AnyConnect Client - Certificate cannot be verified

Hi,
A user keeps getting the following message under Fedora 10:
"Warning: The following Certificate received from the Server could not be verified"
After answering 'yes' to accept the Cert, the message keeps repeating and never reaches the user/pass part. Must be a client issue as it works under Windows.
Can anyone give me a hint; I don't have a Linux System handy to try the client on. :(
Thanks,
Fabian

User renamed .mozilla and the client couldn't find the certificate it was looking for.

Similar Messages

  • The signature of the certificate cannot be verified 0x80096004 (-2146869244)

    hi
    I am creating a three tier CA infrastruture, I have created the 2 tiers (1 root and 2 standalone CAs), however when I try to create the issuing server (enterprise sub ordinate) I am getting the above error on the certificate request process.
    Basically the error is The signature of the certificate cannot be verified. 0x80096004 (-2146869244) Error Constructing or Publishing Certificate  Resubmitted by xxxxxx 17.12.2013 13:12 xxx  xxxxx Subordinate Certification Authority
    (SubCA) 
    It is a 512 key ca enterprise installed on windows 2008 server.
    Any help would be great....

    hi
    I am creating a three tier CA infrastruture, I have created the 2 tiers (1 root and 2 standalone CAs), however when I try to create the issuing server (enterprise sub ordinate) I am getting the above error on the certificate request process.
    Basically the error is The signature of the certificate cannot be verified. 0x80096004 (-2146869244) Error Constructing or Publishing Certificate  Resubmitted by xxxxxx 17.12.2013 13:12 xxx  xxxxx Subordinate Certification Authority
    (SubCA) 
    It is a 512 key ca enterprise installed on windows 2008 server.
    Any help would be great....
    Also, why are you creating a 3 tier infrastructure with 2 policy CAs? What is the business driver for this? Typically these days, unless absolutely necessary, best practice is 2-tier, not 3.

  • Unable to Install Root CA Certificate - Certificate cannot be verified up to a trusted certificate authority.

    Hi,
    I am trying to install CA root certificate on Windows 7, IE 9.
    Encounter error: "Untrusted Certificate".  "This certificate cannot be verified up to a trusted certificate authority."
    I have tried to install the certificate to Trusted Root Certificate Authorities->local computer and import was successful. BUT on IE->Internet Options->Certificate->Trusted Root Certificate Authorities, I am unable to find this root CA on
    the list.
    On mmc->Certificates->Trusted Root Certificate Authorities->certificates, I am able to view this root CA.
    I then restarted the IE and view the ssl site again but failed too, "Untrusted Certificate".
    Anyone, any idea ?
    Regards,
    Eye Gee

    Hi,
    If you install the certificate but then cannot see it please read the following KB article:
    You cannot view certificate information in Windows Internet Explorer 7 or in Certificate Manager after you successfully import a certificate on a Windows Vista-based computer(although it applies to Windows Vista)
    http://support.microsoft.com/default.aspx?scid=kb;EN-US;932156
    This is also because of this: Microsoft Security Advisory: Update for minimum certificate key length
    http://support.microsoft.com/kb/2661254
    To get rid of the error, you can self-signed certificate for a secured website in Internet Explorer.
    To do this, follow these steps:
    1. In Explorer Options, add the URL to your trusted sites. Exit Explorer.
    2. In Windows Internet Explorer, click Continue to this website (not recommended).
     A red Address Bar and a certificate warning appear.
    3. Click the Certificate Error button to open the information window.
    4. Click View Certificates, and then click Install Certificate.
    5. On the warning message that appears, click Yes to install the certificate and place it in your trusted certificates authority.
    6. Exit Explorer then open the page again. Error should be gone.
    I also would like to suggest you refer to the link below to learn more about certificates:
    Certificate errors: FAQ
    http://windows.microsoft.com/en-HK/internet-explorer/certificate-errors-faq#ie=ie-11
    Understanding Certificate Revocation Checks
    http://blogs.msdn.com/b/ieinternals/archive/2011/04/07/enabling-certificate-revocation-check-failure-warnings-in-internet-explorer.aspx
    Hope it helps.
    Regards,
    Blair Deng
    Blair Deng
    TechNet Community Support

  • Yosemite 10.10.1 has my email saying the server certificate "cannot be verified".  This also keeps me out of the cloud. How do I correct this?

    Since downloading Yosemite 10.10.1 on my MacBook Pro and Mac desktop I have had email problems.  When linking to the server a popup message appears saying "The identity of POP3.knology.net cannot be verified."  It may be another server is attempting to steal the data.  My email server says this is an apple problem that they've seen with 10.10.1 (They may just be passing the buck) but they can't solve it. The self-signed server is "map.example.com" which expired on Friday, Nov 2, 2012.

    Your email provider is using a self-signed certificate? LOL.
    This is not an Apple issue. Somebody has their certificate screwed up, and OS X is doing the right thing to protect you.
    It _is_ possible for you to go to the certificate and explicitly trust it, always, even though it's an invalid and/or expired certificate. That will probably address the issue. But this "map.example.com' has "screwed up" written ALL OVER IT.

  • Since 8.1 update to Surface, I can't access office 365 portal, nor yahoo, "This certificate cannot be verified up to a trusted certification authority"

    I have spent at least 10 hours doing every imaginable fix recommended, and none of them have the least bit of effect on this problem.  Unbelievably frustrating, "certificate errors" and can't get to the Office 365 portal, and can't set up
    Outlook.  MS didn't put an automatic restore point on my computer before doing the 8.1 upgrade, so I'm screwed there. Dead in the water, this Surface tablet is a doorstop at this point. Swear word.

