The problem is the certificate validation has expired.
Certificate
  Status: Available
  Certificate Serial Number: 02
  Certificate Usage: General Purpose
  Public Key Type: RSA (1024 bits)
  Issuer Name:
    cn=IOSCA
    ou=security
    o=NORTEL
  Subject Name:
    serialNumber=123456789AB
    hostname=FW0.INE.com <http://fw0.ine.com/>
    cn=FW0.INE.com <http://fw0.ine.com/>
  Validity Date:
    start date: 00:58:34 UTC Mar 1 2002
    end   date: 00:58:34 UTC Mar 1 2003
  Associated Trustpoints: MYTUST

CA Certificate
  Status: Available
  Certificate Serial Number: 01
  Certificate Usage: Signature
  Public Key Type: RSA (1024 bits)
  Issuer Name:
    cn=IOSCA
    ou=security
    o=NORTEL
  Subject Name:
    cn=IOSCA
    ou=security
    o=NORTEL
  Validity Date:
    start date: 00:50:23 UTC Mar 1 2002
    end   date: 00:50:23 UTC Feb 28 2005
  Associated Trustpoints: MYTUST

The remote device connecting to SSL will error because of this even if the
root cert is installed and trusted.  To fix you could adjust the clock on
your IOS CA and reissue all certs including the CA cert.

Good luck,
Roger

On Wed, Oct 14, 2009 at 3:13 PM, imran mohammed <[email protected]>wrote:

> Hi All,
>
>
> I have configured IOS CA which issues certs to ASA.Iam able to install
> certificates in ASA.These certs are for the SSL vpn.
> Now when I access SSL vpn I get the certificate error so I have installed
> the the certificate in to trusted root CA.But when I
> access again I get the same error moreover I dont see my domain in the
> trusted root CA though I get import successfull message.
> Iam doing this lab in emulation software.Iam not sure where is the issue.It
> works well with mozilla.Issue is in IE7.
>
> Here is my config
>
>
> dns server-group DefaultDNS
>  domain-name INE.com
>
> http server enable
> http 10.1.1.0 255.255.255.0 inside
> no snmp-server location
> no snmp-server contact
>
> crypto ca trustpoint MYTUST
>  enrollment url http://20.1.1.3:80
>  fqdn FW0.INE.com
>  subject-name CN=FW0.INE.com
>  serial-number
>  crl configure
> crypto ca certificate chain MYTUST
>
>
> !
> !
> !
> webvpn
>  port 8080
>  enable outside
>
> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>
> FW0# sh crypto ca certificates
> Certificate
>   Status: Available
>   Certificate Serial Number: 02
>   Certificate Usage: General Purpose
>   Public Key Type: RSA (1024 bits)
>   Issuer Name:
>     cn=IOSCA
>     ou=security
>     o=NORTEL
>   Subject Name:
>     serialNumber=123456789AB
>     hostname=FW0.INE.com
>     cn=FW0.INE.com
>   Validity Date:
>     start date: 00:58:34 UTC Mar 1 2002
>     end   date: 00:58:34 UTC Mar 1 2003
>   Associated Trustpoints: MYTUST
>
> CA Certificate
>   Status: Available
>   Certificate Serial Number: 01
>   Certificate Usage: Signature
>   Public Key Type: RSA (1024 bits)
>   Issuer Name:
>     cn=IOSCA
>     ou=security
>     o=NORTEL
>   Subject Name:
>     cn=IOSCA
>     ou=security
>     o=NORTEL
>   Validity Date:
>     start date: 00:50:23 UTC Mar 1 2002
>     end   date: 00:50:23 UTC Feb 28 2005
>   Associated Trustpoints: MYTUST
>
> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> IOS CA
>
> crypto pki server IOSCA
>  database url flash:
>  issuer-name cn=IOSCA,ou=security,o=NORTEL
>  grant auto
> !
> crypto pki trustpoint IOSCA
>  revocation-check crl
>  rsakeypair IOSCA
>
>
> Regards
> Imran
>
>
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to