What we are trying to do is to create a sign in portal where users do not need to continuously have to accept the certificate prior to accessing the portal. It seems that there is a mismatch between the certificate which is on the server and the login attempts. Our director wants this addressed
So considering you are using an SSL certificate for webvpn access and this certificate is actually a selfsigned certificate you need to install this certificate on each of the computers you are using to connect, if you have a 3rd party certificate you need to make sure you are using an URL that is actually on the certificate so you are going to avoid the untrusted message, if none of the information i just provided is helpful i guess we need more information:
what type of sign in portal?
is this a problem with certificate authentication or only with the SSL certificate applied to the interface of the "firewall"?
As much specific you are will be easier to help you.
Thanks for the info you provided...one more question, I will be using a third party certificate, and was wondering where on the server I would go to import this certificate. I think that would be the final piece to the puzzle for me.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...