view SHA fingerprint of self-signed cert on ASA webvpn client?
When connecting to an ASA with self-signed cert, using Cisco AnyConnect Secure Mobility Client 3.1 (10010), the AnyConnect client presents the Big Red Box of Warning, which is good. The user would need to disable "Block Connections to Unknown Servers" in preferences in order to complete the connection.
Is there a way for the user to view the SHA1/SHA3 fingerprint of the self-signed cert, before disabling the security block? I could have sworn that older versions of the AnyConnect client allowed the user view the certificate details and fingerprint before choosing to Accept and connect.
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
This document presents the ISE data limiting best practices that can dramatically improve the system performance on ISE.
Your deployment may be impacted if the alarms tab on ISE shows High load average, high CPU or high memoy usage alarm...