I have installed a router running 12.2(8)T IOS to end IPSec tunnels from Cisco VPN clients.
I've configured the router to authenticate the tunnel using MS CA certificates, but I cannot check the Certificate Revocation List (CRL) in order to know if the certificate is still valid.
I configured the appropiate ldap query to the CA itself first, and then to aone of the servers running Active Directory, but in both cases the router seems to do a broadcast (255.255.255.255) to resolve the ldap query.
Has somebody configured an scenario like this one? Can anybody help me?
Since there has been no response to your post, it appears to be either too complex or too rare an issue for other forum members to assist you. If you don't get a suitable response to your post, you may wish to review our resources at the online Technical Assistance Center (http://www.cisco.com/tac) or speak with a TAC engineer. You can open a TAC case online at http://www.cisco.com/tac/caseopen
If anyone else in the forum has some advice, please reply to this thread.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...