<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I'm on a different version, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851118#M912533</link>
    <description>&lt;P&gt;I'm on a different version, but I don't think this has changed. &amp;nbsp;I think the above process is missing two steps. Take a look at CSCOpx\MDC\Apache\gencert.bat, specifically the last two lines. &amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;run the openssl pkcs8 command to generate the server.pk8. &amp;nbsp;You'll see a warning about missing openssl.conf--that's fine/expected.&lt;/LI&gt;
&lt;LI&gt;copy the CA chain to chain.cer (the script copies the server.crt since it was self signed, but you'll want to put your actual CA cert/chain here instead)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 23 May 2017 16:09:41 GMT</pubDate>
    <dc:creator>JONATHAN LUSKY</dc:creator>
    <dc:date>2017-05-23T16:09:41Z</dc:date>
    <item>
      <title>How to Install 3rd Party SSL Certificate on CSM</title>
      <link>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851114#M912529</link>
      <description>&lt;P&gt;Good day. &amp;nbsp;I work in a high security network&amp;nbsp;and after recently installing CSM 4.11 on Windows Server 2012 R2 I need to install a 3rd party SSL certificate to remediate a vulnerability with CSM&amp;nbsp;using a self-signed cert; our security requirements state we must use a trusted ssl certificate from a 3rd party such as Verisign, GoDaddy, etc. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I searched Cisco's documentation, as well as this forum, for a procedure for installing a 3rd party SSL cert, but couldn't find anything, but I do have a procedure from Apache; which is the web engine CSM utilizes. &amp;nbsp;Does anyone know if all I need to do is follow Apache's procedure to install the 3rd party certificate on CSM? &amp;nbsp;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851114#M912529</guid>
      <dc:creator>Jonathan Grant</dc:creator>
      <dc:date>2020-02-21T13:49:55Z</dc:date>
    </item>
    <item>
      <title>After completing SSL purchase</title>
      <link>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851115#M912530</link>
      <description>&lt;P&gt;After completing SSL purchase process, you need to install an SSL Certificate on your server. You can find SSL installation guidelines from official website of your Certificate Authority where you buy from.&lt;/P&gt;
&lt;P&gt;You can also get SSL installation tutorial at one place where you can find step by step guidelines to Install SSL Certificate from different server at single place.&lt;/P&gt;
&lt;P&gt;AboutSSL.org is an informative site where users can easily get information regarding SSL Certificates such as Types of SSL, SSL Installation Tutorials, SSL Videos, SSL Certificate Reviews, Compare SSL Certificates etc. at free.&lt;/P&gt;
&lt;P&gt;You can find your SSL Installation Solution at here - https://aboutssl.org/how-to-install&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 05:41:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851115#M912530</guid>
      <dc:creator>aboutssl16</dc:creator>
      <dc:date>2016-06-01T05:41:35Z</dc:date>
    </item>
    <item>
      <title>Thank you for the reply,</title>
      <link>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851116#M912531</link>
      <description>&lt;P&gt;Thank you for the reply, however, since CSM integrates Apache into the application, I was looking for something specifric for CSM in the event the application handles certificate differently than a stand-alone Apache server. &amp;nbsp;What I've found out is that the certificates can be updated with the same procedure as with a stand-alone Apache web server. &amp;nbsp;The easiest way I found to install the new certificate, specifically for Cisco Security Manager 4.11 SP1, is as follows:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Obtain your CA certificate and private key files.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Rename the files as follows:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;OL style="list-style-type: lower-alpha;"&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Certificate File = server.key&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Private Key = server.crt&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;In most cases, you don't need to worry about the intermediate certificate.