    Looked at the system log (don't know how to attach it here, so text below, removed our network info, SIDs, etc), and it seems the problem is that the computer can't reach the domain controller, which means the clock isn't synched, so even though the
    "system time" on my desktop is right, it's screwing around with the certificates (I think). When I did the update to 8.1, I unjoined from the domain, (because my domain has a WSUS) then rejoined after the 8.1 update was done (it's my only Win8 computer).
    Please don't tell me to "add as a trusted site", etc., because after 15 hours of troubleshooting, believe me, I've done everything, including trying to uninstall IE11 (you can't in Windows 8.1, you can only "disable", then "re-enable",
    which does nothing).  Thanks.
    Level Date and Time Source Event ID Task Category
    Warning 2/21/2014 8:49:13 AM LsaSrv 40961 None The Security System could not establish a secured connection with the server No authentication protocol was available.
    Warning 2/21/2014 8:48:16 AM LsaSrv 40961 None The Security System could not establish a secured connection with the server
    l No authentication protocol was available.
    Warning 2/21/2014 8:47:50 AM Microsoft-Windows-DNS-Client 8019 (1028) "The description for Event ID 8019 from source Microsoft-Windows-DNS-Client cannot be found. Either the component that raises this event is not installed on
    your local computer or the installation is corrupted. You can install or repair the component on the local computer.
    If the event originated on another computer, the display information had to be saved with the event.
    The following information was included with the event:
    the message resource is present but the message is not found in the string/message table
    Information 2/21/2014 8:47:51 AM BROWSER 8033 None The browser has forced an election on network \Device\NetBT_Tcpip because a master browser was stopped.
    Warning 2/21/2014 8:47:38 AM LsaSrv 40961 None The Security System could not establish a secured connection with the server No authentication protocol was available.
    Warning 2/21/2014 8:47:35 AM Microsoft-Windows-DNS-Client 8019 (1028) "The description for Event ID 8019 from source Microsoft-Windows-DNS-Client cannot be found. Either the component that raises this event is not installed on
    your local computer or the installation is corrupted. You can install or repair the component on the local computer.
    If the event originated on another computer, the display information had to be saved with the event.
    The following information was included with the event:
    the message resource is present but the message is not found in the string/message table
    Information 2/21/2014 8:47:07 AM BTHUSB 18 None "The description for Event ID 18 from source BTHUSB cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted.
    You can install or repair the component on the local computer.
    If the event originated on another computer, the display information had to be saved with the event.
    The following information was included with the event:
    Information 2/21/2014 8:47:06 AM Microsoft-Windows-Power-Troubleshooter 1 None "The description for Event ID 1 from source Microsoft-Windows-Power-Troubleshooter cannot be found. Either the component that raises this event is not
    installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.
    If the event originated on another computer, the display information had to be saved with the event.
    The following information was included with the event:
    2/20/2014 7:40:19 PM
    2/21/2014 1:47:04 PM
    6341
    1894
    1865
    0
    2783
    1549
    113134
    16897
    5
    5
    0
    0
    0
    0
    0
    the message resource is present but the message is not found in the string/message table
    Error 2/21/2014 8:47:05 AM Microsoft-Windows-NDIS 10317 PnP "The description for Event ID 10317 from source Microsoft-Windows-NDIS cannot be found. Either the component that raises this event is not installed on your local computer
    or the installation is corrupted. You can install or repair the component on the local computer.
    If the event originated on another computer, the display information had to be saved with the event.
    The following information was included with the event:
    EV_RenderedValue_0.00
    4
    19984723346456576
    Marvell AVASTAR 350N Wireless Network Controller
    74
    the message resource is present but the message is not found in the string/message table
    Error 2/21/2014 8:47:05 AM BTHUSB 17 None "The description for Event ID 17 from source BTHUSB cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted.
    You can install or repair the component on the local computer.
    If the event originated on another computer, the display information had to be saved with the event.

  • The web site's certificate cannot be verified

    Hello,
    I'm trying to secure our SGD server (*), we have a Verisign Class 3 Secure Server CA certificate
    when the SGD client starts I see following error:
    http://www.psb.ugent.be/~frlae/sgdsecurityerror.png
    http://www.psb.ugent.be/~frlae/sgd2.png
    can somebody tell me what's causing this and hopefully how to fix this ?
    regards,
    Frederik
    * http://wikis.sun.com/display/SecureGlobalDesktop/HOWTO+Setup+SGD+as+a+SOHO+Remote+Access+Server
    Edited by: fretn on Jul 16, 2008 3:25 AM

    Frederik,
    I think this is the same issue I have had on a number of sites.
    It is down to the Verisign cert being signed by an intermediate authority.
    The procedure we used is as follows
    add the verisign cert as cert.pem in /opt/tarantella/var/tsp/
    create a file called mychainedcerts.pem in this folder
    add the following which are the root and int certs from verisign
    -----BEGIN CERTIFICATE-----
    MIIEnDCCBAWgAwIBAgIQdTN9mrDhIzuuLX3kRpFi1DANBgkqhkiG9w0BAQUFADBf
    MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xNzA1BgNVBAsT
    LkNsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
    HhcNMDUwMTE5MDAwMDAwWhcNMTUwMTE4MjM1OTU5WjCBsDELMAkGA1UEBhMCVVMx
    FzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVz
    dCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2UgYXQgaHR0cHM6Ly93d3cu
    dmVyaXNpZ24uY29tL3JwYSAoYykwNTEqMCgGA1UEAxMhVmVyaVNpZ24gQ2xhc3Mg
    MyBTZWN1cmUgU2VydmVyIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
    AQEAlcMhEo5AxQ0BX3ZeZpTZcyxYGSK4yfx6OZAqd3J8HT732FXjr0LLhzAC3Fus
    cOa4RLQrNeuT0hcFfstG1lxToDJRnXRkWPkMmgDqXkRJZHL0zRDihQr5NO6ziGap
    paRa0A6Yf1gNK1K7hql+LvqySHyN2y1fAXWijQY7i7RhB8m+Ipn4G9G1V2YETTX0
    kXGWtZkIJZuXyDrzILHdnpgMSmO3ps6wAc74k2rzDG6fsemEe4GYQeaB3D0s57Rr
    4578CBbXs9W5ZhKZfG1xyE2+xw/j+zet1XWHIWuG0EQUWlR5OZZpVsm5Mc2JYVjh
    2XYFBa33uQKvp/1HkaIiNFox0QIDAQABo4IBgTCCAX0wEgYDVR0TAQH/BAgwBgEB
    /wIBADBEBgNVHSAEPTA7MDkGC2CGSAGG+EUBBxcDMCowKAYIKwYBBQUHAgEWHGh0
    dHBzOi8vd3d3LnZlcmlzaWduLmNvbS9ycGEwMQYDVR0fBCowKDAmoCSgIoYgaHR0
    cDovL2NybC52ZXJpc2lnbi5jb20vcGNhMy5jcmwwDgYDVR0PAQH/BAQDAgEGMBEG
    CWCGSAGG+EIBAQQEAwIBBjApBgNVHREEIjAgpB4wHDEaMBgGA1UEAxMRQ2xhc3Mz
    Q0EyMDQ4LTEtNDUwHQYDVR0OBBYEFG/sr6DdiqTv9SoQZy0/VYK81+8lMIGABgNV
    HSMEeTB3oWOkYTBfMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIElu
    Yy4xNzA1BgNVBAsTLkNsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlv
    biBBdXRob3JpdHmCEHC65B0Q2Sk0tjjKewPMur8wDQYJKoZIhvcNAQEFBQADgYEA
    w34IRl2RNs9n3Nenr6+4IsOLBHTTsWC85v63RBKBWzFzFGNWxnIu0RoDQ1w4ClBK
    Tc3athmo9JkNr+P32PF1KGX2av6b9L1S2T/L2hbLpZ4ujmZSeD0m+v6UNohKlV4q
    TBnvbvqCPy0D79YoszcYz0KyNCFkR9MgazpM3OYDkAw=
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIICPDCCAaUCEHC65B0Q2Sk0tjjKewPMur8wDQYJKoZIhvcNAQECBQAwXzELMAkG
    A1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTcwNQYDVQQLEy5DbGFz
    cyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTk2
    MDEyOTAwMDAwMFoXDTI4MDgwMTIzNTk1OVowXzELMAkGA1UEBhMCVVMxFzAVBgNV
    BAoTDlZlcmlTaWduLCBJbmMuMTcwNQYDVQQLEy5DbGFzcyAzIFB1YmxpYyBQcmlt
    YXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIGfMA0GCSqGSIb3DQEBAQUAA4GN
    ADCBiQKBgQDJXFme8huKARS0EN8EQNvjV69qRUCPhAwL0TPZ2RHP7gJYHyX3KqhE
    BarsAx94f56TuZoAqiN91qyFomNFx3InzPRMxnVx0jnvT0Lwdd8KkMaOIG+YD/is
    I19wKTakyYbnsZogy1Olhec9vn2a/iRFM9x2Fe0PonFkTGUugWhFpwIDAQABMA0G
    CSqGSIb3DQEBAgUAA4GBALtMEivPLCYATxQT3ab7/AoRhIzzKBxnki98tsX63/Do
    lbwdj2wsqFHMc9ikwFPwTtYmwHYBV4GSXiHx0bH/59AhWM1pF+NEHJwZRDmJXNyc
    AA9WjQKZ7aKQRUzkuxCkPfAyAw7xzvjoyVGM5mKf5p/AfbdynMk2OmufTqj/ZA1k
    -----END CERTIFICATE-----
    chown ttasys:ttaserv mychainedcerts.pem
    create a file called int.crt
    add this into it
    -----BEGIN CERTIFICATE-----
    MIIEnDCCBAWgAwIBAgIQdTN9mrDhIzuuLX3kRpFi1DANBgkqhkiG9w0BAQUFADBf
    MQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xNzA1BgNVBAsT
    LkNsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
    HhcNMDUwMTE5MDAwMDAwWhcNMTUwMTE4MjM1OTU5WjCBsDELMAkGA1UEBhMCVVMx
    FzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVz
    dCBOZXR3b3JrMTswOQYDVQQLEzJUZXJtcyBvZiB1c2UgYXQgaHR0cHM6Ly93d3cu
    dmVyaXNpZ24uY29tL3JwYSAoYykwNTEqMCgGA1UEAxMhVmVyaVNpZ24gQ2xhc3Mg
    MyBTZWN1cmUgU2VydmVyIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
    AQEAlcMhEo5AxQ0BX3ZeZpTZcyxYGSK4yfx6OZAqd3J8HT732FXjr0LLhzAC3Fus
    cOa4RLQrNeuT0hcFfstG1lxToDJRnXRkWPkMmgDqXkRJZHL0zRDihQr5NO6ziGap
    paRa0A6Yf1gNK1K7hql+LvqySHyN2y1fAXWijQY7i7RhB8m+Ipn4G9G1V2YETTX0
    kXGWtZkIJZuXyDrzILHdnpgMSmO3ps6wAc74k2rzDG6fsemEe4GYQeaB3D0s57Rr
    4578CBbXs9W5ZhKZfG1xyE2+xw/j+zet1XWHIWuG0EQUWlR5OZZpVsm5Mc2JYVjh
    2XYFBa33uQKvp/1HkaIiNFox0QIDAQABo4IBgTCCAX0wEgYDVR0TAQH/BAgwBgEB
    /wIBADBEBgNVHSAEPTA7MDkGC2CGSAGG+EUBBxcDMCowKAYIKwYBBQUHAgEWHGh0
    dHBzOi8vd3d3LnZlcmlzaWduLmNvbS9ycGEwMQYDVR0fBCowKDAmoCSgIoYgaHR0
    cDovL2NybC52ZXJpc2lnbi5jb20vcGNhMy5jcmwwDgYDVR0PAQH/BAQDAgEGMBEG
    CWCGSAGG+EIBAQQEAwIBBjApBgNVHREEIjAgpB4wHDEaMBgGA1UEAxMRQ2xhc3Mz
    Q0EyMDQ4LTEtNDUwHQYDVR0OBBYEFG/sr6DdiqTv9SoQZy0/VYK81+8lMIGABgNV
    HSMEeTB3oWOkYTBfMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIElu
    Yy4xNzA1BgNVBAsTLkNsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlv
    biBBdXRob3JpdHmCEHC65B0Q2Sk0tjjKewPMur8wDQYJKoZIhvcNAQEFBQADgYEA
    w34IRl2RNs9n3Nenr6+4IsOLBHTTsWC85v63RBKBWzFzFGNWxnIu0RoDQ1w4ClBK
    Tc3athmo9JkNr+P32PF1KGX2av6b9L1S2T/L2hbLpZ4ujmZSeD0m+v6UNohKlV4q
    TBnvbvqCPy0D79YoszcYz0KyNCFkR9MgazpM3OYDkAw=
    -----END CERTIFICATE-----
    chown ttasys:ttaserv int.crt
    edit /opt/tarantella/webserver/apache/1.3.36_mod_ssl-2.8.27_openssl-0.9.8d_jk1.2.15_u1/conf/httpd.conf
    add the following line
    SSLCertificateChainFile /opt/tarantella/var/tsp/int.crt
    Restart SGD using tarantella restart and webserver using tarantella webserver restart --ssl
    All should be well

