cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2613
Views
0
Helpful
2
Replies

SSL Certificates for Cisco IOS SSL VPN (2911) - Dual intermediate CA

Tim Butters
Level 1
Level 1

Good Afternoon,

I have been struggling to install the Thawte SSL123 certificate onto my Cisco IOS Router (2911) for use with the SSL VPN feature. After hours of testing and debugging I have found the issue.

Thawte have recently made it so that two intermediate certificates are required in order to validate the signed certificate. This means that creating just one trustpoint within the IOS no longer works. It will error stating that the certificate has not been signed by an authority, this is because the Chain is invalid and the router will only be passing the signed SSL certificate to the client without the intermediates.

To overcome this, you need to create two trustpoints within the IOS software, install the two intermediate certificates, link the trustpoints together and finally import your signed SSL certificate. Below is instructions on how to perform this:

(please note, I have used thawte's name as that is what I configured my box with - you can replace the trustpoint names with whatever is applicable)

1/ Create two trustpoints and link the secondary with the primary

crypto ca trustpoint thawte.int.prim

enrollment terminal

rsakeypair (YOUR KEY PAIR WHICH YOU ARE SIGNING WITH)

exit

crypto ca trustpoint thawte.int.sec

enrollment terminal

subject-name CN=(HOSTNAME OF CLIENT,OU=(INSERT),O=(INSERT),C=(INSERT),ST=(INSERT),L=(INSERT)

rsakeypair (YOUR KEY PAIR WHICH YOU ARE SIGNING WITH)

chain-validation continue thawte.int.prim

exit

2/ Authenticate the primary trustpoint with Thawte's primary intermediate CA and the secondary trustpoint with Thawte's secondary intermediate CA

crypto ca authenticate thawte.int.prim

(COPY AND PASTE PRIMTARY CA CERTIFCATE)

quit

crypto ca authenticate thawte.int.sec

(COPY AND PASTE SECONDARY CA CERTIFICATE)

quit

3/ Import your signed SSL certificate into the secondary trustpoint

crypto ca import thawte.int.sec certificate

(COPY AND PASTE SIGNEGD SSL CERTIFICATE)

4/ Ensure that your webvpn gateway uses the SECONDARY trustpoint

webvpn gateway (SSL VPN GATEWAY)

ssl trustpoint thawte.int.sec

SSL chain validation now works and passes the complete chain to the client which in effect, authenticates the client.

Hope this helps anyone - as I have significantly less amount of hair I did when I first came into the office this morning. To the coffee machine!

All the best,

Tim

2 Replies 2

Herbert Baerten
Cisco Employee
Cisco Employee

Tim,

thank you very much for sharing your findings and helping the Cisco community grow!

Just a small suggestion: please consider putting this information in a "document" instead of a discussion thread - that way people may find it more easily, and those who find it useful can rate it (so you earn points). BTW if you do, perhaps mention Thawte in the title?

thanks again!

Herbert

Cisco moderator.

Herbert,

Thank you for the heads up!

Posted in documents.