Interested in hearing some thoughts from the community on the use of OCSP vs CRL for certificate validation when using certificates for authentication/authorization on an anyconnect VPN.
I was thinking that
1)OCSP is theoretically more efficient/effective as you only query for validity of the cert you are looking at, and you get a real-time response as to its status whereas CRLs are cached so the data could be stale and you are getting an update from the CA of all revoked certificates which might be more than you need.....BUT....if its a relatively small implementation and/or there arent a ton of revoked certificates, maybe getting the entire CRL and cacheing it as opposed to using OCSP isnt that big of a deal.
2)CRL could have an advantage (maybe?) if your CA is not highly available or at least if you dont want your certificate based authentication to be dependent upon the availability of the CA.
One thing which I am factoring in here (and correct me if I am wrong on this) is that the ASA will only cache a CRL for a short period of time (trying to find the doc where I read this). If that is true...then issue 1 where OCSP has an advantage due to the "real time" nature of the information being used isnt that much of an advantage because the ASA is checking for CRLs so frequently. Also issue 2 where CRL has an advantage in the event of CA availability issues, isnt that much of an advantage since the ASA has to pull a new CRL so frequently that you are still dependent upon the CA's being available.
Your thoughts? What have you chosen to do and why?
The purpose of this document is to demonstrate how ISE authenticate / authorize a user that uses a smart card (PIN + Certificate) and password mechanism to login their system. This document describes the components used for this setup, configuration of IS...
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...