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;As a precaution, you can backup the C:\Program Files (x86)\CSCOpx\MDC\Apache\conf\ssl directory. &amp;nbsp;If there is an issue, you can revert back to the original cert and key&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Copy the certificate and private key files to the \Apache\conf\ssl directory&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Restart the CSM daemon (net stop crmdmgtd / &amp;nbsp;net start crmdmgtd&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Use a remote web browser to connect to CSM and validate the certificate&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;If you backed up the \Apache\conf\ssl directory, delete it at this time (shift-delete)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;&lt;SPAN style="line-height: normal;"&gt;Note for Reference:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;The Apache httpd.conf file is located here -&amp;gt; C:\Program Files (x86)\CSCOpx\MDC\Apache\conf\httpd.conf and &lt;/SPAN&gt;&lt;SPAN style="line-height: normal;"&gt;the certificate pointers are located within&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="line-height: normal;"&gt;the VirtualHost module; see below for example of module:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: normal;"&gt; &lt;BR /&gt;&amp;lt;VirtualHost _default_:443&amp;gt;&lt;BR /&gt; SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown&lt;BR /&gt; SSLEngine on&lt;BR /&gt; SSLCertificateFile conf/ssl/server.crt&lt;BR /&gt; SSLCertificateKeyFile conf/ssl/server.key&lt;BR /&gt; SSLCertificateChainFile conf/ssl/chain.cer&lt;BR /&gt;...&lt;BR /&gt; &amp;lt;/VirtualHost&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;The certificates and private keys are located here -&amp;gt;&amp;nbsp;&lt;SPAN&gt;C:\Program Files (x86)\CSCOpx\MDC\Apache\conf\ssl directory&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;Further Explanation of SSL Certificate Pointers:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="line-height: normal;"&gt; SSLCertificateFile: This should point to your server certificate&lt;BR /&gt; SSLCertificateKeyFile: This should point to your server's private key&lt;BR /&gt; SSLCertificateChainFile: This should point to the intermediate certificate&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 17:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851116#M912531</guid>
      <dc:creator>Jonathan Grant</dc:creator>
      <dc:date>2016-06-01T17:29:44Z</dc:date>
    </item>
    <item>
      <title>I've successfully replaced</title>
      <link>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851117#M912532</link>
      <description>&lt;P&gt;I've successfully replaced the built-in cert and key with an externally-generated and trusted one. Apache loads, and I can bring up the management web page without any certificate errors.&lt;/P&gt;
&lt;P&gt;So far, so good...&lt;/P&gt;
&lt;P&gt;The problem arises when trying to use the Cisco Security Manager client application. Configuration Manager loads, and shows all the folder trees previously configured, but does not show any firewalls in any folder; the window is empty.&lt;/P&gt;
&lt;P&gt;Restoring the original cert and key corrects the problem, and the firewalls are once again visible in CSM.&lt;/P&gt;
&lt;P&gt;There is a brief note in the Troubleshooting / Client Problems After Installtion section of the Installation Guide: "What is wrong with my authentication setup if my login credentials are accepted without any error&amp;nbsp;message when I try to log in with Security Manager Client, but the Security Manager desktop is&lt;BR /&gt;blank and unusable?"&lt;/P&gt;
&lt;P&gt;The suggested answer is: "You did not finish all the required steps for Cisco Secure ACS to provide login authentication&amp;nbsp;services for Security Manager and Common Services. Although you entered login credentials in&amp;nbsp;ACS, you did not define the Security Manager server as a AAA client. You must do so, or you cannot&amp;nbsp;log in. See the ACS documentation for detailed instructions."&lt;/P&gt;
&lt;P&gt;That's all well and good, but we're not - yet - using ACS for CSM authentication. At the moment we're using local accounts in CSM.&lt;/P&gt;
&lt;P&gt;Is that Troubleshooting note relevant or a red herring? If we're going to add our own cert and key to CSM do we then have to use ACS? Or is something else causing a blank CSM window if we've installed our own cert and key?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2017 12:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851117#M912532</guid>
      <dc:creator>Alex Morris</dc:creator>
      <dc:date>2017-02-17T12:59:12Z</dc:date>
    </item>
    <item>
      <title>I'm on a different version,</title>
      <link>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851118#M912533</link>
      <description>&lt;P&gt;I'm on a different version, but I don't think this has changed. &amp;nbsp;I think the above process is missing two steps. Take a look at CSCOpx\MDC\Apache\gencert.bat, specifically the last two lines. &amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;run the openssl pkcs8 command to generate the server.pk8. &amp;nbsp;You'll see a warning about missing openssl.conf--that's fine/expected.&lt;/LI&gt;
&lt;LI&gt;copy the CA chain to chain.cer (the script copies the server.crt since it was self signed, but you'll want to put your actual CA cert/chain here instead)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 16:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-install-3rd-party-ssl-certificate-on-csm/m-p/2851118#M912533</guid>
      <dc:creator>JONATHAN LUSKY</dc:creator>
      <dc:date>2017-05-23T16:09:41Z</dc:date>
    </item>
  </channel>
</rss>

