cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1161
Views
0
Helpful
7
Replies

AnyConnect certificate authentication error

ken_maruu
Level 1
Level 1

Hi, there

I'm using ASA5516 and Firepower 1140 as VPN Gateway with AnyConnect.

I installed CA certificate which is generated by third party RADIUS on both ASA5516 and Firepower 1140.

I also generated and install a client certificate for my computer.

When I'm attempting to connect VPN(ASA5516) by using AnyConnect, there is no problem on the other hand,

When I'm attempting to connect VPN(Firepower 1140) by using AnyConnect, receiving the error "Certificate Validation Failure" on Anyconnect.

The VPN configuration for AnyConnect is the same both of them but The version is different.

ASA5516 Version 9.8(4)

Firepower 1140 Version 9.16(2)7

I also noticed that certificate ca is slightly different (I installed same CA certificate though)

ASA5516 shows 00xxxxxxxxxxxxxxxx (18 digits alphanumeric character)

Firepower 1140 shows xxxxxxxxxxxxxxxx(16 digits alphanumeric character)

x is same alphanumeric character.

Any advices would be appreciated.

7 Replies 7

marce1000
VIP
VIP

 

 - Check the logs of the Firepower 1140  when this happens ,

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Hello M,

Thank you for your reply.

When I use "show logging" , there are too many logs that I cannot figure out the logs that I want to check.

Is there any command that I can check the logs easily?

I found the logs.

%ASA-6-725016: Device selects trust-point ASA-self-signed for client outside:xx.xx.xx.xx/2212 to xx.xx.xx.xx/8443
%ASA-6-725004: Device requesting certificate from SSL client outside:xx.xx.xx.xx/2212 to xx.xx.xx.xx/8443 for authentication
%ASA-6-725004: Device requesting certificate from SSL client outside:xx.xx.xx.xx/2212 to xx.xx.xx.xx/8443 for authentication
%ASA-7-725017: No certificates received during the handshake with client outside:xx.xx.xx.xx/2212 to xx.xx.xx.xx/8443 for TLSv1.2 session
%ASA-6-725002: Device completed SSL handshake with client outside:xx.xx.xx.xx/2212 to xx.xx.xx.xx/8443 for TLSv1.2 session

It seems Firepower doesn't recognize certificates from my computer even though It has the right one. 

balaji.bandi
Hall of Fame
Hall of Fame

Did you import the certs to FTD including Root and chain ?

follow below guide :

https://www.cisco.com/c/en/us/support/docs/network-management/remote-access/212424-anyconnect-remote-access-vpn-configurati.html

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Hello BB,

Thank you for your reply.

 referred to the article down below.

https://tayam-infra.net/how-to-configure-asa-for-certificate-based-authentication/

I'm not really sure whether FTD including Root and chain or not because I don't use FMC.

how you managing the FTD ? FDM

you can look at the File see in the notepad++ have chain or not.

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

I looked into the logs and found the error ‘peer certificate key usage is invalid’

What I did was to add ‘ignore-ssl-keyusage’

It’s working now

Thanks for your advice.

 

thats  not the best, but if that work for you welcome

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help