<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to import server certificate to FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3336842#M926739</link>
    <description>&lt;P&gt;This process work for me!&lt;/P&gt;</description>
    <pubDate>Fri, 23 Feb 2018 19:18:21 GMT</pubDate>
    <dc:creator>tmoore</dc:creator>
    <dc:date>2018-02-23T19:18:21Z</dc:date>
    <item>
      <title>Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3213742#M926725</link>
      <description>&lt;P&gt;hi&lt;BR /&gt;I'm trying to import server certifacate issued by our corporate CA to FMC, but i always get error "&lt;SPAN&gt;Unable to verify certificate.&lt;/SPAN&gt;"&lt;BR /&gt;&lt;BR /&gt;In&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;/var/log/httpd/httpsd_error_log&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;i see errors:&lt;/P&gt;
&lt;PRE&gt;[Thu Nov 09 08:59:37.040550 2017] [cgi:error] [pid 27221] [client 10.12.91.238:33111] AH01215: No such file or directory:/etc/sf/crl.conf at /usr/local/sf/lib/perl/5.10.1/SF/X509Certificates.pm line 919.: /usr/local/sf/htdocs/admin/https_cert.cgi, referer: https://fmc.isd.lamoda.tech/admin/https_cert.cgi
[Thu Nov 09 08:59:37.040652 2017] [cgi:error] [pid 27221] [client 10.12.91.238:33111] AH01215: (Unable to verify certificate.) in /usr/local/sf/htdocs/admin/https_cert.cgi:163 at /usr/local/sf/lib/perl/5.10.1/SF.pm line 120.: /usr/local/sf/htdocs/admin/https_cert.cgi, referer: https://fmc.isd.lamoda.tech/admin/https_cert.cgi&lt;/PRE&gt;
&lt;P&gt;I checked&amp;nbsp;directory &lt;EM&gt;&lt;STRONG&gt;/etc/sf/&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;and there is no &lt;EM&gt;&lt;STRONG&gt;crl.conf &lt;/STRONG&gt;&lt;/EM&gt;in it.&lt;/P&gt;
&lt;P&gt;What might be a reason?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3213742#M926725</guid>
      <dc:creator>lyutov_dv</dc:creator>
      <dc:date>2020-02-21T14:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3213926#M926726</link>
      <description>&lt;P&gt;Which version is the FMC running ?&lt;/P&gt;
&lt;P&gt;You might be hitting the bug&amp;nbsp;&lt;SPAN&gt;CSCvf42713&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2017 14:05:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3213926#M926726</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2017-11-09T14:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3213946#M926727</link>
      <description>&lt;P&gt;Perhaps... buy it has fixed status in 6.2.2.1 version&lt;BR /&gt;and i upgrade my fmc to 6.2.2.1 and this problem still&amp;nbsp;&lt;SPAN class="short_text"&gt;&lt;SPAN class=""&gt;exists&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2017 14:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3213946#M926727</guid>
      <dc:creator>lyutov_dv</dc:creator>
      <dc:date>2017-11-09T14:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3218623#M926728</link>
      <description>&lt;P&gt;I currently have a tac open on this myself. I too am at 6.2.2.1-73&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2017 22:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3218623#M926728</guid>
      <dc:creator>ddefoort</dc:creator>
      <dc:date>2017-11-17T22:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3220672#M926729</link>
      <description>&lt;P&gt;Cisco bug&amp;nbsp;&lt;SPAN&gt;CSCvg28901 matches this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Symptom:&lt;BR /&gt;Certificate with Basic Constraints extension not critical will not be imported on FMC or sensor with error:&lt;BR /&gt;Unable to install certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I modified the extensions in my "server_cert" block, and changed to look like this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#basicConstraints = CA:FALSE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;basicConstraints = critical, CA:FALSE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I again signed the certificate, and this time was able to import it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This &lt;A href="http://unitstep.net/blog/2009/03/16/using-the-basic-constraints-extension-in-x509-v3-certificates-for-intermediate-cas/" target="_self"&gt;link&lt;/A&gt; provides a good explanation as to why this is needed, but it seems to be related to signing with an intermediate CA.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 06:00:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3220672#M926729</guid>
      <dc:creator>Richard Krug</dc:creator>
