cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
233
Views
1
Helpful
9
Replies

PKI FlexConnect Authentication

SJY2025
Level 1
Level 1

Hi,

I am looking for a guide on how to get certificate working with Cisco C1111-4P (code 17.12.5a)

I am trying to get ECDSA certificates working to authenticate over the FlexVPN instead of PSK

I think my first question is, is it supported and what size keys, I'm trying p256

My process so far is

crypto key generate ec keysize 256 label BLA

Created a trustpoint ROOT

Enrollment term pem

revoation check none

eckeypair BLA

THEN

crypto pki authenticate ROOT

pasted in my root CA >> this imports

crypto pki enrol ROOT creates a csr

Created a trustpoint INTER

Enrollment term pem

revoation check none

eckeypair BLA

THEN

crypto pki authenticate INTER

pasted in my intermediate cert >> this imports

then

crypto pki import INTER certificate

and pasted my signed .csr content back in (missing the root/intermediate parts)

I keep getting failed to parse or verify imported certificate

9 Replies 9

wajidhassan
Level 4
Level 4

Yes, ECDSA with P-256 is supported on IOS XE 17.12.5a and can be used for FlexVPN authentication.

The error “failed to parse or verify imported certificate” typically indicates one of the following:

  1. The certificate does not match the private key used to generate the CSR. Ensure the key label used during CSR creation corresponds to the key associated with the certificate.

  2. The certificate chain is incomplete. When importing, the entire chain (signed certificate plus intermediate certificates) may need to be included, not just the individual certificates separately.

  3. The certificate format may be incorrect. Verify the certificate is in valid PEM format with correct headers and no extra spaces or characters.

Reviewing these points should help resolve the parsing error during import.

SJY2025
Level 1
Level 1

Thanks for the quick response, does my structure look correct with a Trustpoint for each (root and intermediate)?

I think what you need 

Trustpoint one point to CA 

crypto pki authenticate CA 

crypto pki import inter-CA certificate

MHM

SJY2025
Level 1
Level 1

I'm sure I'm making a very basic mistake but roughly

SJY2025_1-1752677389489.png

I have run crypto pki authenticate Root_CA

I've then pasted the root certificate in when requested

I've then run crypto pki enrol Root_CA generating a .csr

This has been signed by and sent back to me as a .pem file with

device - intermediate - root within the certificate

I've created a second Trustpoint  as follows

SJY2025_2-1752677636799.png

I have run crypto pki authenticate Intermedaite and pasted in the Intermediate section (middle) of the pem file only

I've then crypto pki import Intermediate certificate and pasted in the top section of the certificate (the device)

I've added teh chain validation as I think MHM was suggesting?

 

show crypto pki certificates <<- share this

MHM

SJY2025
Level 1
Level 1

I'm not in a position to do that, what I can say is both my root and intermediate certs are installed under the correct Trustpoints, both have valid dates and have not expired, if that helps?

then every think is OK 
are you face issue with VPN?

SJY2025
Level 1
Level 1

Ah okay, thats good to know the process is correct the issue I have is everytime I try and install the device cert I get 

SJY2025_0-1752680278078.png

 

 

Hi friend 

I search about your post last day I couldn't found it 

Anyway 

Can I see last code yoh use?

Thanks a lot 

MHM