05-10-2015 06:46 AM - edited 02-21-2020 08:13 PM
Dear,
I have configure Anyconnect VPN on Cisco ASA5525 & it working fine, currently i bought a public Certificate to make VPN session on FQDN name (xxx.company.com) & and i am easily able to make session on FQDN name (xxx.company.com) but when trying connect vpn with gateway IP address (180.xx.xx.25) then showing error (certificate is not trusted) so can we resolve this or can we disable Termination of VPN connect on getaway IP (180.xx.xx.25) and VPN connect will terminate only FQDN name (xxx.company.com).
pls find the attachment of error file.
05-10-2015 02:33 PM
You should solve this on the client-side. Just make sure that your users only connect to the VPN with the FQDN. The easiest way is to deploy an AnyConnect VPN-Profile from the ASA. In the profile you use the FQDN and name it in a meaningful way. You users should be advised to only select provided the name in the client and never use the IP.
In addition to that you can change the local AnyConnect-policy to not allow any untrusted servers. With that, they can't press "Connect Anyway" when a certificate is not trusted.
More on these policies and profiles is in the AnyConnect Admin-Guide.
There is also the solution to buy another certificate where you have both the fqdn *and* the ip address configured. But personally, I would go for the profiles.
05-10-2015 06:18 PM
Hi Karsten,
Pls guide me how can i change local AnyConnect-policy to not allow any untrusted servers.
Regards,
MN Ashique
05-10-2015 11:09 PM
It's the parameter "strict certificate trust" in the admin-guide, set it to "true" and restart the client.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide