?
Solved

Help installing wildcard cert onto Cisco ASA

Posted on 2013-11-13
3
Medium Priority
?
2,282 Views
Last Modified: 2014-01-11
Hi guys,

Can someone help me with installing a wildcard cert onto my ASA.

I already have the cert (created on Windows) with the private and public keys, and the CA certs.

I have created a trustpoint for the CA and installed the CA cert. I've converted the cert using OpenSSL to PCKS12. I am getting problems importing the identity cert.

The commands I have tried entering and output are as follows.

crypto ca import <trustpoint> pkcs12 ****

Enter the base 64 encoded pkcs12.
End with the word "quit" on a line by itself:
-----BEGIN PKCS12-----
<snip>
-----END PKCS12-----
quit
ERROR: Import PKCS12 operation failed

crypto ca import <trustpoint> pkcs12 ****

Enter the base 64 encoded pkcs12.
End with the word "quit" on a line by itself:
<snip>
quit
ERROR: Import PKCS12 operation failed

<snip> is the text output from OpenSSL.

Thanks.
0
Comment
Question by:InteraX
  • 2
3 Comments
 
LVL 28

Expert Comment

by:asavener
ID: 39644524
Try using a unix-compatible text editor such as Notepad++ or Programer's File Editor.  Open the cert with one of those, and then copy/paste it into your config.
0
 
LVL 16

Accepted Solution

by:
InteraX earned 0 total points
ID: 39644544
I only use notepad++. It's very strange. I've managed to import the pfx using ASDM, but as I'm using Cisco Security Manager to manage our firewalls (we have over 30) this doesn't really help me very much.
0
 
LVL 16

Author Closing Comment

by:InteraX
ID: 39773100
Was unable to import cert from the command line. Had to import it via the GUI.
0

Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we’ll look at how to deploy ProxySQL.
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question