cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1660
Views
0
Helpful
7
Replies

Heed help. FMC/FTD RA-VPN certificate only

Dmitry O
Level 1
Level 1

Hello team. i want to configure certificate only ra-vpn based on FMC+FTDv+MS AD+MS CA. It is important that client certificates can be revoked. Can you share the best practices.

I set up a test lab and I'm having a problem. anyconnect client could connect with a revoked certificate. I did something wrong.

help please.

3 Accepted Solutions

Accepted Solutions

@Dmitry O did you setup CRL or OCSP to check for certificate revocation?

https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/objects-object-mgmt.html

Certificate Enrollment Object Revocation Options

Specify whether to check the revocation status of a certificate by choosing and configuring the method. Revocation checking is off by default, neither method (CRL or OCSP) is checked.

Secure Firewall Management Center Navigation Path

Objects > Object Management, then from the navigation pane choose PKI > PKI Enrollment. Press (+) Add PKI Enrollment to open the Add PKI Enrollment dialog, and select the Revocation tab.

Fields
  • Enable Certificate Revocation Lists—Check to enable CRL checking.

    • Use CRL distribution point from the certificate—Check to obtain the revocation lists ditribution URL from the certificate.

    • Use static URL configured—Check this to add a static, pre-defined distribution URL for revocation lists. Then add the URLs.

      CRL Server URLs—The URL of the LDAP server from which the CRL can be downloaded. This URL must start with ldap://, and include a port number in the URL.

  • Enable Online Certificate Status Protocol (OCSP)—Check to enable OCSP checking.

    OCSP Server URL—The URL of the OCSP server checking for revocation if you require OCSP checks. This URL must start with http://.

  • Consider the certificate valid if revocation information can not be reached—Checked by default. Uncheck if you do not want to allow this.

View solution in original post

Rob, you were right. I checked Objects > Object Management > PKI > Certificate Enrollment. And there were default settings. I did everything as in the screenshot and it worked.

img1.JPG

I am using *.PKCS12(pfx).
1. check "Enable Certificate Revocation Lists (CRL)"
2. check the box "User static URL configured"
3. Add the URL to the CRL
4. check "Enable Online Certificate Status Protocol (OCSP)" and add if configured OCSP URL to "OCSP Server URL"
5. uncheck "Consider the certificate valid if revocation information can not be reached"
 

For troubleshoot use Devices>VPN>Troubleshooting
in FTDv use cli command show crypto ca crls  for show crl info, clear crypto ca crls for clear crl cache, and curl for check avalability *.crl file

View solution in original post

7 Replies 7

@Dmitry O did you setup CRL or OCSP to check for certificate revocation?

https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/objects-object-mgmt.html

Certificate Enrollment Object Revocation Options

Specify whether to check the revocation status of a certificate by choosing and configuring the method. Revocation checking is off by default, neither method (CRL or OCSP) is checked.

Secure Firewall Management Center Navigation Path

Objects > Object Management, then from the navigation pane choose PKI > PKI Enrollment. Press (+) Add PKI Enrollment to open the Add PKI Enrollment dialog, and select the Revocation tab.

Fields
  • Enable Certificate Revocation Lists—Check to enable CRL checking.

    • Use CRL distribution point from the certificate—Check to obtain the revocation lists ditribution URL from the certificate.

    • Use static URL configured—Check this to add a static, pre-defined distribution URL for revocation lists. Then add the URLs.

      CRL Server URLs—The URL of the LDAP server from which the CRL can be downloaded. This URL must start with ldap://, and include a port number in the URL.

  • Enable Online Certificate Status Protocol (OCSP)—Check to enable OCSP checking.

    OCSP Server URL—The URL of the OCSP server checking for revocation if you require OCSP checks. This URL must start with http://.

  • Consider the certificate valid if revocation information can not be reached—Checked by default. Uncheck if you do not want to allow this.

Thanks for your reply. But I can't find Objects > Object Management, then from the navigation pane choose PKI > PKI Enrollment.img.JPG

@Dmitry O you are in the correct location:-

Tick the box to enable revocation, either use the CRL distribution point from the certificate or manually configure the CRL.

1.png

OK. What certificate should I add? VPN user? Or should it be the root certificate of the CA and his CRL in my AD domain ? I do not fully understand the mechanism of RA-VPN with Certificate only.

Could you share some manuals for configuring RA-VPN wiht certificate-only auth. Thank you!

@Dmitry O the screenshot provided about is where you need to configure CRL check. CRL needs to be enabled on the CA server for your internal CA. The "Enable Certificate Revocation List (CRL)" option is disable as default, so needs to be explictly enabled.

The actual user/machine certificates should be published with the CRL location, this is usually using a DNS name. So you would need to configure DNS servers in the Platform Settings policy (unless you already have done so) - this will allow the FTD to resolve the name of the CRL server.

If the certificates don't reference the CRL location, the certificate template (on the MS CA server) either needs modifying or your can explictly define the location of the CRL server by selecting "Use static URL configured" and manually define the URL.

Rob, you were right. I checked Objects > Object Management > PKI > Certificate Enrollment. And there were default settings. I did everything as in the screenshot and it worked.

img1.JPG

I am using *.PKCS12(pfx).
1. check "Enable Certificate Revocation Lists (CRL)"
2. check the box "User static URL configured"
3. Add the URL to the CRL
4. check "Enable Online Certificate Status Protocol (OCSP)" and add if configured OCSP URL to "OCSP Server URL"
5. uncheck "Consider the certificate valid if revocation information can not be reached"
 

For troubleshoot use Devices>VPN>Troubleshooting
in FTDv use cli command show crypto ca crls  for show crl info, clear crypto ca crls for clear crl cache, and curl for check avalability *.crl file

img1.JPG