11-27-2018 11:10 PM - edited 02-21-2020 08:30 AM
Hello, everyone. I want to add HTTPS Certificate into FMC for WEB GUI Interface so that my browser will recognize it and won`t give an error. I generated CSR and PrivateKEY using OpenSSL. Then I submitted CSR to Windows Certificate Service of our internal company. Downloaded Base 64 encoded cert and downloaded certificate chain. Added RootCA and SubCA into FMC through Objects->PKI->Trusted CAs. When I want to import web server certificate and add server certificate, private key and chain certificate i got an error: "Unable to process CA certificate". Hope someone will help me to solve this problem.
Thanks in advance
Solved! Go to Solution.
11-28-2018 05:34 AM
You may be hitting one of several recent bugs:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg28901/?rfs=iqvred
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf42713/?rfs=iqvred
We have seen this on very recent 6.2.3.x code where FMC does not allow the import of a well-formed certificate.
I'd open a TAC case to confirm. That also helps prioritize the bug fix.
11-28-2018 02:05 AM
FMC can't import the certificate to use for itself since it does not have the private key.
If you combine the issued certificate and private key into a .p12 (PKCS#12 or .pfx) file and import that into FMC it will work.
11-28-2018 04:38 AM
Actually I imported the private key along with certificate. When clicking Import HTTPS Server Certificate it gives blank space for 3 things: Certificate, Private Key (Optional) and Chain Certificate (Optional). I added all of them with no result. I will try the solution you provided and will reply back the result asap.
Thanks in advance
11-28-2018 04:42 AM
It's been several months since I did one but I recall the .p12 worked for me while .cer +.key did not.
11-28-2018 05:17 AM
Hmm. New type of error appeared. Now FMC says "Basic constraints not critical or not identified". I checked our RootCA and SubCA certificate and in both of them Basic constraints were "None". Probably this cause error. Do you now how to solve this problem?
11-28-2018 05:25 AM
If your internal clients already trusting the internal root CA and issuing sub-CA, there's no need to import the full chain. If that's the case, try omitting the chain.
In my lab I used a basic server certificate template on my CA (Windows server 2016) and it installed fine onto my FMC.
11-28-2018 05:30 AM
Actually, for the first time I only used Private key And certificate, no any chain certificate. But it gave an error Basic Constraints not critical
11-28-2018 05:34 AM
You may be hitting one of several recent bugs:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg28901/?rfs=iqvred
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf42713/?rfs=iqvred
We have seen this on very recent 6.2.3.x code where FMC does not allow the import of a well-formed certificate.
I'd open a TAC case to confirm. That also helps prioritize the bug fix.
07-14-2019 01:45 AM
I've ran into this issue several times ever since the FMC was Sourcefire's Defense Center. It's a bug that seems to keep coming back. I solved it via the CLI: https://kimiushida.com/bitsandpieces/misc/cisco-fmc-6.3-cert-install-via-cli
This is probably a non-sanctioned procedure, but this has been my workaround. If a security product can't get certificate processing right and forces you to approve a self-signed cert to manage a security product...
07-14-2019 05:10 AM
@kimiushida nice work around. Thanks for sharing.
I agree - one would think it should be trivial to properly add a certificate to a security product's web server.
Better yet, Cisco should have a reusable validated module that does that very thing across all of its security products.
08-05-2019 02:56 AM
Hi guys,
I am trying to import an AD signed CERT, with CSR generated with OpenSSL due to SAN field missing from current Firepower CSR generation page.
If I fill in the 1st two boxes: signed cert + private key, I receive Basic constraints are not critical or not defined.
If I fill in all three boxes: signed cert + private key + CA, I receive Unable to process CA certificate. as I had the CA cert in p7b format.
I extracted it to cer format using: openssl pkcs7 -print_certs -in CA.p7b -out CA.cer
and now I tried to fill in again all three boxes but I end up with a new message: The given certificate chain is invalid.
Please advise!
08-05-2019 09:00 AM
What certificate template is your CA using?
08-05-2019 08:48 PM
08-05-2019 10:32 PM
The FMC doesn't need to trust the issuing CA.
It is generally when a client connects to a server that we care about the CA that issued the server's CA. In that case we are trusting that CA to have verified the identity of the server (based on the CA accepting the CSR and issuing a signed certificate).
Sometimes we might want the server to also have the intermediate CA in it's chain as our clients might only trust the root CA and not the intermediate CA that actually issued the certificate.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide