<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA SSL VPN with client certificates from external CA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302367#M807197</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Herbert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With these debug settings on, I did not get any log messages when trying to connect.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;'show crypto ca cert' shows the two expected certs (the ASA's identity cert and the CA certificate).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both ASA and client clocks are correct and synced to the same NTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that we are not using the ASA's local CA functionality - it doesn't work in a failover configuration. So we run our own CA seperate from the ASA box and want the ASA to verify that connecting clients have certs signed by this CA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Dec 2009 11:25:54 GMT</pubDate>
    <dc:creator>basissmart</dc:creator>
    <dc:date>2009-12-03T11:25:54Z</dc:date>
    <item>
      <title>ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302365#M807124</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to set up SSL VPN with two-factor authentication on an ASA5510 with software version 8.0(4). I want to use LDAP for actual authentication and user mapping, but require a valid certificate signed by a particular local CA to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have imported the CA's root certificate, signed an identity cert for the ASA box and imported, and assigned the cert ("trustpoint")&amp;nbsp; to the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under the connection profile itself (for DefaultWEBVPNGroup), there is an option to select authentication method as AAA, certificate or both. AAA works as expected, authenticating against LDAP. If I select certificate or both, I get rejected with Certificate Validation Failure regardless of if I have a valid signed cert or not. This is what I see with "debug webvpn 100":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn_portal.c:ewaFormServe_webvpn_login[1904]&lt;BR /&gt;webvpn_portal.c:http_webvpn_kill_cookie[682]&lt;BR /&gt;webvpn_portal.c:ewaFormSubmit_webvpn_login[1964]&lt;BR /&gt;ewaFormSubmit_webvpn_login: tgCookie = 0&lt;BR /&gt;ewaFormSubmit_webvpn_login: cookie = c98f3940&lt;BR /&gt;ewaFormSubmit_webvpn_login: tgCookieSet = 0&lt;BR /&gt;ewaFormSubmit_webvpn_login: tgroup = NULL&lt;BR /&gt;Tunnel Group: DefaultWEBVPNGroup, Client Cert Auth Failed!&lt;BR /&gt;Embedded CA Server not enabled. Logging out the user.&lt;BR /&gt;webvpn_portal.c:ewaFormServe_webvpn_login[1904]&lt;BR /&gt;webvpn_portal.c:http_webvpn_kill_cookie[682]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, it seems the ASA is only trying to check the cert against a (nonexistent) ASA-based CA. How do I get it to check against an external CA cert?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under "Remote Access VPN -&amp;gt; Network (client) Access -&amp;gt; AnyConnect Connection Profiles", I have ticked "Allow Access" and "Enable DTLS". There is also an option "Require client certificate" which doesn't seem to do anything - whether or not I check it, I can connect and authenticate to the VPN with or without signed certs as long as the previous setting is "AAA".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some highlights from the config:&lt;/P&gt;&lt;PRE&gt;crypto ca trustpoint ASDM_pfirewall01.company.tld&lt;BR /&gt; enrollment terminal&lt;BR /&gt; fqdn pfirewall01.company.tld&lt;BR /&gt; subject-name CN=pfirewall01.company.is,O=Company,C=IS,L=Reykjavik&lt;BR /&gt; keypair company&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; revocation-check crl none&lt;BR /&gt; enrollment terminal&lt;BR /&gt; crl configure&lt;BR /&gt;&amp;nbsp; no enforcenextupdate&lt;BR /&gt;&amp;nbsp; no protocol ldap&lt;BR /&gt;&amp;nbsp; no protocol scep&lt;BR /&gt;crypto ca trustpoint ASDM_pfirwall01.company.tld&lt;BR /&gt; revocation-check crl&lt;BR /&gt; enrollment terminal&lt;BR /&gt; no client-types&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_pfirewall01.company.tld&lt;BR /&gt; certificate 02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820598 30820480 a0030201 02020102 300d0609 2a864886 f70d0101 05050030 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;snipped rest of cert&amp;gt;&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt; certificate ca 00e2a6f08003ded6c9&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082054e 30820436 a0030201 02020900 e2a6f080 03ded6c9 300d0609 2a864886 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;snipped rest of cert&amp;gt;&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ca certificate chain ASDM_pfirwall01.company.tld&lt;BR /&gt; certificate ca 00e2a6f08003ded6c9&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082054e 30820436 a0030201 02020900 e2a6f080 03ded6c9 300d0609 2a864886 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;snipped rest of cert&amp;gt;&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;ssl encryption aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;ssl trust-point ASDM_pfirewall01.company.tld outside vpnlb-ip&lt;BR /&gt;ssl trust-point ASDM_pfirewall01.company.tld outside&lt;BR /&gt;ssl certificate-authentication interface outside port 1443&lt;BR /&gt;webvpn&lt;BR /&gt; port 1443&lt;BR /&gt; enable outside&lt;BR /&gt; dtls port 1443&lt;BR /&gt; svc image disk0:/anyconnect-win-2.4.0202-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt;&lt;BR /&gt;group-policy DenyGroup internal&lt;BR /&gt;group-policy DenyGroup attributes&lt;BR /&gt; vpn-simultaneous-logins 0&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 10.26.12.20 10.26.12.21&lt;BR /&gt; vpn-simultaneous-logins 1&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value tunnel_company_networks&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt; authentication-server-group LDAPUsers&lt;BR /&gt; default-group-policy DenyGroup&lt;BR /&gt; authorization-required&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup webvpn-attributes&lt;BR /&gt; authentication certificate&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I've been trying different combinations of options for this and starting to pull my hair out. Any hints would be appreciated!&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302365#M807124</guid>
      <dc:creator>basissmart</dc:creator>
      <dc:date>2019-03-11T16:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302366#M807152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;debug crypto ca 255&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;debug crypto ca mess 255&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;debug crypto ca trans 255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;show crypto ca cert&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And be sure to check the clock on the ASA, make sure the date is correct and that your client cert is not expired.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;Herbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Dec 2009 14:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302366#M807152</guid>
      <dc:creator>Herbert Baerten</dc:creator>
      <dc:date>2009-12-02T14:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302367#M807197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Herbert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With these debug settings on, I did not get any log messages when trying to connect.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;'show crypto ca cert' shows the two expected certs (the ASA's identity cert and the CA certificate).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both ASA and client clocks are correct and synced to the same NTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that we are not using the ASA's local CA functionality - it doesn't work in a failover configuration. So we run our own CA seperate from the ASA box and want the ASA to verify that connecting clients have certs signed by this CA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Dec 2009 11:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302367#M807197</guid>
      <dc:creator>basissmart</dc:creator>
      <dc:date>2009-12-03T11:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302368#M807220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to import the CA certificate into your ASA that signed your client certificate. Then tick the option Configuration &amp;gt; Remote Access VPN &amp;gt; Clientless SSL VPN Access &amp;gt; Connection Profiles 'Require client certificate'. Then in your connection profile choose auth method as AAA as you are not doing cert auth. When you connect to ASA with your IE browser, you should be prompted to choose a client certificate to use for your connection to the ASA. I don't think this works for Firefox as it won't have access to your Windows certificate store. The ASA should look through all its CA trustpoints to find one that matches the CA that signed your client cert, thereby validating your identity. I have only tried this with a Windows user certificate, not a machine certificate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 14:50:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302368#M807220</guid>
      <dc:creator>rcullum</dc:creator>
      <dc:date>2010-01-27T14:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302369#M807237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RCULLUM,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I am having the same problem as Snorri.&amp;nbsp; I have tried what you suggest, and it works but without requiring the cert.&amp;nbsp; I logged in from an isolated outside machine, and when it asked for a certificate I just hit cancel, as I had none.&amp;nbsp; Then it gave me the login screen, and once I logged in using AAA, I was given the ssl vpn homepage. &lt;/P&gt;&lt;P&gt;SNORRI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; have you recieved any help on this.&amp;nbsp; I have contacted cisco, but the person helping me is just stabbing in the dark it would appear.&amp;nbsp; As RCULLUM says, the ASA should check all of its CAs first. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 19:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302369#M807237</guid>
      <dc:creator>padair000</dc:creator>
      <dc:date>2010-01-27T19:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302370#M807248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a possible interim workaround, create a new ssl vpn connection profile and&amp;nbsp; assign a new group policy to it. Use the Configuration &amp;gt; Remote Access VPN &amp;gt; Advanced &amp;gt; Certificate to SSL VPN Connection Profile Maps to map an attribute from your client cert to the new ssl vpn connection profile/policy. On the DfltGrpPolicy, set Simultaneous logins=0 which will stop any sessions.&lt;/P&gt;&lt;P&gt;If you don't select/have a client cert, you should get mapped to the DefaultWEBVPNGroup connection profile which uses policy DfltGrpPolicy.&lt;/P&gt;&lt;P&gt;If you have a cert, the attribute mapping should assign you the&amp;nbsp; new connection profile &amp;amp; policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jan 2010 09:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302370#M807248</guid>
      <dc:creator>rcullum</dc:creator>
      <dc:date>2010-01-29T09:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302371#M807259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RCULLUM, what I found through a long session with cisco was that I was using the wrong type of certificate.&amp;nbsp; Even though the identity cerftifcate I uses was from the ipsec offline template, the client could not submit such a cert for an SSL vpn.&amp;nbsp; The certificate could only be a user certificate, as&amp;nbsp; given in the microsoft templates.&amp;nbsp; If the ASA saw that the certificate was good for ipsec useage it would reject it.&amp;nbsp; At least that is what the cisco person told me.&amp;nbsp; By placing the user cert on the usb token everything seems to work now.&amp;nbsp; I had one additonal problem though.&amp;nbsp; That is if someone without a valid certificate tries to access the gateway they are given a logon prompt.&amp;nbsp; No logons work, but I would prefer them not be given any inormation if they do not have a certificate.&amp;nbsp; Ideally I would like something like a 404 error. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Feb 2010 22:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302371#M807259</guid>
      <dc:creator>padair000</dc:creator>
      <dc:date>2010-02-10T22:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302372#M807262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="color: #555555; "&gt;padair000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try enabling CSD Windows Location Settings and do a pre-login check. Do a check for a Certificate attribute. If user doesn't have that attribute, I think ASA will reject the connection before the login prompt appears.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Feb 2010 13:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302372#M807262</guid>
      <dc:creator>rcullum</dc:creator>
      <dc:date>2010-02-11T13:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302373#M807274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is possible authenticate the machine and permit only access to users in AD but from specific machine.&amp;nbsp; &lt;/P&gt;&lt;P&gt;You done the authentication with a user certificate but it is possible to use a machine certificate?&lt;/P&gt;&lt;P&gt; ´&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jul 2010 17:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302373#M807274</guid>
      <dc:creator>DANIEL FERREIRA</dc:creator>
      <dc:date>2010-07-15T17:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA SSL VPN with client certificates from external CA</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302374#M807277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Did you ever got an answer for your question?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2011 13:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssl-vpn-with-client-certificates-from-external-ca/m-p/1302374#M807277</guid>
      <dc:creator>marco.agnese</dc:creator>
      <dc:date>2011-08-23T13:06:54Z</dc:date>
    </item>
  </channel>
</rss>

