11-30-2012 05:19 AM - edited 02-21-2020 06:31 PM
Can anyconnect clients and cisco vpn ikev1-2 clients use the same certificate on an ASA?
Solved! Go to Solution.
12-02-2012 11:57 PM
John.
The certificate is identifying a user/machine rather than protocol, so yes in general "yes" you can use same certificate for SSL/IKEv1/IKEv2 connections.
What you need to take care of is that said certificate is fulliling requirements of the said protocol, for example IKEv2 implmentations will "require" that particular KU are set and client-auth/server-auth EKU are set on certificates.
M.
12-07-2012 04:52 AM
Yes - this is possible. I'm doing this with AnyConnect 3.1, two ASA 5520 with VPN cluster, always on and CAP.
You can do this by using one certificate with the correct information (OID) in the extended key usage field (EKU) - like this:
TLS Web Server Authentication, TLS Web Client Authentication, IPSec Tunnel
This supports both SSL (TLS Server & Client Authentication) and IPSec (IPSec Tunnel). Remember to configure your ASA to use the same trustpoint for both SSL and IKEv2 - like below:
You can also do it by using two separate certificates - one for SSL and one for IKE - and then put the necessary information in the EKU field and point at the correct trustpoint for each service. I think this is only supported in newer versions of AnyConnect (3.1)
/Peter
12-02-2012 11:57 PM
John.
The certificate is identifying a user/machine rather than protocol, so yes in general "yes" you can use same certificate for SSL/IKEv1/IKEv2 connections.
What you need to take care of is that said certificate is fulliling requirements of the said protocol, for example IKEv2 implmentations will "require" that particular KU are set and client-auth/server-auth EKU are set on certificates.
M.
04-04-2013 11:55 AM
I'm not sure where to set the KU and EKU for the certificate that the ASA is requesting.
12-07-2012 04:52 AM
Yes - this is possible. I'm doing this with AnyConnect 3.1, two ASA 5520 with VPN cluster, always on and CAP.
You can do this by using one certificate with the correct information (OID) in the extended key usage field (EKU) - like this:
TLS Web Server Authentication, TLS Web Client Authentication, IPSec Tunnel
This supports both SSL (TLS Server & Client Authentication) and IPSec (IPSec Tunnel). Remember to configure your ASA to use the same trustpoint for both SSL and IKEv2 - like below:
You can also do it by using two separate certificates - one for SSL and one for IKE - and then put the necessary information in the EKU field and point at the correct trustpoint for each service. I think this is only supported in newer versions of AnyConnect (3.1)
/Peter
12-11-2012 06:32 AM
Thanks for the responses.
I did use the same certificate and anyconnect works just fine with the cisco vpn.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide