02-28-2018 12:24 PM - edited 02-21-2020 07:27 AM
Dears.
I am following the below link for creating the self signed certificate for captive portal but when I try to generate CSR I get an error as attached. Also I tried with link 2 but no luck
captive portal self signed certificate
LINK 2
03-06-2018 07:06 AM
Hi
With the error screenshot, it looks like you are trying to do it on a windows machine. It might have openssl but I would recommend doing it on the firepower itself or any other linux box which has OpenSSL installed.
On firepower box, you can go into bash mode and then elevate to root privilege, run the same set of commands to generate the self signed CA and that should be like a piece of cake.
Once done, use cat command to open the content of the certificate and import it on FMC.
cat server..crt
cat server.key
Rate if helps,
Yogesh
03-07-2018 11:06 AM
Dear yogdhanu,
I have got the both from the open ssl but so in my scenario firesight itself is a CA
Atually the doc has confused by mixing the firesight as a CA and also by signing insternal CA ,
can u write down for me 2 sepearate paragraph if we have an internal CA what will be procedure and if we have firesight as a CA (self signed certificate)
thanks
03-08-2018 09:35 AM
Hello Adam,
>Scenario 1
You can create a CSR either on firepower itself using OpenSSL or anywhere else and get it signed by your internal CA. Then import it on via ASDM.
>Scenario 2
You create the CSR and then self-sign it using OpenSSL on Firepower itself and then import the cert via ASDM
Hope it helps.
03-08-2018 10:24 PM - edited 03-08-2018 10:32 PM
Dear yogdhanu,
here is the link which I m following and configuring TASK 4.1, actually I am doing 2 jobs with self signed certificate which will be used for ssl decryption and also for captive portal active authentication.
I am generating certificate with open ssl and then I shld import then according to the attached snap shot,
Actually there are 2 ways to do that IF I have internal root CA in my corporate then I have to follow the below:
Either I can stop at below step 2 and get the csr signed from my windows Internal certificate authority which will provide me .cert and then after that I shld move to import internal CA step in the objects>PKI>internal CA's, Please correct me if I m wrong
OR
If I don't have internal root CA in my corporate then I have to follow the below:
I shld continue with complete step 3 to generate the cert by the private key and the csr as mentioned in all the 3 steps and then I shld move to import internal CA step in the objects>PKI>internal CA's, Please correct me if I m wrong
Generate a simple self-signed certificate using openSSL -
Step 1. Generate the Private key
openssl genrsa -des3 -out server.key 2048
Step 2. Generate Certificate Signing Request (CSR)
openssl req -new -key server.key -out server.csr
Step 3. Generate the self-signed Certificate.
openssl x509 -req -days 3650 -sha256 -in server.csr -signkey server.key -out server.crt
FOR SSL DECRYPTION
infact there is one more step for the ssl decryption to install the certificate in the trusted root certificate of the computer or user , so in this scenario which certificate has to be installed in the user computer the certificate which is generated in step 3 or ????
CONCLUSION:
In both scenarios I have to import the cert and the private key in the Internal CA's, and this procedure shld also be followed for SSL decryption
03-10-2018 06:48 AM
Hi Adam,
You are correct for most part. However, let me clarify 1 different between using SSL decryption on firepower and using the certificate for captive portal
You can use the certificate from step 3 for captive portal as that would be a regular certificate which is self-signed(Its still not a CA certificate which can sign other certs)
Import the certificate in internal Certs option instead of Internal CA.
For using SSL decryption, I would recommend navigating to same object page (internal CA) and click on generate a CA.
Use that CA for SSL decryption policy and also download the cert from same page under object and import it for your internal users.
Hope that helps,
Yogesh
03-14-2018 11:39 AM
thanks yogdhanu
your replies help me a lot, I upgraded my sensors and fmc to 6.1 and when I applied to the user in the connection events I can see the ssl handshake error, with not all website but usually I have seen and the connection doesn't establish.
thanks
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide