cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2642
Views
10
Helpful
8
Replies

site to site vpn with certificates

mulhollandm
Level 1
Level 1

folks

I'm hoping you can help me with a query

I'm setting up a site to site vpn between an ASA and a palo alto, I've set it up and tested ok using a PSK but I now need to migrate it to using certificates instead of the PSK

I have defined the trustpoint and bound my identity cert and the issuer cert (the identity cert is issued by an enterprise authority) to the trustpoint

my problem is that when I test the vpn phase 1 fails and the asa complains that the peer's certificate is

CRYPTO_PKI(Cert Lookup) issuer="cn=x.x.x.x" serial number=xxxxxxxxxxx aaaaaaaa     |  w.....?%......
00 00 2e                                           |  ...

CRYPTO_PKI: Invalid cert

a debug crypto ikev1 127 complains that there is a Certificate Validation Failed

both my and the peer's certificates have been issued by the enterprise authority though they have different common names , the crypto policy is set for rsa-sig authentication and the tunnel group is pointing to the trustpoint

do I need to define a trustpoint and load the intermediate certificate too? (the intermediate issued the enterprise certificate)

thanks to anyone taking the time to have a look

1 Accepted Solution

Accepted Solutions

I've only ever done this on the ASA with asdm. If I understand it correctly, If you are using an intermediate CA you must add the Root CA certificate as well. It does not need to be on the same trust point. It just needs to be local.

View solution in original post

8 Replies 8

Philip D'Ath
VIP Alumni
VIP Alumni

You need to have the complete certificate chain on the ASA.  Otherwise it can't validate it.

I agree with Phillip. You must have the entire chain imported on the ASA. The Root CA, and if you are using a subordinate CA for issuing must be imported as a CA certificate. The Identity certificate will be used during authentication.

folks

thanks for all your replies, its greatly appreciated

i currently have the identity certificate and enterprise associated with the same trustpoint

are you telling me I need to have the intermediate and root certificates also loaded onto the ASA

if so, do I need to create a new trustpoint for the root and a new one for the intermediate?

I was sure I read that the ASA only needs the identity and issuing certificates, I've had a look but can't see any guides for installing certificate chains so I'd be grateful if you can point me in the right direction

thanks again


 

I've only ever done this on the ASA with asdm. If I understand it correctly, If you are using an intermediate CA you must add the Root CA certificate as well. It does not need to be on the same trust point. It just needs to be local.

andre


i've got it working again

there were several issues that caused me problems

i created two new trustpoints and dropped the intermediate and root certificates into them

I had left out the trustpoint from the crypto map, once I got these added it started working

interestingly I was working from an example in the cisco asa all in one next gen firewall book and while it mentions adding in the identity and issuing certs it doesn't touch on the intermediate or root certs

thanks for all your help and patience

@Philip D'Ath  hi Philip,

I have an SSL certificate alarm from PRTG that correctly highlights the "Unable to check revocation status"

Christory_0-1710404816479.png

 




with <sh crypto ca certificates> I can see that the issuing or root certificate authority or the root certificate authority is available to be queried.
I can also see the certificate via Cisco ASDM
>Configuration>VPN remote access>Certificate management>CA certificates.
I don't understand why I've been getting this alarm for a week on 3 of the 20 ASA firewalls.
I use the following command on the firewall in the CLI and if I import a firewall rule from the firewall and then perform a deployment, the parameter is overwritten: ssl trustp-point My_trustpoint


conf t
dynamic-access-policy-confi activate
vpn-addr-assign local reuse-delay 0
no ssl trust-point <My_trustpoint>
I don't understand why (CSM) Cisco Security Manager keeps deleting the last command line and unfortunately, I haven't found the corner of the CSM where this is configured....
This is probably the reason why messages appear in the prtg, because the verified certificate authority is not the right one or it is, by default, self-signed certificates on firewalls.
Unfortunately, our chain is not routed to the Internet". Unable to resolve the domain name" is the message I received from ssllabs.com.
Is there a way to validate or compare my parameters?

Could you run us through the steps you took to import the certificate to the ASA please.

--

Please remember to select a correct answer and rate helpful posts

--
Please remember to select a correct answer and rate helpful posts

marius

apologies but i've only seen your query now

i created the trustpoint as normal but used the enrolment terminal command

i imported the the CA certificate using the crypto pki authenticate [TRUSTPOINT] name and pasted the certificate in from notepad 

i generated the csr with the crypto pki enroll [TRUSTPOINT] name command and then imported the certificate with the crypto pki import [TRUSTPOINT] name command after copying it from notepad

you can view the certificates with the command show crypto ca certificates [TRUSTPOINT] name 

hope this helps and again, apologies

Review Cisco Networking products for a $25 gift card