  • AnyConnect SSL-client Certificate AND AAA RADIUS

    Hi All,
    I'm trying to setup Anyconnect VPN Phone feature. I have the license, and I have been able to get the phone to authenticate / register etc with a username / password.
    I want to use the cert on the phone, use the CN as the username and just verify that against my ACS server via RADIUS.... Easier said than done. The ASA is grabbing the Username, but for the life of me, i can't get it to send the username over to the RADIUS server. I have enabled all sorts of aaa and radius debugging and just get no output at all...
    Here are some relevant log messages I'm getting:
    Starting SSL handshake with client outside:72.91.xx.xx/42501 for TLSv1 session
    Certificate was successfully validated. serial number: 5C7DB8EB000000xxxxxx, subject name:  cn=CP-7942G-SEP002155551BD7,ou=EVVBU,o=Cisco Systems Inc..
    Certificate chain was successfully validated with warning, revocation status was not checked.
    Tunnel group search using certificate maps failed for peer certificate:  serial number: 5C7DB8EB000000xxxxxx, subject name:  cn=CP-7942G-SEP002155551BD7,ou=EVVBU,o=Cisco Systems Inc., issuer_name:  cn=Cisco Manufacturing CA,o=Cisco Systems.
    Device completed SSL handshake with client outside:72.91.xx.xx/42501
    Group SSLClientProfile: Authenticating ssl-client connection from  72.91.14.42 with username, CP-7942G-SEP002155551BD7, from client  certificate
    Teardown TCP connection 35754 for outside:72.91.xx.xx/42501 to  identity:173.227.xxx.xxx/443 duration 0:00:05 bytes 5473 TCP Reset by  appliance
    Relevant Config:
    tunnel-group SSLClientProfile type remote-access
    tunnel-group SSLClientProfile general-attributes
    authentication-server-group RADIUS
    default-group-policy GroupPolicy1
    tunnel-group SSLClientProfile webvpn-attributes
    authentication aaa certificate
    radius-reject-message
    pre-fill-username ssl-client
    group-alias SSLClientProfile enable
    group-url https://URL enable
    group-policy GroupPolicy1 internal
    group-policy GroupPolicy1 attributes
    wins-server none
    dns-server value <ip1> <ip2>
    vpn-tunnel-protocol ssl-client
    default-domain value xxxxxxxx
    address-pools value VPNPOOL
    aaa-server RADIUS protocol radius
    aaa-server RADIUS (inside) host 192.168.102.242
    key *****
    aaa-server RADIUS (inside) host 192.168.240.242
    key *****
    ASA version 8.4
    What am I doing wrong? It will not send the request to the AAA server, very much frustating me...

    PRogress....
    I changed the authentication to Certificate ONLY and set authorization to be RADIUS... now it's sending the request to my ACS server. Next question: What's the password that's being sent? Is it blank? I've tried the phone's whole username, tried the MAC and tried just the SEP part. No Dice. Thoughts?

  • I am trying to access a webpage but it keeps saying I need a client certificate. Even after I click 'continue', I still cannot access the webpage.

    I am trying to access a webpage but it keeps saying I need a client certificate. Even after I click 'continue', I still cannot access the webpage.

    https://etivity.sul.com.au/
    It's to access my work rosters.

  • From time to time, I can't verify the expiration of my client certificate on IIS.

    I have a IIS web server and a CA(AD CS) server built on a 2008R2 virtual machine.
    I require a client certificate in order to access the web server.
    It works very well but FROM TIME TO TIME, a 403 error code is returned.
    According to the trace log(FailedReqLogFiles), a 0x80092013 error occurs.
    Once this 403 error occurs, it last for about an hour and then everything goes back to normal.
    In order to find out what is the problem, I have done setup:
    - CRL has a publication time of 1 hour
    - (Delta CRL) has a publication time of 30minutes.
    also:
    - Both web server and CA server are not on a domain but a workgroup
    - The CA certificate is registered on the web server & client on the root & intermediate certificate registrar.
    - Both setups are patched to the latest windows update
    As far as I've checked the log:
    - on the web server log(source: CAPI2), there is an event id 53 at almost every hour for both the CRL & delta CRL
    but before the problem occurs the event id 53 is only reported on the delta CRL and nothing on the CRL.
    - By the way, System32\config\systemprofile\AppData\LocalLow\Microsoft\X509Objects, the .crl file for the problematic update is only present on the delta CRL.
    - On the CA server's IIS access log, there is just the delta CRL access that is registered.
    - Below is the log on the CA server IIS's access log (XXX-CA is for anonymous sake):
    2014-04-16 10:51:34 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1).crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 218
    2014-04-16 10:51:39 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1)+.crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 202
    2014-04-16 11:52:05 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1)+.crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 265
    2014-04-16 12:52:22 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1).crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 218
    2014-04-16 12:52:28 fe80::f99a:eb13:7c7b:1de4%10 GET /CertEnroll/XXX-CA(1)+.crl - 80 - fe80::7993:d27a:af9f:170%10 Microsoft-CryptoAPI/6.1 200 0 0 202
    - I think that the 403 error is due to the fact this CRL is not getting reached but why would this happen?
    - Is there an other way than to restart the OS in order to clear this problem in a shorter time than 1 hour?
    side note:
    - this problem happens on the client setup too.
    - the log is shorten but if there is any filter to apply to get better information, please tell me.
    I would appreciate any helps on this matter!
    nb:
    this is a translation from a Japanese text.

    Hi,
    The error message will occur if IIS cannot download CRLs of the client certificate, in other words, if the CA is shut down or there are network connectivity issues between web server and CA when Internet Information Services try
    to download the client certificate’s CRL.
    Therefore, please make sure that there is no network connectivity issue between the web server and CA, you can
    find the IP address of the problem CDP server then add an entry to the HOSTS file on the IIS computer.
    Here are some related KB articles below I suggest you refer to:
    IIS returns HTTP "403.13 Client Certificate Revoked" error message although certificate is not revoked
    http://support.microsoft.com/kb/294305/en-us
    You receive a "403.13 client certificate revoked" error message when you connect to a computer that is running Windows Server 2003 and Internet Information Services 6.0
    http://support.microsoft.com/kb/884115/en-us
    Best Regards,
    Amy

  • SSL Certificate Mismatch with AnyConnect client

    Hello,
    We are having a problem with the AnyConnect client when connecting to our VPN.  We are running the following:
    AnyConnect v2.4.0202
    (2 each) ASA v8.2(1) -- active/standby failover
    AnyConnect Essentials Licensing
    NOTE:  We are not using certificates for authentication.
    Primary clients:  Windows XP and Windows 7
    Problem
    We have purchased an Entrust certificate for our ASA failover cluster called "vpn.company.com" and the it is attached to the outside interface on the ASA.
    Steps to Reproduce
    Install the AnyConnect (AC) client via https://vpn.company.com/.  Connection occurs here without issue.
    Once the AC client is installed and we try to use it in stand-alone mode (i.e., w/o hitting the ASA w/ a browser), a certificate mismatch occurs, and AC brings up the Windows/IE Security Alert dialog (see attachment CertError.jpg).
    The user must press Yes to bypass mismatch.
    PROBLEM:  On Windows 7, the user must have administrative privileges and run the AC client as administrator -- otherwise, they get a dialog saying "Unable to establich VPN" (see attachment Unable.jpg).
    The issue is we have a valid certificate that should be used for the connection.  However, when looking at the connections made by the AC client with Fiddler, it would appear that the AC client is trying to connect directly to the ASA's IP address, and not the name.  This is a nuisance for XP users, and a show-stopper for Win7 users as they do not have admin privileges.
    I have not been able to find any documentation on Cisco.com relating to this issue.  In short, how do I get the AC client to use "vpn.company.com" so there is no Cert mismatch?
    Thanks,
    -Matt

    Tim,
    I will read through the article more thoroughly; I've already been through parts of it -- won't hurt to go through again.  I did initially have the IP address in my XML file, and immediately removed it when I noticed that it was using the IP address in the FIddler dump.  It hasn't had any effect unfortunately -- even with uninstalling and re-installing the AC client locally.
    The only other article/post I've come across on Cisco's site that comes close is here:
    Cisco Support Community: ASA VPN Load Balancing/Clustering with Digital Certificates Deployment Guide
    which seems to suggest that I will need a UCC certificate (which seems ridiculous) to do some of what I need to do.  However the issue with that post is that it still wouldn't fix the issue where the AC client is using the IP address.
    I will let you know if I find any smoking guns in the doco link you sent.  Any other thoughts appreciated.  I can't believe Cisco made the setup of the AC client this convoluted.
    Thanks!
    -Matt

  • AnyConnect and client certificate

    Hi,
    I was looking at 'BRKSEC-3033 - Advanced AnyConnect Deployment' on Ciscovirtuallive.
    On that session the presenter says that:
    "Issuer of client certificate may not be the same as the issuer of the ASA certificate."
    With my basic PKI understanding :-),  anyone know why you cant have the same certificate issuer? 
    It's a good presentation, can recommend it.
    BR
    Micke

    Hello Mikael,
    You DO can have the same certificate issuer!!
    I think he said it was an option to not have it with AnyConnect but as your PKI understanding  states you do can have it like that.
    Regards,
    Julio
    Do rate all the helpful posts

  • AnyConnect error " User not authorized for AnyConnect Client access, contact your administrator"

