Solved

VPN SSL certificate ASA

Posted on 2014-10-28
6
299 Views
Last Modified: 2014-12-10
I was notified by GoDaddy that I needed to re-key my SSL since they are moving to SHA-2. The SSL is for VPN access through the firewall which is a Cisco ASA5510. To re-key I need a CSR. I do not have the original. The SSL was installed by a consultant.

How do I get the CSR from the ASA to populate the SSL key?
0
Comment
Question by:Jennifer
  • 3
  • 2
6 Comments
 
LVL 1

Expert Comment

by:auctionpay
Comment Utility
Yes,
You need to generate a new Cert request in-order to have the cert regenerated with the new hash. Even with the original key you would still have to regenerate the key in order to use the new hash. So even if you had the original key you would still be doing this work.
James
0
 
LVL 1

Assisted Solution

by:auctionpay
auctionpay earned 250 total points
Comment Utility
From the Cisco Adaptive Security Device Manager (ASDM), select "Configuration" and then "Device Management."
Expand "Certificate Management," then select "Identity Certificates," and then "Add."
Select the button to "Add a new identity certificate" and click the "New..." link for the Key Pair.
Select the option to "Enter new key pair name" and enter a name (any name) for the key pair. Next, click the "Generate Now" button to create your key pair.
Change the key size to 2048 and leave Usage on General purpose.
Next you will define the "Certificate Subject DN" by clicking the Select button to the right of that field. In the Certificate Subject DN window, configure the following values by selecting each from the "Attribute" drop-down list, entering the appropriate value, and clicking "Add."
CN - The name through which the firewall will be accessed (usually the fully-qualified domain name, e.g., vpn.domain.com).
OU - The name of your department within the organization (frequently this entry will be listed as "IT," "Web Security," or is simply left blank).
O - The legally registered name of your organization/company.
C - If you do not know your country's two digit code
ST - The state in which your organization is located.
L - The city in which your organization is located.
Please note: None of the above fields should exceed a 64 character limit. Exceeding that limit could cause problems later on while trying to install your certificate.
Next, click "Advanced" in the "Add Identity Certificate" window.
In the FQDN field, type in the fully-qualified domain name through which the device will be accessed externally, e.g., vpn.domain.com (or the same name as was entered in the CN value in step 5).
Click "OK" and then "Add Certificate." You will then be prompted to save your newly created CSR information as a text file (.txt extension).
Remember the filename that you choose and the location to which you save it. You will need to send this file or the entirety of the text to go daddy haven't done there process so I don't know.
0
 

Author Comment

by:Jennifer
Comment Utility
Thank you very much. I will try this tomorrow.
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 57

Accepted Solution

by:
Pete Long earned 250 total points
Comment Utility
0
 

Author Comment

by:Jennifer
Comment Utility
Thank you, I will check out the link as well.
0
 

Author Closing Comment

by:Jennifer
Comment Utility
Thank you, I was able to get this to work.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

#SSL #TLS #Citrix #HTTPS #PKI #Compliance #Certificate #Encryption #StoreFront #Web Interface #Citrix XenApp
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now