FMC 7.0.1 - Adding Trusted CA Cert results in empty entry
I'm trying to add a CA certificate to my FMC at Objects > PKI > Trusted CAs > Add Trusted CA
I give it a friendly name and then paste in the Base-64 certificate info.
No error messages and the certificate import seems to work fine.
However, when I look at the contents of the certificate, there are no details for the issuer or subject??
The serial number and fingerprints are there.
I've tried with my own internal CA and also with a known good certificate (Cisco Umbrella) and I get the same result.
Also, when I take the same Base-64 text and save it as a .cer file, when I open the file, the certificate details window shows all the details you would expect to see, so it looks like the issue is with the FMC??
Please refer to the attached screenshots.
Could this be a bug? Am I doing something wrong?
Anybody else running 7.0.1 able to try importing a CA trusted cert?
Although this is weird, I just discovered it doesn't actually matter for me right now as when using a private CA, the root CA is installed as part of the certificate enrollment process so it's still being pushed to the FTD and used correctly.
If I had a genuine need to install a CA cert to enable the FMC to trust some other identity certificate, there might be an issue....
Are you responsible for risk management, compliance management and auditing of a network?
If so, we’d like to speak with you to learn your current processes of enforcing compliance and managing risk to help us develop services that will ...
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...