<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect certificate based authentication error 1838 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793801#M7270</link>
    <description>&lt;P&gt;My suspicion here is that Anyconnect barfs on the cn= being an ip address....&lt;/P&gt;&lt;P&gt;Let me know if this really is the case.&lt;/P&gt;</description>
    <pubDate>Sun, 03 Feb 2019 21:59:35 GMT</pubDate>
    <dc:creator>Chewbakka1</dc:creator>
    <dc:date>2019-02-03T21:59:35Z</dc:date>
    <item>
      <title>Anyconnect certificate based authentication error 1838</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793679#M7267</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In an attempt to setup Anyconnect to authenticate users by certificates instead of the more common username/password based&lt;/P&gt;&lt;P&gt;authentication, i have created my own CA and issued:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The root certificate&lt;/LI&gt;&lt;LI&gt;The ASA identity certificate&lt;/LI&gt;&lt;LI&gt;The client(pc) device certificate&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Both the Asa and the Client certificate are signed by, and correctly verifies against the root certificate.&lt;/P&gt;&lt;P&gt;In the identity cert for the Asa i have set the CN= to its outside ip address, as it does not have a fqdn set.&lt;/P&gt;&lt;P&gt;The client certificate also has it's CN= corresponding to its public ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When attempting to connect to the vpn-gateway(Asa) from the client pc, the debug output looks like this:&lt;/P&gt;&lt;H6&gt;CRYPTO_PKI:check_key_usage: KeyUsage extension not found.&lt;BR /&gt;CRYPTO_PKI: ExtendedKeyUsage OID = 1.3.6.1.5.5.7.3.2 acceptable for usage type: SSL VPN Peer&lt;BR /&gt;CRYPTO_PKI:check_key_usage:Key Usage check OK&lt;BR /&gt;&lt;BR /&gt;CRYPTO_PKI: Certificate validation: Failed, status: 1838CRYPTO_PKI: PKI Verify Certificate Check Cert Revocation unknown error 1838&lt;BR /&gt;CRYPTO_PKI: PKI Verify Certificate error. No trust point found.&lt;/H6&gt;&lt;H6&gt;CRYPTO_PKI: Certificate not validated&lt;BR /&gt;CERT_API: calling user callback=0x00007f9163cd4a70 with status=15(Verification Failure)&lt;/H6&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also tried setting 'revocation-check none' under the trustpoint, without any result.&lt;/P&gt;&lt;P&gt;Any idea what i am missing?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:44:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793679#M7267</guid>
      <dc:creator>Chewbakka1</dc:creator>
      <dc:date>2020-02-21T16:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect certificate based authentication error 1838</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793696#M7268</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What is your ASA configuration in regard to the trustpoint and remote access VPN? Do you have the following configured?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;ssl trust-point LAB_PKI OUTSIDE&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;crypto ikev2 remote-access trustpoint LAB_PKI&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://integratingit.wordpress.com/2018/03/11/ccnp-simos-asa-anyconnect-ikev2-ipsec-vpn/" target="_self"&gt;This&lt;/A&gt; reference describes how to use certificate authentication with AnyConnect RAVPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sun, 03 Feb 2019 12:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793696#M7268</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-02-03T12:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect certificate based authentication error 1838</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793764#M7269</link>
      <description>&lt;P&gt;try re-importing your CA certificate.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Feb 2019 19:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793764#M7269</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-02-03T19:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect certificate based authentication error 1838</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793801#M7270</link>
      <description>&lt;P&gt;My suspicion here is that Anyconnect barfs on the cn= being an ip address....&lt;/P&gt;&lt;P&gt;Let me know if this really is the case.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Feb 2019 21:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-certificate-based-authentication-error-1838/m-p/3793801#M7270</guid>
      <dc:creator>Chewbakka1</dc:creator>
      <dc:date>2019-02-03T21:59:35Z</dc:date>
    </item>
  </channel>
</rss>