      <dc:date>2017-11-22T06:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3227715#M926730</link>
      <description>&lt;P&gt;How do you make basic constraints critical? Could you please explain a bit.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 09:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3227715#M926730</guid>
      <dc:creator>sultan.ahmed21</dc:creator>
      <dc:date>2017-12-06T09:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3228478#M926731</link>
      <description>&lt;P&gt;It all depends what do you use for issuing certificates. You can open your certificate in XCA, it's a free tool which allows you to work on certificates and see all the properties in graphical form.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you import your certificate there, you can see if Basic Constraints critical or not (here, the attribute is present):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-12-07 at 10.36.26.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/4463iEE3E1E53EBB371D4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2017-12-07 at 10.36.26.png" alt="Screen Shot 2017-12-07 at 10.36.26.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also right-click, then go Transform&amp;gt;Similar Certificate&amp;gt;Extensions and under Basic Constraints at the top, you will see Critical button:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-12-07 at 10.34.52.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/4462i994C3B0DACFB9E9C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2017-12-07 at 10.34.52.png" alt="Screen Shot 2017-12-07 at 10.34.52.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This must be selected on the CA for the certificates you want to issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Radek&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2017 09:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3228478#M926731</guid>
      <dc:creator>rolszowy</dc:creator>
      <dc:date>2017-12-07T09:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3228825#M926732</link>
      <description>&lt;P&gt;I'm using OpenSSL for this. In OpenSSL, I have a config file:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/root/ca/intermediate/openssl.cnf&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This file has the following extension block, in which I find basicConstraints:&lt;/P&gt;
&lt;P&gt;[ server_cert ]&lt;BR /&gt;# Extensions for server certificates (`man x509v3_config`).&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;#basicConstraints = CA:FALSE&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;basicConstraints = critical, CA:FALSE&lt;/FONT&gt;&lt;BR /&gt;nsCertType = server&lt;BR /&gt;nsComment = "OpenSSL Generated Server Certificate"&lt;BR /&gt;subjectKeyIdentifier = hash&lt;BR /&gt;authorityKeyIdentifier = keyid,issuer:always&lt;BR /&gt;keyUsage = critical, digitalSignature, keyEncipherment&lt;BR /&gt;extendedKeyUsage = serverAuth&lt;BR /&gt;crlDistributionPoints =&amp;nbsp;&amp;lt;REMOVED&amp;gt;&lt;BR /&gt;authorityInfoAccess = OCSP;URI:&amp;lt;REMOVED&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I prepended "critical," and save the file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When signing the CSR with OpenSSL, I used this command:&lt;/P&gt;
&lt;P&gt;openssl ca -config intermediate/openssl.cnf -extensions server_cert -days 375 -notext -md sha256 -in intermediate/csr/fmc.mydomain.net.csr.pem -out intermediate/certs/fmc.mydomain.net.cert.pem&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was then able to import the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2017 18:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3228825#M926732</guid>
      <dc:creator>Richard Krug</dc:creator>
      <dc:date>2017-12-07T18:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3228830#M926733</link>
      <description>&lt;P&gt;I'm using OpenSSL for this. In OpenSSL, I have a config file:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/root/ca/intermediate/openssl.cnf&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This file has the following extension block, in which I find basicConstraints:&lt;/P&gt;
&lt;P&gt;[ server_cert ]&lt;BR /&gt;# Extensions for server certificates (`man x509v3_config`).&lt;BR /&gt;#basicConstraints = CA:FALSE&lt;BR /&gt;basicConstraints = critical, CA:FALSE&lt;BR /&gt;nsCertType = server&lt;BR /&gt;nsComment = "OpenSSL Generated Server Certificate"&lt;BR /&gt;subjectKeyIdentifier = hash&lt;BR /&gt;authorityKeyIdentifier = keyid,issuer:always&lt;BR /&gt;keyUsage = critical, digitalSignature, keyEncipherment&lt;BR /&gt;extendedKeyUsage = serverAuth&lt;BR /&gt;crlDistributionPoints =&amp;nbsp;&amp;lt;REMOVED&amp;gt;&lt;BR /&gt;authorityInfoAccess = OCSP;URI:&amp;lt;REMOVED&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I prepended "critical," and save the file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When signing the CSR with OpenSSL, I used this command:&lt;/P&gt;
&lt;P&gt;openssl ca -config intermediate/openssl.cnf -extensions server_cert -days 375 -notext -md sha256 -in intermediate/csr/fmc.mydomain.net.csr.pem -out intermediate/certs/fmc.mydomain.net.cert.pem&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was then able to import the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2017 18:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3228830#M926733</guid>
      <dc:creator>Richard Krug</dc:creator>
      <dc:date>2017-12-07T18:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3331062#M926734</link>
      <description>&lt;P&gt;I'm having this same issue and after modifying the&amp;nbsp;cert to use basicConstraints = critical, CA:FALSE, I was able to import&amp;nbsp;the certificate without getting the "unable to verify certificate" error message.&amp;nbsp; But after the import&amp;nbsp;I still don't see the new cert under HTTPS Certificate; even after a reboot I still only show the self&amp;nbsp;signed cert as the current https server cert.&amp;nbsp; What am I missing?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 16:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3331062#M926734</guid>
      <dc:creator>tmoore</dc:creator>
      <dc:date>2018-02-14T16:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3331164#M926735</link>
      <description>&lt;P&gt;This sounds like a question for TAC, but what you can do is to go to expert mode and manually check /etc/ssl/server.* files.&lt;/P&gt;
&lt;P&gt;I’m assuming that they were not replaced. In that case you can manually edit them and paste identity certificate and private, unencrypted key there. After that you need to restart httpsd process by:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;pmtool RestartById httpsd&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;command.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From that&amp;nbsp;point, management interface should display this new certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Raden&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 18:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3331164#M926735</guid>
      <dc:creator>rolszowy</dc:creator>
      <dc:date>2018-02-14T18:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3331317#M926736</link>
      <description>I noticed today that in some cases it won't give you an error but not importing the SSL certificate either if something is still wrong with it.&lt;BR /&gt;I finally managed to import the certificate, but still need to solve some issues to make it valid for browsers, going to take a look at this tomorrow and try to write it down.&lt;BR /&gt;I think FMC needs more error checking on the SSL import tool.&lt;BR /&gt;&lt;BR /&gt;br, Micke</description>
      <pubDate>Wed, 14 Feb 2018 22:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3331317#M926736</guid>
      <dc:creator>mikael.lahtela</dc:creator>
      <dc:date>2018-02-14T22:28:20Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3336143#M926737</link>
      <description>&lt;P&gt;I had the same problem where it would finally take the certs without error, but would continue to show the old one. I went and checked the config file via the CLI under&amp;nbsp;/etc/httpd/ssl_certificates.conf&lt;/P&gt;
&lt;P&gt;and noticed there were different values loaded to the&amp;nbsp;&lt;SPAN&gt;SSLCertificateFile and&amp;nbsp;SSLCertificateKeyFile fields. I cleared the old values and replaced them with the following:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;SSLCertificateFile /etc/ssl/server.crt&lt;/P&gt;
&lt;P&gt;SSLCertificateKeyFile /etc/ssl/server.key&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Restart the httpsd service with this command to enforce the new values: pmtool RestartByID httpsd&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 18:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3336143#M926737</guid>
      <dc:creator>randomfortune</dc:creator>
      <dc:date>2018-02-22T18:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3336197#M926738</link>
      <description>&lt;P&gt;Hello Everyone,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As some of you have mentioned, the current behavior is a bug. It was not actually fixed on 6.2.2.1.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have resolved this issue for other customer by performing the import of the certificate thru the CLI.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The steps are not complicated, but they are not intuitive either. It will be required to have a certificate, and the private key used for that certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The below steps are used when creating a new certificate and private key thru the cli.&lt;/P&gt;
&lt;P&gt;If you have a cert and private key from an Internal CA, then you could copy and paste that information into two files.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;vi /etc/ssl/InternalCACertificate.crt&lt;/P&gt;
&lt;P&gt;vi /etc/ssl/InternalCAKey.key&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then you can move to around step 6.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cdetsng.cisco.com/webui/#view=CSCvf42713" target="_blank"&gt;&lt;STRONG&gt;CSCvf42713&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;- cannot import web UI HTTPS server certificate on Firepower Management Center or 7000/8000 Series&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The workaround that needs to be performed is below.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;admin@Luna:~$ cd Mark/ &amp;lt;---------- Create Directory to use a temporary stage area&lt;BR /&gt; admin@Luna:~/Mark$ ls&lt;BR /&gt; admin@Luna:~/Mark$ openssl genrsa -out server.key 2048 &amp;lt;------------ Creating the private key that will be used to generate the CSR and the certificate.&lt;BR /&gt; Generating RSA private key, 2048 bit long modulus&lt;BR /&gt; .........................&lt;BR /&gt; ......&lt;BR /&gt; e is 65537 (0x10001)&lt;/LI&gt;
&lt;LI&gt;admin@Luna:~/Mark$ openssl req -out CSR.csr -key server.key -new -sha256 &amp;lt;------------ Creating the CSR with the private key created in the previous step. Fill out information for the CSR. This CSR can be used to create a certificate from your internal CA. If using your own CA to generate the certificate, then after you generate the certificate, copy the information in to a file named server.key.new. Then skip to step 4.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are about to be asked to enter information that will be incorporated&lt;BR /&gt; into your certificate request.&lt;BR /&gt; What you are about to enter is what is called a Distinguished Name or a DN.&lt;BR /&gt; There are quite a few fields but you can leave some blank&lt;BR /&gt; For some fields there will be a default value,&lt;BR /&gt; If you enter '.', the field will be left blank.&lt;BR /&gt; -----&lt;BR /&gt; Country Code []:&lt;BR /&gt; State or Province Name []:&lt;BR /&gt; Locality Name []:&lt;BR /&gt; Organization Name []:&lt;BR /&gt; Organizational Unit Name []:&lt;BR /&gt; Common Name []:&lt;BR /&gt; Email Address []:&lt;BR /&gt; admin@Luna:~/Mark$ ls&lt;BR /&gt; CSR.csr server.key&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;admin@Luna:~/Mark$ openssl x509 -signkey server.key -in CSR.csr -req -days 365 -out cert.crt -sha256 &amp;lt;-------------- Creating a self signed certificate from the CSR and the private key.&lt;BR /&gt; Signature ok&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;admin@Luna:~/Mark$ sudo mv server.key /etc/ssl/server.key.new &amp;lt;---------- Moving server key to the required location&lt;BR /&gt; Password:&lt;BR /&gt; Last login: Fri Dec 29 17:04:52 UTC 2017&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;admin@Luna:~/Mark$ sudo mv cert.crt /etc/ssl/server.crt.new &amp;lt;----------Moving server certificate to the required location.&lt;BR /&gt; Last login: Fri Dec 29 17:07:04 UTC 2017 on pts/1&lt;BR /&gt; admin@Luna:~/Mark$ ls&lt;BR /&gt; CSR.csr&lt;BR /&gt; admin@Luna:~/Mark$ cd /etc/ssl&lt;BR /&gt; admin@Luna:/etc/ssl$ ls&lt;BR /&gt; TAC.key crl openssl.cnf server.conf server.crt server.crt.new server.crt.older server.key server.key.new&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="6"&gt;
&lt;LI&gt;admin@Luna:/etc/ssl$ sudo mv server.crt ./server.crt.original &amp;lt;----------Changing the name on the original server certificate&lt;BR /&gt; Last login: Fri Dec 29 17:07:35 UTC 2017 on pts/1&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="7"&gt;
&lt;LI&gt;admin@Luna:/etc/ssl$ sudo mv server.key ./server.key.original &amp;lt;----------Changing the name on the original server private key&lt;BR /&gt; Last login: Fri Dec 29 17:08:20 UTC 2017 on pts/1&lt;BR /&gt; admin@Luna:/etc/ssl$ ls&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;TAC.key crl openssl.cnf server.conf server.crt.new server.crt.older server.crt.original server.key.new server.key.original&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="8"&gt;
&lt;LI&gt;admin@Luna:/etc/ssl$ sudo mv server.crt.new ./server.crt &amp;lt;-------------Changing the name on the new server certificate.&lt;BR /&gt; Last login: Fri Dec 29 17:08:37 UTC 2017 on pts/1&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="9"&gt;
&lt;LI&gt;admin@Luna:/etc/ssl$ sudo mv server.key.new ./server.key &amp;lt;------------ Changing the name on the new server key&lt;BR /&gt; Last login: Fri Dec 29 17:09:05 UTC 2017 on pts/1&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="10"&gt;
&lt;LI&gt;admin@Luna:/etc/ssl$ sudo pmtool restartbyid httpsd &amp;lt;-----------Restarting the httpsd process so it reload the certificate.&lt;BR /&gt; Last login: Fri Dec 29 17:09:19 UTC 2017 on pts/1&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 22 Feb 2018 19:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3336197#M926738</guid>
      <dc:creator>argrullo</dc:creator>
      <dc:date>2018-02-22T19:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3336842#M926739</link>
      <description>&lt;P&gt;This process work for me!&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 19:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3336842#M926739</guid>
      <dc:creator>tmoore</dc:creator>
      <dc:date>2018-02-23T19:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3339147#M926740</link>
      <description>&lt;P&gt;I'm running 6.2.2.1 and I am getting this error as well.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 00:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3339147#M926740</guid>
      <dc:creator>David Parker</dc:creator>
      <dc:date>2018-02-28T00:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3339181#M926741</link>
      <description>Hello David,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;6.2.2.1 is still affected by the bug. You will need to import the certificate using the CLI.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Feb 2018 02:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3339181#M926741</guid>
      <dc:creator>argrullo</dc:creator>
      <dc:date>2018-02-28T02:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3339668#M926742</link>
      <description>&lt;P&gt;Thanks. I do have a ticket open with TAC but still waiting for assistance. I'm running the Threat Defense image. Is it safe to use the cli for this operation?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 15:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3339668#M926742</guid>
      <dc:creator>David Parker</dc:creator>
      <dc:date>2018-02-28T15:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3339811#M926743</link>
      <description>Hello David,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Yes it is safe to perform on the CLI. I have performed on multiple customer environments without any issues.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;But, if one were to arise, the certificate itself can be regenerated or set to the default and then start over.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Feb 2018 18:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3339811#M926743</guid>
      <dc:creator>argrullo</dc:creator>
      <dc:date>2018-02-28T18:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to import server certificate to FMC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3340511#M926744</link>
      <description>&lt;P&gt;The openssl method from the cli works. Now we are encountering an issue in that modern browsers are ignoring the common name in&amp;nbsp; the cert and instead are using the subject alternative name. By default the Microsoft CA server doesn't issue certs with the san attribute set do we are trying to figure out how to accomplish this.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Mar 2018 15:57:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-import-server-certificate-to-fmc/m-p/3340511#M926744</guid>
      <dc:creator>David Parker</dc:creator>
      <dc:date>2018-03-01T15:57:46Z</dc:date>
    </item>
  </channel>
</rss>

