ā06-03-2014 09:02 AM
I have a ASA 5512x running ver 9.1(2) ASDM Ver7.1 (3), I had to do a factory reset on the device and Now when I use the anyconnect vpn wizzard and I try to install the certificate that was on the device prior to the reset I am getting ERROR:Import PKCS12 operation failed.
The old certificate was generated by this device.
How do I reinstall the old certificate?
Thanks
Scott
Solved! Go to Solution.
ā06-04-2014 07:24 AM
You can, but you still need their intermediate certificate so the ASA can establish a chain of trust from the issued certificate (whether it's the originally issued or re-issued one)
ā06-03-2014 09:14 AM
How did you extract the old certificate? You need to have both the certificate and associated RSA key - both are included when you use the method noted here:
crypto ca export [trustpoint name] pkcs12 [export password]
crypto ca import [trust point name] pkcs12 [password used to export]
Unless you also have a backup of the RSA key used to sign the old self-signed certificate, it will not be possible to reinstall it onto the device.
ā06-03-2014 09:22 AM
Marvin,
Thanks for the reply,
I do have a copy of the RSA key. and I have a copy of the certificate itself.
What steps would I need to take to add the certificate back to the 5512.
Thanks
ā06-03-2014 09:31 AM
Did you do the export in pkcs12 format as noted above? That creates a combined file with both the certificate and signing key.
If so, the second step noted above is the command used to re-import the pkcs12 file.
ā06-03-2014 10:44 AM
No I did not do the export at all, all that was done was I just went into file and then Reset device to factory defaults. I didnt even consider the certificate.....
ā06-03-2014 11:58 AM
As far as I know the only way to restore a self-signed certificate is via the export / import method noted above.
If you haven't done the export before blowing away the configuration, you'll need to create a new key and use if to create a new self-signed certificate. This is among the reasons why Cisco strongly encourages use of a public CA or PKI for your certificates - they're generally much more recoverable.
ā06-03-2014 12:07 PM
We bought this certificate from GoDaddy. If that helps.
ā06-03-2014 12:20 PM
Oh. Earlier you said the certificate was generated by the device (i.e., self-signed).
If you're re-installing a GoDaddy certificate, you need to make sure you have first installed their intermediate certificate so that the ASA can link the device (identity) certificate back to the GoDaddy root CA.
Please refer to this external article.
ā06-03-2014 01:45 PM
Thanks I will try that.
Sorry about the confusion, I am new to this ASA.
ā06-04-2014 06:50 AM
Could I just regenerate a request from the ASA and rekey the cert on Godaddy?
Thanks
ā06-04-2014 07:24 AM
You can, but you still need their intermediate certificate so the ASA can establish a chain of trust from the issued certificate (whether it's the originally issued or re-issued one)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide