cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3690
Views
2
Helpful
3
Replies

Apply wildacart certificate to Anyconnect VPN

krishnadig
Level 1
Level 1

Hi,

I am applying wildcard certificate for first time + via cli.

I have 3 files with .pem extension viz root cert, intermediate cert and private key. And the password used for importing.

I am following the URL:  http://www.cisco.com/c/en/us/support/docs/interfaces-modules/catalyst-6500-series-ssl-services-module/63485-paste-cert-key.html

When creating trustpoint / importing certificate, I dont get the "PEM" keyword. So unable to proceed, can someone please help?

I am running a ASA 5510 with Version 9.1(6)

ASA(config-ca-trustpoint)# enrollment terminal ?

crypto-ca-trustpoint mode commands/options:
<cr>

ASA(config)# crypto ca import server-tank.com ?

configure mode commands/options:
certificate Import a certificate from the terminal
pkcs12 Import PKCS12 format from the terminal

Thanks,

Krishna

1 Accepted Solution

Accepted Solutions

Hi,

Great keep us posted.

Regards,

Aditya

Please rate helpful posts.

View solution in original post

3 Replies 3

Aditya Ganjoo
Cisco Employee
Cisco Employee

Hi,

You need to convert the certificate to a PKCS12 format; which is the one the ASA supports.
With wildcard certificate, the CA should give you the certificates plus the RSA key pair.

You need to have OPNESSL installed for this process.

Here is the procedure to export a BASE64 to PCK12:

Step 1

You need to have the PEM certificate that has the Private Key as well as
the Identity cert that CA sent you

Step 2

From the Identity cert that you got from CA, we need to export the
Root, Intermediate and ID and save them as a base64 format

Double click the ID cert and go the details Tab and click over the "Copy to
file " follow the wizard and save it on the same folder where you have the
original cert

Go to the "Certification Path" tab and export the Root and intermediate
respectively.

Step 3

You should have the 3 certificates on the same folder, we would need to
create a txt file. Afterwards, open each of the certificates
(root,intermediate,Identity) with notepad and paste them into the new
notepad file(chain.txt) and save it

Step 5

Open the open SSL program and type the following . Note OPEN SSL program
must be on the same folder

Pkcs12 -export -in <notepad file.txt> -inkey <pem file.pemkey> -out
<name>.12

i.e pkcs12 -export -in chain.txt -inkey ddcvpn001.c-iv.net.pemkey -out id.12

This would create the pkcs file in binary format but we need to convert this
to txt to be imported to the ASA

Base64 -in id.p12 -out id.p12.txt

Step 6

Now you can double click over the id.p.12.txt file and copy the output into
the ASA

Step 7

On the ASA type:

crypto ca import <name> pkcs12 <password>

Enter the base 64 encoded pkcs12.

End with the word "quit" on a line by itself:

Here you can paste in the output of the id.p.12.txt file

Then apply the certificate to the interface with the command :

ssl trust-point <name> outside.

Regards,

Aditya

Please rate helpful posts.

Thanks Aditya, I will check this and share the results. 

Hi,

Great keep us posted.

Regards,

Aditya

Please rate helpful posts.

Review Cisco Networking products for a $25 gift card