <dc:date>2012-11-09T19:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045341#M396317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Issue:&lt;/P&gt;&lt;P&gt;The Network Device Enrollment Service cannot submit the certificate request (0x800706ba). &lt;/P&gt;&lt;P&gt;The RPC server is unavailable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CAUSE:&lt;/P&gt;&lt;P&gt;This issue occurs because the port that the CertRequest interface uses is changed when you restart &lt;/P&gt;&lt;P&gt;the server on which the Enterprise CA is installed. Therefore, &lt;/P&gt;&lt;P&gt;the NDES role service cannot connect to the enterprise CA. Then, the SCEP request fails, &lt;/P&gt;&lt;P&gt;and network devices cannot enroll or renew certificates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hot fix from microsoft &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/2633200"&gt;http://support.microsoft.com/kb/2633200&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This happens when you create your CA on a Domain Controller and the “Domain Controllers” &lt;/P&gt;&lt;P&gt;security group is missing from the “CERTSVC_DCOM_ACCESS” Domain Local Security Group.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Nov 2012 12:27:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045341#M396317</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2012-11-10T12:27:55Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045342#M396318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;BR /&gt;&lt;BR /&gt;Youre the best! I now know that I ran into a Microsoft bug, where there is no fix for jet.&lt;BR /&gt;The fix is for Windows server 2008 R2, while we use the normal Windows Server 2008.&lt;BR /&gt;&lt;BR /&gt;Manual certificate installation was succesfull so far, I think that I wait for the planned upgrade to Server 2012 to try again.&lt;BR /&gt;&lt;BR /&gt;Thanks for all your effort, I owe you a big pint of beer...&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 10:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045342#M396318</guid>
      <dc:creator>orsonjoon</dc:creator>
      <dc:date>2012-11-11T10:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: %ASA-3-717002: Certificate enrollment failed for trustpoint</title>
      <link>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045343#M396319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're very welcome !!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just so you know, I work with mainly&lt;STRONG&gt;&lt;EM&gt; Checkpoint&lt;/EM&gt;&lt;/STRONG&gt; firewalls so Cisco is not my strong area &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Nov 2012 14:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-3-717002-certificate-enrollment-failed-for-trustpoint-asdm/m-p/2045343#M396319</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2012-11-11T14:16:59Z</dc:date>
    </item>
  </channel>
</rss>

