Cisco Firewall :: Installing Signed Certificates Into ASA 5510
Apr 18, 2012
I am running Cisco Adaptive Security Appliance Software Version 8.3(2) Device Manager Version 6.4(1). This will be used as a VPN gateway. I am having troubles installing our cert. I can install the cert, but it never connects witht he correct key. It references trustpoint0 when it is trustpoint1. I deleted all trustpoints and it still happens. That.vpngw4# sh run | begin rustcrypto ca trustpoint ASDM_TrustPoint0crl configurecrypto ca trustpoint ASDM_TrustPoint1keypair ASDM_TrustPoint0crl configurecrypto ca certificate chain ASDM_TrustPoint1certificate 0f8e62 308203d5.8c quitI deleted both trust points and when I do a sh run both are gone, but when I then import the cert (via ASDM) it creates trustpoint0 again.
One is the FQDN.crt for my domain and the other is the intermediate certificate that is responsible for completing the chain of trust. However, I haven't been successful with installing the intermediate .crt onto my ISA550. I was able to install the FQDN.crt using the guide here: url... but that doesn't talk about installing chained certificates at all.
I have seen some guides talking about how to do this with ASA devices but it seems those don't apply to the ISA. This is mostly because there is no CLI with the ISA (as there is with the ASA) and also I don't see way to import/export private SSL keys from/to the ISA.
We have purchased "True BusinessID certificate" from Geotrust for our SSL VPN. Geotrust issued 2 certificates such as Web Server CERTIFICATE & INTERMEDIATE CA.
SSL vpn is being configured in Cisco ASA 5510 software version 7.2(3). Now we could successfully install INTERMEDIATE CA successfully to ASA but Web Server CERTIFICATE cannot install and gives the following error
*Failed to parse or verify imported certificate* We followed this link to install the certificatesURL
We contacted geotrust regarding this errror and they suggest to install GeoTrust Root along with the Primary & Secondary Intermediate CA certificates for True BusinessID certificate. URL
1. How to install Root along with the Primary & Secondary Intermediate CA certificates on our Cisco ASA 5510 version 7.2(3) . is there any proper way to install certificate i mean ROOT--intermediate--identify ?
2. Have we seleted the exact SSL certificate from Geotrust for our SSL VPN? is there any other certificate we should get it from Geotrust?
I am support one client for, whom falls under Security scans mandatory for new implementation of ASA 5520 device. The client uses Nessus Scan and the test results are attached.The Nessus scanner hit on 1 Medium vulnerabilities.
is there a easy to install SSL certificate on ASA, rather than enroll with a public CA? ASDM has a place to import certificates. Can I just upload a SSL certificate I got from my CA to ASA, withou setup CA enrollment? And if yes, how can I generate a SSL certificate request from my ASA 8.2?
I'm generally pretty good with VPN issues and with SSL certs, but this is my first rodeo with VPN and certificates together. I've got a Cisco 2811 router running IOS Firewall (12.4(25)) and for a while now, I've had VPN clients connecting using PSK's and XAUTH. In order to tighten security, we'd like to move away from PSK's with Aggressive Mode and use certificates with Main Mode.I've been trying to use the Cisco 2811 as the CA, rather than use a Microsoft server or third-party provider. I think I'm pretty close to getting this to work, but something isn't quite right. My VPN client software does connect to the 2811, and I get prompted for the XAUTH creds. If I supply the right creds, I do see in my VPN log window that I've gotten assigned an IP address from the inside VPN pool, my split tunneling rules come through, but the VPN disconnects almost immediately and I never get a chance to try any pings or to send any other types of traffic. [code]
I have attached a sterilized copy of the 2811's current config (2811_sterile.txt), a copy of the 2811's debug output when the VPN client tries to connect (vpn_client_connect_sterile.txt), and a copy of the VPN client's log with IKE on High and Certificates on High (vpn_log_sterile.txt).FWIW, the 2811 is NOT behind NAT, but my VPN client IS behind NAT. However, I have tried using a direct connection with the VPN client and it didn't seem to change much so I'm not convinced this is a NAT issue.Again, I've never used a Cisco router as a CA and I've been battling this problem for several hours now so the 2811's config may have a lot of unneccessary lines in it at this point.
I have an SSL VPN set up on my ASA 5520 with a self signed cert. When I run the AnyConnect install on my desktop machine I have click through a few windows to accept the certificate. When I connect through the mobile client on Android, the connection goes right through without a prompt to import/choose/download a certificate. I'm able to connect but I'm wondering if the phone has actually recieved a certificate. I'm in the 'Advanced Connection Editor' screen and the certificate setting says "Automatic".
I have been asked to install a ASA5505 on a home network. The home network has a home broadband connection which the ISP provider supplies with an IP address. This is only for 6 weeks until the new line comes in. I know this is going to cause problems but we have no choice but to impletment this.
My questions are below.
1, We have a home hub supplied by the ISP which is configured by an IP address which is NOT static. Can we not use the ASA 5505 instead. I know that if our ISP change the IP address we have to change the IP address on the 5505.
2, Will we be able to use the home network broadband to create a secure connection?
I've been reading over the documentation, but only see instructions for using a self-signed certificate for SSL. Or even trusted certificates between LMSes. But I can't seem to find anything on LMS 4.0 using a Certificate Authority. And I have a security requirement to do so.
Can I import a self signed certificate from a Cisco 871 router to a Cisco ASA 5505? The 5505 replaced the 871 and I have a VPN that goes to another company that we have a connect to. The device on the other end is a VPN concentrator ( I do not have access to modify this device without going through multiple channels.) I only need to mimic this device for the site to site VPN tunnel only. It appears that there are no pre-shared keys only a self signed certificate.
I am wanting to use a cert signed by a digicert or verisign on my ASA so that anyconnect doesn't frreak out with the untrusted cert. I have created the CSR, and I uploaded the certificate, but it is still showing the old self signed untrusted cert.
We currently are using a self-signed cert (for PEAP machine authentication) that was created on an ACS 3.3 appliance. That cert was manually installed on our laptops when they were configured for wireless conenctivity.My problem is, that self-signed cert will soon be expiring and I am not sure what needs to be done to issue a new cert AND deploy it to my Windows XP Pro clients without a service interruption. If possible, I'd like to leverage our exsiting AD infrastructure for this, but I need some direction, and time is of the essence!!
Using Sha1 for Cisco 7925g and sha256 for data. Two separate CA's, one EnTrust (SHA1) the other Local Wondows CA (SHA256); ISE can only use one at a time to process a particular protocol (ie..EAP-TLS, HTTP, etc...) As a result we have to have a separate PSN just for Wireless and Wired VoIP (which can only hold SHA1 RSA1024).
I have two Cisco WLC 5508 controllers that I'm trying to set-up for our new corporate WLAN. I've gone through most of the configuration fine but have ran into an issue uploading a signed certificate to one of my controllers. I should point out that I have managed to upload the certificate successfully to one of the controllers, I just can't seem to upload it to the second.The issue is as follows:
- I've logged into the controller, gone to Security -> Web Auth -> Certificate -> Download Certificate - I've specified my tftp server details and selected apply - the process begins and I can see through my tftp client that the controller is attempting to copy and install the certificate - The controller tries to install the certificate but fails, reporting the same
I have a doubt about CiscoWorks. I need to generate the self-signed certificate with a key of 2048 bits to generate a CA with VeriSign. CiscoWorks do this automatically with a key of 1024 bits and I do not find a form to elect a a diferent key. Is it possible to generate a certificate with 2048 bits key?
Another problem is that I have CiscoWorks installed on Solaris. Many times at day the web application does not work and the only way to recuperate it is with the command "init 6" and I have to way 15 minutes until I can have access again. Why is produced this error? Who can I fit it?
I have just renewed the self signed certificate on a v5.2 ACS and expiry date of 2013 is showing in the ACS GUI. However, when I start an ACS Admin session and view the certificate information in the browser it is showing the old expiry date of 2010. I have tried this in IE and Firefox and the certificate information is the same.
Is there a way I can get the browser to pick the new certificate ?
Right now the Self-signed Certificate on my RV180W generates errors as it was issued to the MAC address instead of the current IP address. Need instructions on Generating a Self-Signed certificate (or 1 from my Windows Server 2012 Certification Authority) that will eliminate the constant barreage of certificate errors I get when trying to access the management interface of my device? the internal domain is mythos.local, netbios name of MYTHOS, and the device name in question is surtur.
Yesterday I contacted live support with the problem that my network driver is crashing and giving me BSODs because of this when my download speed reaches above 5.5MBps.[url]...When I try to install those drivers, I first get a warning that the drivers aren't signed. I press "Continue" to dismiss the message but still at the end it fails to install and gives me the message "The drivers can not be loaded because they are not digitally signed", leaving you with a useless device.I bypassed the check windows is doing by turning off the check by running Windows in "Test Mode". I have test-signed the drivers myself that allowed me to install them. Now my device is working and not giving me BSODs anymore.
What I want is the drivers to be digitally signed by linksys/cisco. I think it's very unprofessional to distribute unsigned/useless drivers to customers. I am lucky that I am somewhat more experienced with this stuff, but what about people that are not? I think everybody should be able to install the latest drivers without any problems, without the need to hack into windows.I hope to see new drivers soon, or the same drivers but then digitally signed so I can turn off "Test Mode" again removing this ugly watermark in the bottom right corner.
he will lose connection with his chat programs for like 2 minutes then automatically be signed back on. He says he notices no other connection loss, but notices that sometimes his streaming will lag or games will lag. His ISP is Armstong (?) and he's wired to the router. XP OS.
So firstly, I assume this certificate is for the SSL vpn that is configured on the ASA? Secondly, this wouldn't copy across (the HEX part). But I believe this ASA is using a self signed cert so instead I probably ned to generate a new one on this spare ASA, so how do I do that?
I am delving into the world of Certificates and the ASA. I am having the HARDEST time grasping this though. I've poured over Cisco whitepapers, been reading through books and things just aren't solidifying in my head. So my question is, how do Certificates for SSL work on the ASA? Where does the data transmit and how does an ASA talk to a CA and User for things?
Lets do this basic topology for the discussion:
End User------SSL VPN---> ASA--->Internal CA
So in theory we are supposed to create a certificate and install it on the ASA and then set the outside interface to trust that cert?
How do identity certs and root certs also work out on the ASA? I have instructions that pretty much say
Create RSA key Create new trustpoint cry ca auth newtrustpoint cry ca enroll newtrustpoint cry ca import ?
So what are all of these steps specifically doing? Also in ASDM it shows a normal Certificate and an Identity Certificate. I can't really figure out the difference between the two. Does one cert talk to the CA and the other identify the ASA to the CA?
My ASA's have the follwing Versions: ASA Version 8.4(3) ASDM Version 6.4(7)Have I a chance to configure a site-to-site tunnel with a hostname as peer address when I will use Identity and CA Certificates?
I have generated request and our CA server gave us two files, one is certificate from CA itself, one is the certificate CA created for the ACS. I used the "Bind CA Signed Cerficate" under "local certificated"Option to bind the latter. it shows successful.and a web access from any pc will give you error info, "that the security certificate presented by this website was issued for a different website's address." And all the while I dont know how to deal with the other file, which is "Internal CA certificates" I was try to use the first option import server option, but it seems not right,