12-30-2020 12:49 PM
We are in the midst of a large deployment of an MPLS network, and a phase that will be starting soon is the connection of remote sites via IPSEC tunnels, using PKI encryption. This was working in our lab a few months ago, but some of the certificates expired. We are using an IOS router as the CA in the lab. The CA is a device; 'gahlab-tt1', the remote is 'cgr1' and the tunnel head end is 'ftw-tt1'. The tunnel is between cgr1 and ftw-tt1. I began to work with the certificates, getting new ones issued, but am stymied by the error message shown below:
Dec 30 15:36:16.905: IKEv2:% Received cert hash is invalid, using configured trustpoints from profile for signing
Any suggestions as to where to look for the source of this error would help a ton!
12-30-2020 01:30 PM
There are two cert.
there is ca cert. and user cert.
i think your ca cert. expired also so re auth ca cert. and try again
12-30-2020 06:32 PM
01-01-2021 11:53 AM
I ended up removing certificates from config and deleting files in nvram. Generated a new key fir the trust point. And then requesting new certificates. All is well.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide