<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX ldap/crl problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-ldap-crl-problem/m-p/34656#M626539</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't see any way to configure this without SCEP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 31 Oct 2002 22:01:03 GMT</pubDate>
    <dc:creator>p.krane</dc:creator>
    <dc:date>2002-10-31T22:01:03Z</dc:date>
    <item>
      <title>PIX ldap/crl problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-ldap-crl-problem/m-p/34655#M626483</link>
      <description>&lt;P&gt;We are adding certificates to a Cisco Pix 515 with V6.2(2) of the Pix software, the CA we are using is SmartTrust v3.5.10 with WebRA (including the SmartTrust SCEP servlet).  Enrollment of the certificate from the SCEP solution works fine, but the Pix can't retrieve the CRL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CRL is stored in a Netscape LDAP directory, and the CRL Distribution Point (in short CDP) in the certificate is set to point to the location in the LDAP directory.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using the same solution for a Cisco Router 17xx with Cisco IOS v12.2(8)T, which retrieves the CRL from the LDAP directly without problems (using the CDP).&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The different LDAP CDP's we have tried are:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap://hostname:389/cn=XXX%20CA-02,%20o=Customer%20Networks?certificateRevocationlist?base?objectclass=eidCertificationAuthority&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap://10.1.1.1:389/cn=XXX%20CA-02,%20o=Customer%20Networks?certificateRevocationlist?base?objectclass=eidCertificationAuthority&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our configuration is:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname xxx&lt;/P&gt;&lt;P&gt;domain-name yyy.dk&lt;/P&gt;&lt;P&gt;name 10.1.1.1 vpnca&lt;/P&gt;&lt;P&gt;ca generate rsa key 1024&lt;/P&gt;&lt;P&gt;ca identity vpncaid vpnca:/cgi-bin&lt;/P&gt;&lt;P&gt;ca configure vpncaid ra 1 20 crloptional&lt;/P&gt;&lt;P&gt;ca authenticate vpncaid&lt;/P&gt;&lt;P&gt;ca enrollment vpncaid abcdef&lt;/P&gt;&lt;P&gt;ca save all&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The scep address (host:/cgi-bin) is because SmartTrusts implementation of the scep-protocol is implemented as a java servlet where the scep is called as &lt;A class="jive-link-custom" href="http://host/cgi-bin/pkiclient.exe" target="_blank"&gt;http://host/cgi-bin/pkiclient.exe&lt;/A&gt;, and since the scep protocol automatically adds the pkiclient.exe it is not allowed to add this to the configuration (in the Pix, it would actually result in a call to &lt;A class="jive-link-custom" href="http://host/cgi-bin//pkiclient.exe" target="_blank"&gt;http://host/cgi-bin//pkiclient.exe&lt;/A&gt; which not would work !)&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration works fine, but when we will request the CRL the Pix will call the scep-implementation for the CRL (and in our configuration this will not work, since our CRL not will be requested correctly, this because of our configuration and the way the SmartTrust SCEP implementation works), so we would like the Pix to fetch the CRL directly from the LDAP directory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;We found that the "ca identity vpncaid" had the possibility to add the IP address of the LDAP server, but as soon as we add an IP-address here, the Pix doesn't request anything at all when we requests the CRL (using the "ca crl request vpncaid" command) - we used the cool new sniffer in the Pix 6.2 and this didn't register any traffic at all, neither to the SCEP server or to the LDAP directory, so my question is: can the Pix request the CRL directly from the LDAP directory or does it have to use the SCEP server ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:19:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ldap-crl-problem/m-p/34655#M626483</guid>
      <dc:creator>jadvoracek</dc:creator>
      <dc:date>2020-02-21T06:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX ldap/crl problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-ldap-crl-problem/m-p/34656#M626539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't see any way to configure this without SCEP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2002 22:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ldap-crl-problem/m-p/34656#M626539</guid>
      <dc:creator>p.krane</dc:creator>
      <dc:date>2002-10-31T22:01:03Z</dc:date>
    </item>
  </channel>
</rss>

