08-15-2014 09:49 AM - edited 02-21-2020 07:47 PM
Hello all,
I'm looking to set up an IPSec VPN connection that will authenticate its users by certificate only. I've set everything up successfully with AAA local login, but am looking to convert to a signed certificate and generate user certs for users not part of an enterprise or Active Directory.
So here's my question. What kind of certificate am I buying (lets say from Verisign aka Symantec)? And If I only want to use this certificate for my VPN and its clients, can I install it on the Cisco ASA and generate user certificates there or should I set up a Windows Server with Certificate Authority and create all the certificates on that machine?
My goal is to install the AnyConnect 3.1.x agent on the user's laptop, install the user certificate myself. No webVPN or work on the user's behalf. I've tried the local CA in the ASA in a dev environment, but have had no luck so I figured I'd just go to a proper signed one right away.
Thanks in advance,
_J
Solved! Go to Solution.
08-18-2014 06:53 AM
> Do you think I should have a 3rd party signed certificate
If the VPN is not only used for internal staff, then always go for a public certificate. If you ask other users to install your root-certificate, you ask them to allow you to be a man in the middle for all their traffic. That's nothing that should be done.
The enrollment is typically just to configure the trustpoint and install the certificate. It's very likely that the CA uses an intermediate CA, so that you should install that also. (very ofteh the CAs have howtos for various platforms).
>I'm still learning here so I apologize if my questions seem amateur.
And be assured, the learning will never stop ... :-)
08-15-2014 12:04 PM
In a small scale deployment you typically don't use certificates from a public CA. Just imagine that by default your ASA would accept anyone with a cert from that CA what is probably not what you want. You could solve that with certificate maps, but that's not what they are designed for.
So you have a couple of choices:
08-18-2014 04:45 AM
Thank you Karsten, that definitely poiunts me in the right direction with user certificates. I've set up Certificate Services in a dev environment on Server 2008 R2 before, but I noww have licenses for 2012 so I will use that. HA isn't in plans now, but may be in the future.
Do you think I should have a 3rd party signed certificate so the users do not see the "This server is not trusted" warning? Some of the users will not be under my administration so I would have to send them my Root Cert and hope their local tech can install it properly on their end. A signed cert for the connection wouldn't be much work would it? Just add that as the Trust Point certificate no?
I'm still learning here so I apologize if my questions seem amateur. I'm kind of the Jack of all trades here with training hopefully to come by the fall.
Thanks again,
_J
08-18-2014 06:53 AM
> Do you think I should have a 3rd party signed certificate
If the VPN is not only used for internal staff, then always go for a public certificate. If you ask other users to install your root-certificate, you ask them to allow you to be a man in the middle for all their traffic. That's nothing that should be done.
The enrollment is typically just to configure the trustpoint and install the certificate. It's very likely that the CA uses an intermediate CA, so that you should install that also. (very ofteh the CAs have howtos for various platforms).
>I'm still learning here so I apologize if my questions seem amateur.
And be assured, the learning will never stop ... :-)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide