12-04-2015 08:45 AM - edited 02-21-2020 08:34 PM
I have a c1941 and would like to install anyconnect essentials ssl vpn(client based). I have done these in the past with a single name certificate(godaddy used to call them turbo). Can i do this with a multname certificate(ucc) as well if i add a san such as vpn.company.com?
12-04-2015 09:17 AM
You should be able to import a UCC cert on the router without any issues. You may not be able to create a Certificate Signing request from the router directly with multiple SAN's. The command subject-alt-name under the trustpoint should be able add a single SAN:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-cr-book/sec-cr-s6.html#wp1689442864
You can use openssl to add additional SAN's to the existing CSR.
Here is a guide to do so using openssl:
https://langui.sh/2009/02/27/creating-a-subjectaltname-sanucc-csr/
12-04-2015 09:39 AM
I don't think i would need to be concerned about generating a csr because this is an existing ucc cert that is being renewed. I think the san for vpn.company.com can be added at rekey time. Is this correct?
12-04-2015 09:43 AM
Really depends on the number of domains that was purchased for the UCC cert. Godaddy's kb states this:
"You cannot upgrade a UCC to include more names. If you bought the UCC with up to five domain names, you need to purchase a new certificate to add another domain name."
Ideally, you should be able to add upto the number of domains purchased with the rekey option.
12-04-2015 11:27 AM
looks like the only names on it would be for mail(mail/autodiscover). So i suppose i can use it then. For subject name on the trustpoint, I would still reference the container name CN as below?
subject-name CN=vpn.company.com
or would that need to be different
12-04-2015 11:38 AM
Subject-name will translate to the issuer name of the company, this CN field is only looked at for verification if you do not have a subject alternative name (SAN) in your certificate. Ideally you should be using fqdn sub-command under the trustpoint in the trustpoint:
Router(config)#cry pki trustpoint test
Router(ca-trustpoint)#fqdn ?
LINE fully-qualified domain name
none do not include fully-qualified domain name
Router(ca-trustpoint)#fqdn vpn.company.com
As a best practice, I would set both to subject CN and fqdn to vpn.company.com.
12-04-2015 12:07 PM
Yes i normally use the fqdn in the trustpoint(as below):
crypto ca trustpoint cert1.trustpoint
enrollment terminal
subject-name CN=vpn.company.com
rsakeypair cert1.trustpoint 2048
fqdn vpn.company.com
Only reason i was asking was all i've used before has been single name certs. So the subject-name would be the only name on the cert. Just wanted to verify that when using a multi-name cert, this would not be any different. After the trustpoint, i normally configure the intermediate and principal certs as below
1(for intermediate) crypto ca authenticate cert1.trustpoint
paste intermediate cert in
2(for principal) crypto ca import cert1.trustpoint certificate
paste principal cert in
Assuming this would not be any different either correct?
12-04-2015 01:00 PM
Ok got your question. So if you already have a UCC cert generated outside of the router, all you need is to have the cert and the private key combined into a pkcs12 (.p12) file and imported into a new trustpoint. The trustpoint itself need not have any config in place:
cry pki import test pkcs12
If you are generating the CSR from the router, just create a single fqdn as you do always and import the cert as you would do normally. The router should not check if truspoint SAN matches the issued cefrtificate SAN. Only the RSA keypair used to generate the CSR should match.
And yes, the import of the cert looks correct if assuming by principal cert you mean the identity cert issued to the router by the CA.
12-04-2015 02:04 PM
Yes it is a cert generated outside of router. Ok so i would use command specified:
cry pki import cert1 pkcs12
Then it would prompt for a pkcs12 file to import. It would import to the cert1 trustpoint. And then create the certificate hash in format below.
crypto pki certificate chain cert1.trustpoint
certificate
< certificate hash values........... >
and that would be it? That is a bit easier
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide