03-19-2024 02:46 AM
Hi all,
We had implemented Teams direct routing setup with a pair of CUBEs in High Availability mode (about a year ago) and the certificate (sbc.mydomain.com) is about to expire. I would like some help on the steps required to renew the certificate, because I have only seen guides for either new implementations or for standalone CUBEs.
Thank you!
Solved! Go to Solution.
03-19-2024 06:58 AM
Hi there,
You can either generate a CSR using OpenSSL with both CUBE FQDNs included in its SAN entries and import both the private key and signed certificates into the CUBE HA pairs, or you can individually generate CSR for each CUBE and import the signed certificates on their respective CUBEs.
Regards,
Shalid
Disclaimer:
Responses are based on personal knowledge and experience. Consider them as guidance. Other members may offer different perspectives or better approaches. No responsibility is assumed for outcomes; discretion is advised.
03-19-2024 06:43 AM
From what I know the process is the same as for a new certificate. These are the steps you’d typically do for any certificate creation or renewal.
03-19-2024 06:48 AM
Thank you Roger for your reply. Since the CUBEs are in HA mode and each one has a different hostname (sbc1.mydomain.com and sbc2.mydomain.com), from which one should I create the CSR, having in mind that the certificate will be sbc.mydomain.com?
03-19-2024 06:58 AM
Hi there,
You can either generate a CSR using OpenSSL with both CUBE FQDNs included in its SAN entries and import both the private key and signed certificates into the CUBE HA pairs, or you can individually generate CSR for each CUBE and import the signed certificates on their respective CUBEs.
Regards,
Shalid
Disclaimer:
Responses are based on personal knowledge and experience. Consider them as guidance. Other members may offer different perspectives or better approaches. No responsibility is assumed for outcomes; discretion is advised.
03-19-2024 07:04 AM
Hi Shalid,
If I use the first method, I will import the pfx file to both CUBEs and then do I have to delete the current crypto pki trustpoint and create a new one?
03-19-2024 07:31 AM
No, you typically don't need to delete the current crypto pki trustpoint and create a new one.
You can often update the existing trustpoint with the new certificate.
Regards,
Shalid
Disclaimer:
Responses are based on personal knowledge and experience. Consider them as guidance. Other members may offer different perspectives or better approaches. No responsibility is assumed for outcomes; discretion is advised.
03-19-2024 07:33 AM
I will try it and come back with the results. Thank you for your help!
03-20-2024 07:19 AM
So, it worked like that: I imported the pfx (including the certificate chain) but I had to create a new trustpoint (I guess it would have worked if I deleted the former and re-created it).
Finally, under sip-ua (if you create a new trustpoint) you have to change the crypto signaling default trustpoint command with the newly created trustpoint and it will work. Thank you both for your help!
03-20-2024 08:08 AM
Thanks @alex1988 for the update.
03-19-2024 07:04 AM
The same as when you originally created the current certificate. My experience with certificates is primarily with different CVOS systems and how it’s handled in them. In those you would create a multi SAN certificate for what you ask for. How or if it’s possible in IOS I don’t know, but likely there are documentation for this.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide