This problem occurs due to the presence of Cisco bug ID CSCse14296.
The VPN Client is not able to connect to Cisco ASA 7.2(1) if the root certificate authority (CA) has two subordinate CAs. The ASA identity certificate and the VPN Client identity certificate are issued from two different subordinate CAs. However both have the same root CA.
For a workaround, perform either one of these two methods:
Enroll the ASA on the trustpoint. (This is difficult in some cases.)
We have six VPN gateways. I can connect on them except for the one VPN gateway. When trying to connect, AnyConnect client prompts a message indicating "Connection attempt has timed out. Please verify Internet connectivity". I've checked the group pol...
we have a number of Sonicwalls and fortigate at our other sites and also connections to Azure and we had been waiting on the route based availability for the FTD to be released to convert to using route based. Now it has we have done the upgrade and now l...
Hello, I ran an upgrade on my FTDs which are in HA(Active/Standby) from 6.4.0 to 6.6.1 version via FMC.. the entire procedure was completed successfully however both the members became active/active once the upgrade finished and the traffic is now fl...
Hi guys, I have ftd firewall managed via FMC, facing some problem with my guest wireless network.The infrastructure is, we have some services published over internet for public access, on the ftd i have done some NATs and access policy configured. th...
Dear All, What are your suggestion for us in this hard situation, Planning to appear in CCIE Security lab but still Dubai exam center is closed and there is no clue when will it open. My CCIE written will be expire in march 2021.