?
Solved

VPN SSL certificate ASA

Posted on 2014-10-28
6
Medium Priority
?
329 Views
Last Modified: 2014-12-10
I was notified by GoDaddy that I needed to re-key my SSL since they are moving to SHA-2. The SSL is for VPN access through the firewall which is a Cisco ASA5510. To re-key I need a CSR. I do not have the original. The SSL was installed by a consultant.

How do I get the CSR from the ASA to populate the SSL key?
0
Comment
Question by:Jennifer
  • 3
  • 2
6 Comments
 
LVL 1

Expert Comment

by:auctionpay
ID: 40409194
Yes,
You need to generate a new Cert request in-order to have the cert regenerated with the new hash. Even with the original key you would still have to regenerate the key in order to use the new hash. So even if you had the original key you would still be doing this work.
James
0
 
LVL 1

Assisted Solution

by:auctionpay
auctionpay earned 1000 total points
ID: 40409213
From the Cisco Adaptive Security Device Manager (ASDM), select "Configuration" and then "Device Management."
Expand "Certificate Management," then select "Identity Certificates," and then "Add."
Select the button to "Add a new identity certificate" and click the "New..." link for the Key Pair.
Select the option to "Enter new key pair name" and enter a name (any name) for the key pair. Next, click the "Generate Now" button to create your key pair.
Change the key size to 2048 and leave Usage on General purpose.
Next you will define the "Certificate Subject DN" by clicking the Select button to the right of that field. In the Certificate Subject DN window, configure the following values by selecting each from the "Attribute" drop-down list, entering the appropriate value, and clicking "Add."
CN - The name through which the firewall will be accessed (usually the fully-qualified domain name, e.g., vpn.domain.com).
OU - The name of your department within the organization (frequently this entry will be listed as "IT," "Web Security," or is simply left blank).
O - The legally registered name of your organization/company.
C - If you do not know your country's two digit code
ST - The state in which your organization is located.
L - The city in which your organization is located.
Please note: None of the above fields should exceed a 64 character limit. Exceeding that limit could cause problems later on while trying to install your certificate.
Next, click "Advanced" in the "Add Identity Certificate" window.
In the FQDN field, type in the fully-qualified domain name through which the device will be accessed externally, e.g., vpn.domain.com (or the same name as was entered in the CN value in step 5).
Click "OK" and then "Add Certificate." You will then be prompted to save your newly created CSR information as a text file (.txt extension).
Remember the filename that you choose and the location to which you save it. You will need to send this file or the entirety of the text to go daddy haven't done there process so I don't know.
0
 

Author Comment

by:Jennifer
ID: 40409337
Thank you very much. I will try this tomorrow.
0
Identify and Prevent Potential Cyber-threats

Become the white hat who helps safeguard our interconnected world. Transform your career future by earning your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

 
LVL 58

Accepted Solution

by:
Pete Long earned 1000 total points
ID: 40409419
0
 

Author Comment

by:Jennifer
ID: 40421723
Thank you, I will check out the link as well.
0
 

Author Closing Comment

by:Jennifer
ID: 40492750
Thank you, I was able to get this to work.
0

Featured Post

Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There’s a movement in Information Technology (IT), and while it’s hard to define, it is gaining momentum. Some call it “stream-lined IT;” others call it “thin-model IT.”
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month3 days, 7 hours left to enroll

598 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question