Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

wildcard certificate on multiple devices

Posted on 2014-04-16
1
Medium Priority
?
302 Views
Last Modified: 2014-09-03
I have a wildcard certificate that is currently used for a Checkpoint firewall.  I'd like to use it on a Cisco ASA 5510 as well.  I have the key and cert exported but I can't get it to import into the ASA.

Anyone have any experince with this?

I've tried importing via the CLI and ADSM along with all various formats; .p12, .pem, .cer, .crt

ERROR: Failed to parse or verify imported certificate
ERROR: Import PKCS12 operation failed
0
Comment
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 35

Accepted Solution

by:
Bembi earned 2000 total points
ID: 40005221
In general, you can use a cert on any device, what has the name, covered by the cert. A ildcard cert does, if the domain fints, but htere may be three limitiations.

You need the be capable to export the private key.
The device has to be able to find the root cert (issuing CA)
The device has to be able to work with wildcard certs (some devices / app don't like them).
0

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question