?
Solved

wildcard certificate on multiple devices

Posted on 2014-04-16
1
Medium Priority
?
294 Views
Last Modified: 2014-09-03
I have a wildcard certificate that is currently used for a Checkpoint firewall.  I'd like to use it on a Cisco ASA 5510 as well.  I have the key and cert exported but I can't get it to import into the ASA.

Anyone have any experince with this?

I've tried importing via the CLI and ADSM along with all various formats; .p12, .pem, .cer, .crt

ERROR: Failed to parse or verify imported certificate
ERROR: Import PKCS12 operation failed
0
Comment
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 35

Accepted Solution

by:
Bembi earned 2000 total points
ID: 40005221
In general, you can use a cert on any device, what has the name, covered by the cert. A ildcard cert does, if the domain fints, but htere may be three limitiations.

You need the be capable to export the private key.
The device has to be able to find the root cert (issuing CA)
The device has to be able to work with wildcard certs (some devices / app don't like them).
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question