Solved

Help installing wildcard cert onto Cisco ASA

Posted on 2013-11-13
3
2,210 Views
Last Modified: 2014-01-11
Hi guys,

Can someone help me with installing a wildcard cert onto my ASA.

I already have the cert (created on Windows) with the private and public keys, and the CA certs.

I have created a trustpoint for the CA and installed the CA cert. I've converted the cert using OpenSSL to PCKS12. I am getting problems importing the identity cert.

The commands I have tried entering and output are as follows.

crypto ca import <trustpoint> pkcs12 ****

Enter the base 64 encoded pkcs12.
End with the word "quit" on a line by itself:
-----BEGIN PKCS12-----
<snip>
-----END PKCS12-----
quit
ERROR: Import PKCS12 operation failed

crypto ca import <trustpoint> pkcs12 ****

Enter the base 64 encoded pkcs12.
End with the word "quit" on a line by itself:
<snip>
quit
ERROR: Import PKCS12 operation failed

<snip> is the text output from OpenSSL.

Thanks.
0
Comment
Question by:InteraX
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 28

Expert Comment

by:asavener
ID: 39644524
Try using a unix-compatible text editor such as Notepad++ or Programer's File Editor.  Open the cert with one of those, and then copy/paste it into your config.
0
 
LVL 16

Accepted Solution

by:
InteraX earned 0 total points
ID: 39644544
I only use notepad++. It's very strange. I've managed to import the pfx using ASDM, but as I'm using Cisco Security Manager to manage our firewalls (we have over 30) this doesn't really help me very much.
0
 
LVL 16

Author Closing Comment

by:InteraX
ID: 39773100
Was unable to import cert from the command line. Had to import it via the GUI.
0

Featured Post

Want Experts Exchange at your fingertips?

With Experts Exchange’s latest app release, you can now experience our most recent features, updates, and the same community interface while on-the-go. Download our latest app release at the Android or Apple stores today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question