    Hi everyone,
    it's probably just me but I have tried real hard to get a simple AnyConnect setup working in a lab environment on my ASA 5505 at home, without luck. When I connect with the AnyConnect client I get the error message "User not authorized for AnyConnect Client access, contact your administrator". I have searched for this error and tried some of the few solutions out there, but to no avail. I also updated the ASA from 8.4.4(1) to 9.1(1) and ASDM from 6.4(9) to 7.1(1) but still the same problem. The setup of the ASA is straight forward, directly connected to the Internet with a 10.0.1.0 / 24 subnet on the inside and an address pool of 10.0.2.0 / 24 to assign to the VPN clients. Please note that due to ISP restrictions, I'm using port 44455 instead of 443. I had AnyConnect working with the SSL portal, but IKEv2 IPsec is giving me a headache. I have stripped down certificate authentication which I had running before just to eliminate this as a potential cause of the issue. When running debugging, I do not get any error messages - the handshake completes successfully and the local authentication works fine as well.
    Please find the current config and debugging output below. I appreciate any pointers as to what might be wrong here.
    : Saved
    ASA Version 9.1(1)
    hostname ASA
    domain-name ingo.local
    enable password ... encrypted
    xlate per-session deny tcp any4 any4
    xlate per-session deny tcp any4 any6
    xlate per-session deny tcp any6 any4
    xlate per-session deny tcp any6 any6
    xlate per-session deny udp any4 any4 eq domain
    xlate per-session deny udp any4 any6 eq domain
    xlate per-session deny udp any6 any4 eq domain
    xlate per-session deny udp any6 any6 eq domain
    passwd ... encrypted
    names
    name 10.0.1.0 LAN-10-0-1-x
    dns-guard
    ip local pool VPNPool 10.0.2.1-10.0.2.10 mask 255.255.255.0
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    interface Vlan1
    nameif Internal
    security-level 100
    ip address 10.0.1.254 255.255.255.0
    interface Vlan2
    nameif External
    security-level 0
    ip address dhcp setroute
    regex BlockFacebook "facebook.com"
    banner login This is a monitored system. Unauthorized access is prohibited.
    boot system disk0:/asa911-k8.bin
    ftp mode passive
    clock timezone PST -8
    clock summer-time PDT recurring
    dns domain-lookup Internal
    dns domain-lookup External
    dns server-group DefaultDNS
    name-server 10.0.1.11
    name-server 75.153.176.1
    name-server 75.153.176.9
    domain-name ingo.local
    object network obj_any
    subnet 0.0.0.0 0.0.0.0
    object network LAN-10-0-1-x
    subnet 10.0.1.0 255.255.255.0
    object network Company-IP1
    host xxx.xxx.xxx.xxx
    object network Company-IP2
    host xxx.xxx.xxx.xxx
    object network HYPER-V-DUAL-IP
    range 10.0.1.1 10.0.1.2
    object network LAN-10-0-1-X
    access-list 100 extended permit tcp any4 object HYPER-V-DUAL-IP eq 3389 inactive
    access-list 100 extended permit tcp object Company-IP1 object HYPER-V-DUAL-IP eq 3389
    access-list 100 extended permit tcp object Company-IP2 object HYPER-V-DUAL-IP eq 3389 
    tcp-map Normalizer
      check-retransmission
      checksum-verification
    no pager
    logging enable
    logging timestamp
    logging list Threats message 106023
    logging list Threats message 106100
    logging list Threats message 106015
    logging list Threats message 106021
    logging list Threats message 401004
    logging buffered errors
    logging trap Threats
    logging asdm debugging
    logging device-id hostname
    logging host Internal 10.0.1.11 format emblem
    logging ftp-bufferwrap
    logging ftp-server 10.0.1.11 / asa *****
    logging permit-hostdown
    mtu Internal 1500
    mtu External 1500
    ip verify reverse-path interface Internal
    ip verify reverse-path interface External
    icmp unreachable rate-limit 1 burst-size 1
    icmp deny any echo External
    asdm image disk0:/asdm-711.bin
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    object network obj_any
    nat (Internal,External) dynamic interface
    object network LAN-10-0-1-x
    nat (Internal,External) dynamic interface
    object network HYPER-V-DUAL-IP
    nat (Internal,External) static interface service tcp 3389 3389
    access-group 100 in interface External
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server radius protocol radius
    aaa-server radius (Internal) host 10.0.1.11
    key *****
    radius-common-pw *****
    user-identity default-domain LOCAL
    aaa authentication ssh console radius LOCAL
    http server enable
    http LAN-10-0-1-x 255.255.255.0 Internal
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec ikev2 ipsec-proposal DES
    protocol esp encryption des
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
    protocol esp encryption 3des
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
    protocol esp encryption aes
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
    protocol esp encryption aes-192
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES256
    protocol esp encryption aes-256
    protocol esp integrity sha-1 md5
    crypto ipsec security-association pmtu-aging infinite
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
    crypto map External_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map External_map interface External
    crypto ca trustpoint srv01_trustpoint
    enrollment terminal
    crl configure
    crypto ca trustpoint asa_cert_trustpoint
    keypair asa_cert_trustpoint
    crl configure
    crypto ca trustpoint LOCAL-CA-SERVER
    keypair LOCAL-CA-SERVER
    crl configure
    crypto ca trustpool policy
    crypto ca server
    cdp-url http://.../+CSCOCA+/asa_ca.crl:44435
    issuer-name CN=...
    database path disk0:/LOCAL_CA_SERVER/
    smtp from-address ...
    publish-crl External 44436
    crypto ca certificate chain srv01_trustpoint
    certificate <output omitted>
      quit
    crypto ca certificate chain asa_cert_trustpoint
    certificate <output omitted>
      quit
    crypto ca certificate chain LOCAL-CA-SERVER
    certificate <output omitted>
      quit
    crypto ikev2 policy 1
    encryption aes-256
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 10
    encryption aes-192
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 20
    encryption aes
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 30
    encryption 3des
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 40
    encryption des
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 enable External client-services port 44455
    crypto ikev2 remote-access trustpoint asa_cert_trustpoint
    telnet timeout 5
    ssh LAN-10-0-1-x 255.255.255.0 Internal
    ssh xxx.xxx.xxx.xxx 255.255.255.255 External
    ssh xxx.xxx.xxx.xxx 255.255.255.255 External
    ssh timeout 5
    ssh version 2
    console timeout 0
    no vpn-addr-assign aaa
    no ipv6-vpn-addr-assign aaa
    no ipv6-vpn-addr-assign local
    dhcpd dns 75.153.176.9 75.153.176.1
    dhcpd domain ingo.local
    dhcpd option 3 ip 10.0.1.254
    dhcpd address 10.0.1.50-10.0.1.81 Internal
    dhcpd enable Internal
    threat-detection basic-threat
    threat-detection scanning-threat shun except ip-address LAN-10-0-1-x 255.255.255.0
    threat-detection statistics access-list
    threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
    dynamic-filter use-database
    dynamic-filter enable interface Internal
    dynamic-filter enable interface External
    dynamic-filter drop blacklist interface Internal
    dynamic-filter drop blacklist interface External
    ntp server 128.233.3.101 source External
    ntp server 128.233.3.100 source External prefer
    ntp server 204.152.184.72 source External
    ntp server 192.6.38.127 source External
    ssl encryption aes256-sha1 aes128-sha1 3des-sha1
    ssl trust-point asa_cert_trustpoint External
    webvpn
    port 44433
    enable External
    dtls port 44433
    anyconnect image disk0:/anyconnect-win-3.1.02026-k9.pkg 1
    anyconnect profiles profile1 disk0:/profile1.xml
    anyconnect enable
    smart-tunnel list SmartTunnelList1 mstsc mstsc.exe platform windows
    smart-tunnel list SmartTunnelList1 putty putty.exe platform windows
    group-policy DfltGrpPolicy attributes
    vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless
    webvpn
      anyconnect profiles value profile1 type user
    username write.ingo password ... encrypted
    username ingo password ... encrypted privilege 15
    username tom.tucker password ... encrypted
    class-map TCP
    match port tcp range 1 65535
    class-map type regex match-any BlockFacebook
    match regex BlockFacebook
    class-map type inspect http match-all BlockDomains
    match request header host regex class BlockFacebook
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum client auto
      message-length maximum 1500
      id-randomization
    policy-map TCP
    class TCP
      set connection conn-max 1000 embryonic-conn-max 1000 per-client-max 250 per-client-embryonic-max 250
      set connection timeout dcd
      set connection advanced-options Normalizer
      set connection decrement-ttl
    policy-map type inspect http HTTP
    parameters
      protocol-violation action drop-connection log
    class BlockDomains
    policy-map global_policy
    class inspection_default
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny 
      inspect sunrpc
      inspect xdmcp
      inspect sip 
      inspect netbios
      inspect tftp
      inspect ip-options
      inspect dns preset_dns_map dynamic-filter-snoop
      inspect http HTTP
    service-policy global_policy global
    service-policy TCP interface External
    smtp-server 199.185.220.249
    privilege cmd level 3 mode exec command perfmon
    privilege cmd level 3 mode exec command ping
    privilege cmd level 3 mode exec command who
    privilege cmd level 3 mode exec command logging
    privilege cmd level 3 mode exec command failover
    privilege cmd level 3 mode exec command vpn-sessiondb
    privilege cmd level 3 mode exec command packet-tracer
    privilege show level 5 mode exec command import
    privilege show level 5 mode exec command running-config
    privilege show level 3 mode exec command reload
    privilege show level 3 mode exec command mode
    privilege show level 3 mode exec command firewall
    privilege show level 3 mode exec command asp
    privilege show level 3 mode exec command cpu
    privilege show level 3 mode exec command interface
    privilege show level 3 mode exec command clock
    privilege show level 3 mode exec command dns-hosts
    privilege show level 3 mode exec command access-list
    privilege show level 3 mode exec command logging
    privilege show level 3 mode exec command vlan
    privilege show level 3 mode exec command ip
    privilege show level 3 mode exec command failover
    privilege show level 3 mode exec command asdm
    privilege show level 3 mode exec command arp
    privilege show level 3 mode exec command ipv6
    privilege show level 3 mode exec command route
    privilege show level 3 mode exec command ospf
    privilege show level 3 mode exec command aaa-server
    privilege show level 3 mode exec command aaa
    privilege show level 3 mode exec command eigrp
    privilege show level 3 mode exec command crypto
    privilege show level 3 mode exec command ssh
    privilege show level 3 mode exec command vpn-sessiondb
    privilege show level 3 mode exec command vpnclient
    privilege show level 3 mode exec command vpn
    privilege show level 3 mode exec command dhcpd
    privilege show level 3 mode exec command blocks
    privilege show level 3 mode exec command wccp
    privilege show level 3 mode exec command dynamic-filter
    privilege show level 3 mode exec command webvpn
    privilege show level 3 mode exec command service-policy
    privilege show level 3 mode exec command module
    privilege show level 3 mode exec command uauth
    privilege show level 3 mode exec command compression
    privilege show level 3 mode configure command interface
    privilege show level 3 mode configure command clock
    privilege show level 3 mode configure command access-list
    privilege show level 3 mode configure command logging
    privilege show level 3 mode configure command ip
    privilege show level 3 mode configure command failover
    privilege show level 5 mode configure command asdm
    privilege show level 3 mode configure command arp
    privilege show level 3 mode configure command route
    privilege show level 3 mode configure command aaa-server
    privilege show level 3 mode configure command aaa
    privilege show level 3 mode configure command crypto
    privilege show level 3 mode configure command ssh
    privilege show level 3 mode configure command dhcpd
    privilege show level 5 mode configure command privilege
    privilege clear level 3 mode exec command dns-hosts
    privilege clear level 3 mode exec command logging
    privilege clear level 3 mode exec command arp
    privilege clear level 3 mode exec command aaa-server
    privilege clear level 3 mode exec command crypto
    privilege clear level 3 mode exec command dynamic-filter
    privilege cmd level 3 mode configure command failover
    privilege clear level 3 mode configure command logging
    privilege clear level 3 mode configure command arp
    privilege clear level 3 mode configure command crypto
    privilege clear level 3 mode configure command aaa-server
    prompt hostname context
    no call-home reporting anonymous
    call-home
    profile CiscoTAC-1
      no active
      destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
      destination address email [email protected]
      destination transport-method http
      subscribe-to-alert-group diagnostic
      subscribe-to-alert-group environment
      subscribe-to-alert-group inventory periodic monthly
      subscribe-to-alert-group configuration periodic monthly
      subscribe-to-alert-group telemetry periodic daily
    Cryptochecksum:41a021a28f73c647a2f550ba932bed1a
    : end
    Many thanks,
    Ingo

    Hi Jose,
    here is what I got now:
    ASA(config)# sh run | begin tunnel-group
    tunnel-group DefaultWEBVPNGroup general-attributes
    address-pool VPNPool
    authorization-required
    and DAP debugging still the same:
    ASA(config)# DAP_TRACE: DAP_open: CDC45080
    DAP_TRACE: Username: tom.tucker, aaa.cisco.grouppolicy = DfltGrpPolicy
    DAP_TRACE: Username: tom.tucker, aaa.cisco.username = tom.tucker
    DAP_TRACE: Username: tom.tucker, aaa.cisco.username1 = tom.tucker
    DAP_TRACE: Username: tom.tucker, aaa.cisco.username2 =
    DAP_TRACE: Username: tom.tucker, aaa.cisco.tunnelgroup = DefaultWEBVPNGroup
    DAP_TRACE: Username: tom.tucker, DAP_add_SCEP: scep required = [FALSE]
    DAP_TRACE: Username: tom.tucker, DAP_add_AC:
    endpoint.anyconnect.clientversion="3.1.02026";
    endpoint.anyconnect.platform="win";
    DAP_TRACE: Username: tom.tucker, dap_aggregate_attr: rec_count = 1
    DAP_TRACE: Username: tom.tucker, Selected DAPs: DfltAccessPolicy
    DAP_TRACE: Username: tom.tucker, DAP_close: CDC45080
    Unfortunately, it still doesn't work. Hmmm.. maybe a wipe of the config and starting from scratch can help?
    Thanks,
    Ingo

  • Anyconnect Client profile files deleted after client upgrade

    L.S.
    I am running anyconnect version 3.1.02040 on a Windows 7 64-bit machine with UAC turned on.
    The ASA I am connecting to is a 5510 running ASA OS 8.4.5
    The problem I have is the following:
    We are using machine certificate authentication combined with RADIUS user authentication.
    The machine certificates are stored in the Machine/Personal container in the local machine.
    By default, the anyconnect client does not have the rights to access this certificate store when run by the user in non-elevated mode.
    We do not want to have the user run the client as administrator (in elevated mode) all the time.
    Therefor we have made an Anyconnect Client profile that sets the Certificate Store Override parameter to true and attached it to the group policy.
    With this XML in place (in the C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Profile folder)
    the users can connect to the ASA and authenticate using the certificate without the need for elevated rights. This is all working perfectly.
    The anyconnect client and XML file are distributed to the clients using a software distribution system (Microsoft SCCM).
    The problem happens when I update the Anyconnect package on the ASA. I recently updated the package to release 3.1.03103. This is what happens:
    The user can connect using the 3.1.02040 client (certicate authentication works without elevation, since the XML Anyconnect Client Profile is present)
    The Anyconnect software updates itself to the new version during the connection, pushed from the ASA.
    The VPN is established.
    However, the XML file that is associated with the group policy is deleted during the upgrade process and not placed back in the Profile folder on the client after the upgrade.
    This means the user cannot connect without using elevated rights the next time he wants to connect.
    If he uses elevated rights after the upgrade, the XML is pushed back from the ASA normally, allowing the user to connect without elevation again any subsequent times.
    Is there any way to push the XML profile to the client from the ASA after the upgrade of the Anyconnect software?

    Hi poiu720408 ,
    1.  You need to set up a web-url or group-alias under the group policy as web have enable the "tunnel-group-list enable" under the webvpn configuration.  So once the user connect to the proper URL/alias the profile will be applied. 
    http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/98580-enable-group-dropdown.html
    2. Yes the Anycopnnect store a "Cache " information on the PC , if you want to clan up you have to go to the anyconnect folder on C: on the PC and delete the global_preferences.xml profile.
    3. This behavior is totally expected and they should disappear  after a some minutes , however if you wan to force this , you can use the command "vpn-sessionsdb logoff webvpn noconfirm"
    Please rate helpful post !
    Hope this helps
    - Randy -

  • Router WebVPN and client certificate

    Hello!
    In my test lab I can't to make work my webvpn configuration =\
    I have several components: MS AD, MS CS (but without NDES), router 2911 and client computer. Client and router have a certificate from MS CS. In my configuration I use authentication by certificate or aaa (LDAP) and authentication by aaa working good. But authentication by client certificate doesn't work. And my internal https services don't work also -  "Invalid or no certificate", but this strange because I imported CA certificate for this.
    Can you help me make it works?
    My 2911 version:
    Cisco IOS Software, C2900 Software (C2900-UNIVERSALK9-M), Version 15.1(3)T, RELEASE SOFTWARE (fc1)
    My Config:
    aaa authentication login webvpn group ldap local
    ip local pool webvpn 192.168.200.1 192.168.200.254
    bind authenticate root-dn cn=webvpn,ou=staff,dc=domain,dc=com password P@ssw0rd
    webvpn gateway vpn
    ip address <ip address> port 4443
    ssl trustpoint root-ca
    inservice
    webvpn install svc flash0:/webvpn/anyconnect-dart-win-2.5.3055-k9.pkg sequence 1
    webvpn context employee
    ssl authenticate verify all
    login-message "VPN Portal"
    policy group policy1
       url-list "inside"
       functions svc-enabled
       filter tunnel VPN-SPLIT
       svc address-pool "webvpn" netmask 255.255.255.0
       svc default-domain "domain.com"
       svc keep-client-installed
       svc split dns "domain.com"
       svc split include 192.168.0.0 255.255.0.0
       svc dns-server primary 192.168.1.1
       svc dns-server secondary 192.168.1.2
       citrix enabled
    virtual-template 1
    default-group-policy policy1
    aaa authentication list webvpn
    gateway vpn
    authentication certificate
    username-prefill
    ca trustpoint root-ca
    user-profile location flash0:/userprof
    inservice
    crypto pki trustpoint root-ca
    enrollment terminal
    revocation-check none
    rsakeypair root-ca
    I imported certificate from pkcs12 with CA certificate.
    From my debug (this is happend then i try to access to my webvpn portal and I choose my certificate from MS CS for access)
    Jun  5 11:22:39: WV: validated_tp :  cert_username :  matched_ctx :
    Jun  5 11:22:39: WV: failed to get sslvpn appinfo from opssl
    Jun  5 11:22:39: WV: failed to get sslvpn appinfo from opssl
    Jun  5 11:22:39: WV: Error: No certificate validated for the client
    Can anybody explain me why it doesn't work?

    Hi,
    did you find any solution for this? As I am in it seems the same situation now.
    I am testing it with Cisco 2911 - IOS version 151-3.T4 and last anyconnect client for Android (Samsung Galaxy S III mobile)
    Thanx for any advice/help
    Pavel

  • Anyconnect client has persistent settings after uninstall

    Usually I am able to type into the address field in anyconnect client and change to another customer (we are a partner that support many people).
    For some reason my anyconnect client has "infranet-cm0" and "infranet-cups" (our call manager and presence servers) in the connect to field and you cannot type in that field. It makes no sense.. these must just be certificates on my system or something.
    I've uninstalled the client many times and launched from web the customer i'm trying to connect to - download the new client, but it always comes back up with those two options to connect. I'm attaching a screenshot.
    How do I get rid of these options and allow me to always be able to type in the address?

    Did you try to remove the profile?
    Paths to Deploy the Client
    OS Directory Path
    Windows 7 and Vista
    C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\Profile\
    Windows XP
    C:\Document and Settings\All Users\Application Data\Cisco\Cisco AnyConnect Secure Mobility Client\Profile
    Mac OS X and Linux
    /opt/cisco/anyconnect/profile/
    http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect31/administration/guide/ac02asaconfig.html#wp1595490

Maybe you are looking for

  • XSL Transformation Design View

    Hello together, we find an issue with design view of xsl transformation. When we use the design view serveral configurations and mappings where edited and deleted. For example <xsl:stylesheet version="2.0" change to version="1.0" and the call of EBMH

  • [9i] poor performance with XMLType.transform

    Hello, I've got a problem with the Oracle function XMLType.transform. When I try to apply a XSL to a big XML, it is very very slow, and it evens consumes all the CPU, and other users are not able to work until the processing is complete... So I was w

  • Word 2003 Runtimeerror 5

    If Robohelp try to start Word 2003 the word vba runtime error 5 occur. After that robohelp blow away. I have installed robohelp with admin rights. Robohelp HTML works fine

  • Document date in MRKO

    Hello All, Does anybody know how to change the document and posting date in MRKO transaction? I would like to be able to post using different dates. Is it possible? How? Thanks, Michel Khouri

  • Los all emails in all inboxes

    I connected my iphone 3GS to my macbook last night. I started syncing and I went to bed. I got up this morning and the only content in my inboxes was what came in over night. My inboxes were fine before the sync. I have checked on my three accounts v