Interested in hearing some thoughts from the community on the use of OCSP vs CRL for certificate validation when using certificates for authentication/authorization on an anyconnect VPN.
I was thinking that
1)OCSP is theoretically more efficient/effective as you only query for validity of the cert you are looking at, and you get a real-time response as to its status whereas CRLs are cached so the data could be stale and you are getting an update from the CA of all revoked certificates which might be more than you need.....BUT....if its a relatively small implementation and/or there arent a ton of revoked certificates, maybe getting the entire CRL and cacheing it as opposed to using OCSP isnt that big of a deal.
2)CRL could have an advantage (maybe?) if your CA is not highly available or at least if you dont want your certificate based authentication to be dependent upon the availability of the CA.
One thing which I am factoring in here (and correct me if I am wrong on this) is that the ASA will only cache a CRL for a short period of time (trying to find the doc where I read this). If that is true...then issue 1 where OCSP has an advantage due to the "real time" nature of the information being used isnt that much of an advantage because the ASA is checking for CRLs so frequently. Also issue 2 where CRL has an advantage in the event of CA availability issues, isnt that much of an advantage since the ASA has to pull a new CRL so frequently that you are still dependent upon the CA's being available.
Your thoughts? What have you chosen to do and why?
Hi All, A customer wants to authenticate Anyconnect VPN users from an ASA using the client installed certificate and then with AD. i.e. Is this a corporate device?Would we recommend authenticating the cert on the ASA then passing the AD check to ISE ...
Hello Team, we are getting alert in FMC stating policy deployment failed, we are running on 6.2.0 version and not sure which version is stable version to re mediate this issue, in one event i have seen restart will resolve this issue but is it perman...
Threat Hunting 101
In the latest Cisco Cybersecurity report, we explore all there is to know about threat hunting and provide a how-to guide for creating a threat hunting team.
Here are some of th...
What Is Cisco Identity Services Engine?
Cisco Identity Services Engine (ISE) is an all-in-one enterprise policy control product that enables comprehensive secure wired, wireless, and Virtual Private Networking (VPN) access.
Cisco ISE offers...
To participate in this event, please use the button to ask your questions
(This event was formerly know as Ask the Expert event)
This topic is a chance to discuss more about the best configuration and troubleshooting pr...