cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
649
Views
1
Helpful
9
Replies

Expressway zone not responding- inbound TLS negotiation Error

eliranb7
Level 1
Level 1

Hello

a fresh install of expressway cluster C+E ,cluster is good, but MRA zone is down.

all the servers in the cluster can ping each other.

a secure traversal test- was successful.

went into the logs and an error appears:

EXP-E:

inbound TLS negotiation Error - service=sip - Could not download the latest CRL or get OCSP Response.

EXP-C:

check VCSE certificate.

a secure traversal test- was successful.

Any Ideas?

 

1 Accepted Solution

Accepted Solutions

Under Configuration --> Protocols --> SIP, can you set the parameter "Certificate revocation checking mode" to "off" and check again?

View solution in original post

9 Replies 9

b.winter
VIP
VIP

TLS negotiation is probably (in most cases) a problem with your certificates.

Are the CA-certs of the Exp-E certificate in the trust store in Exp-C?
Are the CA-certs of the Exp-C certificate in the trust store in Exp-E?

Is the FQDN in the zone setting in Exp-C included in the certificate of Exp-E?

Do you have 1 certificate for all the nodes in the cluster, or a certificate for each individual node?

thank you for your reply 

yes, i have uploaded the server certificate CA-Certs  to both.

in fact , in this scenario, the same CA has signed the C + E certs .

it was cisco's advise because a WAF is involved.

and as for the question:

Is the FQDN in the zone setting in Exp-C included in the certificate of Exp-E?

yes,it is the expressway E FQDN (hostname+domainname)

 

Under Configuration --> Protocols --> SIP, can you set the parameter "Certificate revocation checking mode" to "off" and check again?

thanks,

changed it to OFF

 

now Traversal is Active

but it only ensures that the problem is with the certificate.

just not sure what is the problem

probably related to the Error :Could not download the latest CRL or get OCSP Response.

 

but it only ensures that the problem is with the certificate. --> Yes and No.
Your certificates are correct, but the servers check the certificates against the CRL-servers (Certificate Revocation List), if the issuing CA has maybe revoked the certificate or not (maybe use google to understand that process better).

In your case probably, the Expressways cannot reach the CRL-server (cannot resolve the hostname or have no internet connection to it, ...) and therefore, cannot check if the certificates are still valid or not. and therefore, they don't trust each other.

If your issue is resolved, I would appreciate an "accepted solution"

Thanks again

all EXP servers are reachable for each other

is the CA that sign the certificates need to be reachable? because that is what showing under the CRL Distribution points in the certificate.

If the EXP reach each other has nothing to do with the CRL.

The server, that is checking the certificate has to reach the URL in the CRL points.
But again: lookup the info in the internet how this works. This is nothing Cisco or Expressway specific.

great, so the revocation is not necessary for my deployment ,ill keep it off.

thank you for your help

i have a certificate for all the nodes in the EXP_C cluster 

and a certificate for all the nodes in the EXP_E cluster

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: