11-29-2016 12:47 PM - edited 03-01-2019 04:33 AM
Hi,
I am trying to deploy iWAN through APIC-EM iWAN app. While deploying hub site, I am getting following error -
Nov 29 21:51:37.156: CRYPTO_PKI: status = 0x747(E_EOS : end of i/o stream): Imported PKCS12 file failure
*Nov 29 21:51:37.156: %PKI-6-PKCS12IMPORT_FAIL: PKCS #12 Import Failed.
Please advise
Thanks,
Vish
11-29-2016 12:52 PM
some one else had a similar issue in this thread.
11-29-2016 01:10 PM
Thank you. did debug crypto messages/transaction. Looks like the devices are contacting APIC-EM by its external IP somehow while importing certificate.
*Nov 29 22:09:06.707: CRYPTO_PKI: Copying pkcs12 from http://xx.xx.xx.xx/api/v1/trust-point/pkcs12/7bf507b5-4566-4b55-a440-d0cfcbc7a298/3c4nlc88u5tq266glql3bfq36p
xx- should be internal IP
Hopefully I will be able to fix this
Thanks,
Vish
12-23-2016 05:24 AM
Hi Visha,
Regarding public/private address for PKI cert import - does that mean with EM 1.3 we can not use iWAN app provisioning over INET (in which case we have no choice but to NAT the controller)? In my case, it is a dual-router LTE branch
Thanks,
Igor
12-23-2016 11:31 AM
[Edited 01/23/2017: Pre release 1.4, NAT'ed controller support for iWAN is for greenfield sites only. In release 1.4, we are extending that support to brownfield sites as well]
AFAIK, we do support NAT'ed controller. As long as there's a connectivity from your branch to the controller, the PKCS12 import should be fine.
01-23-2017 05:25 PM
APIC-EM behind NAT (NAT'ed controller) support for brownfield branch sites to be released in 1.4 release.
08-31-2017 07:00 AM
Is there any update on this?
11-29-2016 01:07 PM
What is the device details here? What platform? What release of APIC-EM is in use? Which iWAN workflow is this - the hub provisioning or branch provisioning? Details like these would help us understand and troubleshoot better.
Having said that, please refer to the link Adam has given to figure out if there's any routing that's causing this in your set-up.
Additionally, there's a known issue on device side where if the certificate is more than 4K bytes of size, then PKCS import will fail. So please check the size of your cert.
11-29-2016 01:12 PM
Hi,
Thanks for the info (especially certificate size. will take a note of that)
Thanks,
Visha
12-23-2016 11:30 AM
Limitation on cert size is specific to subCA deployment. If you don't have subCA deployment, you are fine.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide