<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Web Interface Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026946#M925208</link>
    <description>&lt;P&gt;If you're running Firepower Threat Defense (FTD), you set it as follows:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;1. FMC-Managed: Devices &amp;gt; VPN &amp;gt; Remote Access. Select and edit the VPN Profile. Access Interfaces tab and specify the "SSL Global Identity Certificate" there. Save and deploy.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;2. FDM-Managed: Device Monitoring &amp;gt; Remote Access VPN. Select and edit the VPN Profile. Click Nex, next and then choose "Certificate of Device Identity". Then Next &amp;gt; Finish and then Deploy.&lt;/P&gt;
&lt;P&gt;If you're running ASA image then set it as described in detail here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html#anc12" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html#anc12&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 10 Feb 2020 16:47:36 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-02-10T16:47:36Z</dc:date>
    <item>
      <title>VPN Web Interface Configuration</title>
      <link>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026908#M925179</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a Cisco Firepower 2140 and it is running VPN services for us.&amp;nbsp; It is configured such that we can go to&amp;nbsp;&lt;A href="https://ip/+CSCOE+/logon.html#form_title_text" target="_blank" rel="noopener"&gt;https://&amp;lt;hostname&amp;gt;/+CSCOE+/logon.html#form_title_text&lt;/A&gt;&amp;nbsp;and login to get the client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, the problem is the SSL certificate for that hostname and&amp;nbsp; address appears to be self-signed certificate.&amp;nbsp; I'm trying to replace it with our domain wildcard certificate, however I can't seem to find the settings for it.Firewall&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026908#M925179</guid>
      <dc:creator>m.santangelo</dc:creator>
      <dc:date>2020-02-21T17:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Web Interface Configuration</title>
      <link>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026916#M925184</link>
      <description>Hi,&lt;BR /&gt;Are you running ASA or FTD code on this appliance?</description>
      <pubDate>Mon, 10 Feb 2020 15:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026916#M925184</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-10T15:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Web Interface Configuration</title>
      <link>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026930#M925186</link>
      <description>&lt;P&gt;It's running the FTD code, I believe.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 16:12:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026930#M925186</guid>
      <dc:creator>m.santangelo</dc:creator>
      <dc:date>2020-02-10T16:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Web Interface Configuration</title>
      <link>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026946#M925208</link>
      <description>&lt;P&gt;If you're running Firepower Threat Defense (FTD), you set it as follows:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;1. FMC-Managed: Devices &amp;gt; VPN &amp;gt; Remote Access. Select and edit the VPN Profile. Access Interfaces tab and specify the "SSL Global Identity Certificate" there. Save and deploy.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;2. FDM-Managed: Device Monitoring &amp;gt; Remote Access VPN. Select and edit the VPN Profile. Click Nex, next and then choose "Certificate of Device Identity". Then Next &amp;gt; Finish and then Deploy.&lt;/P&gt;
&lt;P&gt;If you're running ASA image then set it as described in detail here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html#anc12" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/200339-Configure-ASA-SSL-Digital-Certificate-I.html#anc12&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 16:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026946#M925208</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-02-10T16:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Web Interface Configuration</title>
      <link>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026961#M925209</link>
      <description>&lt;P&gt;Interesting, in the FMC that's where I have it configured, but it's still showing the old certificate, even after being deployed.&amp;nbsp; I had to upload the certificate to Devices -&amp;gt; Certificate first, in order to get it in the Global Identity Certificate drop down though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66913i48D14A4A7E100D70/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vpn.png" alt="vpn.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 17:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026961#M925209</guid>
      <dc:creator>m.santangelo</dc:creator>
      <dc:date>2020-02-10T17:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Web Interface Configuration</title>
      <link>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026991#M925210</link>
      <description>&lt;P&gt;That's odd. I've deployed several remote access VPNs on FMC and they all worked as advertised vis-a-vis the certificate.&lt;/P&gt;
&lt;P&gt;Certificates aren't generally cached so it shouldn't be necessary to clear client browser cache etc. when replacing the identity certificate.&lt;/P&gt;
&lt;P&gt;You might want to open a TAC case so that the engineer can have a look in real time with you.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 17:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026991#M925210</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-02-10T17:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Web Interface Configuration</title>
      <link>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026997#M925211</link>
      <description>&lt;P&gt;Thanks for your help! We'll enter a case with TAC.&amp;nbsp; Thankfully it's not a huge issue, just trying to unify the environment.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 18:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-web-interface-configuration/m-p/4026997#M925211</guid>
      <dc:creator>m.santangelo</dc:creator>
      <dc:date>2020-02-10T18:05:07Z</dc:date>
    </item>
  </channel>
</rss>

