09-19-2017 01:30 AM - edited 03-12-2019 04:33 AM
I have an ASA-5508-X, controlled by a vFMC. Both are running 6.2.2.0 I am attempting to install a certificate, so that I can configure remote access and allow Anyconnect clients to connect in.
I have the SSL certificate, as a text file, along with a matching private key and intermediate certificate bundle.
I have tried going to Device > Certificates > Add Certificate, selected the relevant FTD, then added a "Cert enrollment", however I see no way to supply the certificate, private key and intermediate bundle.
Is there something I am missing here?
09-19-2017 07:45 AM
Click the plus sign to add a new certificate and make it "manual" type. That will divert you to the object management where you can paste in the plain text certificate chain.
You can also add them as separate device and chain objects under Objects > Object Management > PKI. If you do it that way in advance, you should then have the device certificate already available to you on the drop down menu in the RA VPN setup wizard.
09-20-2017 07:09 PM
Yeah found that, but:
1. The certificate also has an associated private key, and an intermediate certificate. Pretty sure they too will be required, but I can see no place to input them.
2. There are other screens there requesting Certificate parameters, and key length and size. Isn't this information entered when the certificate is generated, part of the CSR, and embedded in the certificate itself?
3. When I go to Devices>Certificates>Add New Certificate and attempt to add the certificate based on the earlier enrollment, after a delay, i get the following error: "Failed to complete certificate enrollment : quit : [info] : INFO: Certificate has the following attributes: Fingerprint: b9ffb1cf b90b9645 6b0b2807 0252f510 Trustpoint 't2' is a subordinate CA and holds a non self-signed certificate. Error: Certificate doesn't have the Basic Constraints CA flag set. Configure 'no ca-check' command in the trust point configuration to use this certificate. % Error in saving certificate: status = FAIL"
09-20-2017 07:29 PM - edited 09-20-2017 07:30 PM
If you click on the "?" icon when adding a certificate enrollment (Under Objects > Object Management > PKI > Cert Enrrollment), you can see that the sort of case you are describing would call for using a PKCS#12 file (as shown below). When you do that type of enrollment, optional tasks 4-6 below are not required.
A PKCS12 file will include all the necessary bits in a self-contained encrypted file that includes the individual base-64 encoded files (private key, server certificate and any intermediate certificates). See https://en.wikipedia.org/wiki/PKCS_12
Step 1 | Open the Add Cert Enrollment dialog:
|
||
Step 2 | Enter the Name, and optionally, a Description of this enrollment object.
When enrollment is complete, this name is the name of the trustpoint on the managed devices with which it is associated. |
||
Step 3 | Open the CA Information tab and choose the Enrollment Type.
|
||
Step 4 | (Optional) Open the Certificate Parameters tab and specify the certificate contents. See Certificate Enrollment Object Certificate Parameters.
This information is placed in the certificate and is readable by any party who receives the certificate from the router. |
||
Step 5 | (Optional) Open the Key tab and specify the Key information. See Certificate Enrollment Object Key Options. | ||
Step 6 | (Optional) Click the Revocation tab, and specify the revocation options: See Certificate Enrollment Object Revocation Options. | ||
Step 7 | Allow Overrides of this object if desired. See Object Overrides for a full description of object overrides. |
04-10-2018 04:26 PM
04-10-2018 09:26 PM
Is the certificate you are trying to install from an internal CA?
From the error message it appears you may be trying to install a certificate from a subordinate CA and you don't have the root CA as a trusted CA already.
If that's the case, try first adding the root and subordinate CA certificates to your FMC. That way when it analyzes a certificate issued by the subordinate CA it will see a valid chain of trust back to the trusted root CA.
08-24-2018 07:15 AM
09-17-2021 08:35 AM
Self-signed (non-CA) certificates do not have the basic constraints CA flag but FTD requires that for the trustpoint.
Back in ASA it was possible to add no 'ca-check' to the trustpoint before adding the self signed certificate. Currently I also would like to know how to work around that in FTD/FMC.
09-19-2021 04:56 AM
It's a current limitation. This bug confirms it for FDM (same applies for FMC):
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu95526
Ask your local Cisco SE to add your need for this feature via a Firestarter request. They seem to not care so much about this since the Cisco-preferred and supported MFA solution (Duo) doesn't have the limitation in the certificates it uses.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide