Microsoft Certificate Authority and Ciso vpn client
I installed and configured microsoft certificate authority and configured the cisco pix firewall to get the certificate from the server. From a remote system i browsed the ceritificate authority and installed the certificate on the system. But when i try to connect to the Cisco firewall through vpn i am not getting connected. In the debug command i am seeing that the cisco pix tried 8 times and error message says "atts is not acceptable" Can some one guide me to any link which tells the step by step configuration for this problem.
and in the advanced request i chose "Submit the Certificate request using CA form" and in the next screen the intended purpose was "Client Authentication purpose" and CSP "Microsoft Base Cryptographic Provider v1.0" and i installed the certificate on the local system.
Now in the Cisco VPN client 4.2 Insead of Group authentication i chose Certificate and selected the installed certificate. Now when i try to connect after ipsec intialization it is trying to connect to x.x.x.x2 which is the CA Server and getting error could not connect. Is there anything i need to do? What should be authentication in pix? Should it be pre-share or rsa-sig? What should be crypto map set be ?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :