05-16-2013 01:13 PM - edited 03-11-2019 06:44 PM
Hello,
I came up accross a weird situation when I was trying to apply a self signed cert to my SSL_VPN group as a test.
Here is what I came accross...
the command that I needed to use was "trust-point self" under my SSL_VPN group.
[code=..]
tunnel-group SSL_VPN ipsec-attributes
trust-point self
[/code]
As always its my habit to use the "?" to see my options. Once I got into the "tunnel-group SSL_VPN ipsec-attributes" and did the ? to see my options here is what I got...
[code..]
ASA1(config)# tunnel-group SSL_VPN ipsec-attributes
ASA1(config-tunnel-ipsec)# ?
tunnel-group configuration commands:
authorization-required Require users to authorize successfully in order to
connect (DEPRECATED)
chain Enable sending certificate chain
exit Exit from tunnel-group IPSec attribute configuration
mode
help Help for tunnel group configuration commands
ikev1 Configure IKEv1
isakmp Configure ISAKMP policy
no Remove an attribute value pair
peer-id-validate Validate identity of the peer using the peer's
certificate
radius-with-expiry Enable negotiation of password update during RADIUS
authentication (DEPRECATED)
ASA1(config-tunnel-ipsec)#
[/code]
I do not see an option for
[code..]
trust-point self
[/code]
however when I tried to type it out and hit enter it took the command
[code..]
ASA1(config-tunnel-ipsec)# trust-point self
ASA1(config-tunnel-ipsec)#
[/code]
I am not too familiar with the 8.4 code, so I dont know if this is something to worry about or just let it go.
Thanks
Solved! Go to Solution.
05-16-2013 02:09 PM
My question would be... If you are configuring an SSL vpn what are you doing in the IPSec-atrributes
Regards
05-16-2013 02:09 PM
My question would be... If you are configuring an SSL vpn what are you doing in the IPSec-atrributes
Regards
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide