L2l with certificates between 2 ASAs

Hi all

I want to set up a VPN L2L/Site-to-site tunnel, which authenticates by using certificates.

In fact I am following this guide-> http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080aa5be1.shtml

I configured the tunnel group on both ends, with the trustpoint configured, authenticated and accepted specified.

I correspondent isakmp policies at both ends, and of course my cryptographic cards contains 3 identical lines - set peer match access-list and transformation-a set cryptomap. Next to those, there are 2 identical lines for life. I haven't specified the trustpoint in encryption card while it is not indicated in the top link (guide) to do, even if I tried, without different result. Debugs him happens exactly the same each time:

Debug the cry isa 10: (on the remote end)

TEST-ASA-RA # debug cry isa 10

TEST-ASA-RA # Jul 07 11:36:18 [IKEv1]: IP = 80.62.240.136, IKE_DECODE RECEIPT Message (msgid = 0) with payloads: HDR + SA (1) the SELLER (13) + the SELLER (13) + the SELLER (13), SELLER (13) + (0) NONE total length: 208

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, SA payload processing

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, Oakley proposal is acceptable

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, received NAT-Traversal worm 02 VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, worm received 03 NAT-Traversal, VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, received NAT - Traversal RFC VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, received Fragmentation VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, IKE Peer included IKE fragmentation capability flags: Main Mode: real aggressive Mode: true

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, IKE SA payload processing

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, IKE SA proposal # 1, turn # 1 entry IKE acceptable Matches # 3 overall

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, build the payloads of ISAKMP security

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, construction of Fragmentation VID + load useful functionality

Jul 07 11:36:18 [IKEv1]: IP = 80.62.240.136, IKE_DECODE SEND Message (msgid = 0) with payloads: HDR + HER (1), SELLER (13) + (0) NONE total length: 108

Jul 07 11:36:18 [IKEv1]: IP = 80.62.240.136, IKE_DECODE RECEIPT Message (msgid = 0) with payloads: HDR + KE (4) NUNCIO (10) + CERT_REQ (7) + CERT_REQ (7) seller (13) + the seller (13) + the seller (13) + the seller (13) + (0) NONE total length: 374

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, processing ke payload

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing ISA_KE

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, nonce payload processing

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, treatment certificate request payload

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, treatment certificate request payload

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, the customer has received Cisco Unity VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, received xauth V6 VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, treatment VPN3000 / ASA payload IOS Vendor ID theft (version: 1.0.0 capabilities: 20000001)

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, received Altiga/Cisco VPN3000/Cisco ASA GW VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, building ke payload

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, building nonce payload

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, building certreq payload

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, build payloads of Cisco Unity VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, constructing payload V6 VID xauth

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, Send IOS VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, ASA usurpation IOS Vendor ID payload construction (version: 1.0.0 capabilities: 20000001)

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, build payloads VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, Send Altiga/Cisco VPN3000/Cisco ASA GW VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, Generating keys for answering machine...

Jul 07 11:36:18 [IKEv1]: IP = 80.62.240.136, IKE_DECODE SEND Message (msgid = 0) with payloads: HDR + KE (4) NUNCIO (10) + CERT_REQ (7) seller (13) + the seller (13) + the seller (13) + the seller (13) + (0) NONE total length: 298

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, RRs would fragment a new set of fragmentation. Removal of fragments of old.

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, assembled with success an encrypted pkt of RRs would be fragments!

Jul 07 11:36:18 [IKEv1]: IP = 80.62.240.136, IKE_DECODE RECEIPT Message (msgid = 0) with payloads: HDR + ID (5) + GIS (9) + IOS KEEPALIVE (128) + CERT (6), SELLER (13) + (0) NONE total length: 1987

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing ID

Jul 07 11:36:18 [IKEv1 DECODER]: IP = 80.62.240.136, ID_IPV4_ADDR received ID

80.62.240.136

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing cert

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, treatment of RSA signature

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, calculation of hash for ISAKMP

Jul 07 11:36:18 [IKEv1 DECODER]: Dump of Signature received, len 256:

0000: 8D97FE83 CDA9CEB2 A5D7F63F 0FAA76A4...? ... c.

0010: 21F229A8 2A714C2D 12F16ABF 08E44664!.). *... qL j... FD

0020: 0D95A510 0AFFA63B 815CCBB0 B7C708CF...; \......

0030: 31246316 0E93E084 59395461 118C 9251 $1 c... Y9Ta... Q

0040: 823A36CB 55F2F59C 3342326D 251F8B7A. : 6.U... 3B2m %... z

0050: B9C9F916 C403A4D1 59DA3AA8 932312C 0... Y.:.. #..

0060: 88476460 E9C9A07C 5671C18D A9202382. GD'... | DV... #.

0070: 441F47AF 74E407B1 DB06B929 406E993D D.G.t...) @n. =

0080: A7C149FA 1677D1A2 E3105356 4E205E45... I have... w... SVN ^ E

0090: 06D2CB2A B6BF638E 0910283C 7FF6BAE2... *... c... (<>

00 to 0: 3F97ADF5 19B 78872 69C0346B 7EF89FAE?... ri.4k... ~

00B 0: 456E26CF 52CC296B 11F6AE68 2498024C en &. R) k...h$... L

00C 0: 74658112 you 16121A 68 h

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, IOS treatment keep alive payload: proposal = 32767/32767 sec.

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, payload processing VID

Jul 07 11:36:18 [IKEv1 DEBUG]: IP = 80.62.240.136, DPD received VID

Jul 07 11:36:18 [IKEv1]: IP = 80.62.240.136, trying to find the group via IKE ID...

Jul 07 11:36:18 [IKEv1]: IP = 80.62.240.136, connection landed on tunnel_group 80.62.240.136

Jul 07 11:36:18 [IKEv1 DEBUG]: Group = 80.62.240.136, IP = 80.62.240.136, ID type homologous 1 received (IPV4_ADDR)

Jul 07 11:36:18 [IKEv1]: Group = 80.62.240.136, IP = 80.62.240.136, identity of IKE for peer name incompatibility Cert subject Alt

Jul 07 11:36:18 [IKEv1 DEBUG]: Group = 80.62.240.136, IP = 80.62.240.136, case of mistaken IKE MM Responder WSF (struct & 0xd3dcecf0) , : MM_DONE, EV_ERROR--> EV_COMPARE_IDS--> MM_BLD_MSG6, MM_BLD_MSG6, NullEvent--> MM_BLD_MSG6, EV_VALIDATE_CERT--> MM_BLD_MSG6, EV_UPDATE_CERT--> MM_BLD_MSG6, EV_TEST_CERT--> MM_BLD_MSG6, EV_CHECK_NAT_T, EV_CERT_OK--> MM_BLD_MSG6

Jul 07 11:36:18 [IKEv1 DEBUG]: Group = 80.62.240.136, IP = 80.62.240.136, IKE SA MM:1e531705 ending: 0x0100c002, refcnt flags 0, tuncnt 0

Jul 07 11:36:18 [IKEv1 DEBUG]: Group = 80.62.240.136, IP = 80.62.240.136, sending clear/delete with the message of reason

Jul 07 11:36:18 [IKEv1 DEBUG]: Group = 80.62.240.136, IP = 80.62.240.136, payload of empty hash construction

Jul 07 11:36:18 [IKEv1 DEBUG]: Group = 80.62.240.136, IP = 80.62.240.136, constructing the payload to delete IKE

Jul 07 11:36:18 [IKEv1 DEBUG]: Group = 80.62.240.136, IP = 80.62.240.136, build payloads of hash qm

Jul 07 11:36:18 [IKEv1]: IP = 80.62.240.136, IKE_DECODE SEND Message (msgid = 5a228b67) with payloads: HDR HASH (8) + DELETE (12) + (0) NONE total length: 80

Jul 07 11:36:18 [IKEv1]: Group = 80.62.240.136, IP = 80.62.240.136, Removing peer to peer table does not, no match!

Jul 07 11:36:18 [IKEv1]: Group = 80.62.240.136, IP = 80.62.240.136, error: cannot delete PeerTblEntry

Jul 07 11:36:26 [IKEv1]: IP = 80.62.240.136, invalid header, lack of payload SA! (next payload = 132)

Jul 07 11:36:26 [IKEv1]: IKE_DECODE SEND Message (msgid = 0) with payloads: HDR + NOTIFY (11) + NONE (0) overall length: 68

Jul 07 11:36:26 [IKEv1]: IP = 80.62.240.136, invalid header, lack of payload SA! (next payload = 132)

Jul 07 11:36:26 [IKEv1]: IKE_DECODE SEND Message (msgid = 0) with payloads: HDR + NOTIFY (11) + NONE (0) overall length: 68

Jul 07 11:36:26 [IKEv1]: IP = 80.62.240.136, invalid header, lack of payload SA! (next payload = 132)

Jul 07 11:36:26 [IKEv1]: IKE_DECODE SEND Message (msgid = 0) with payloads: HDR + NOTIFY (11) + NONE (0) overall length: 68

Then, it waits a bit and start over. No matter if I am trying to establish the tunnel network or remote endpoint - there is no difference in the result.

I made a line of debug output "BOLD" - I don't the have not seen this before, don't think that devices Cisco used this alternative area? Thought it was Microsoft?

1 thing is a reference to the certificates - I use my won Microsoft PKI based on 2003 servers. I have 1 Root CA and 2 subordinates. The root CA is stopped. During the construction of my trustpoints, I start to do my request, give it to one of subordinates, gets my identity certificate and save it on my computer. Then check the chain, which looks always good - RootCA-> SubordinateCA-> ClientCert. Then I extracted the subordinate cert, to authenticate my trustpoint and finally I import the certificate of identity. No complaints, it of all good - and actually working like a charm for my EZVPN configurations.

So I do not think the problem it's with the certificates, although the release said that there is an incompatibility with the other name in question.

The debugging online after this statement, I understand not quite - maybe someone can help me with this? Because right after this line, he begins to destroy the tunnel.

I can provide from configs if necessary, but really, it corresponds to the configuration contained in the guide.

/ Peter

Can you check the "crypto isakmp identity" command on both sides?  He looks like a side sends the IP, when it expected the certificate DN is the name so it can match the value in the cert.

Jul 07 11:36:18 [IKEv1 DEBUG]: Group = 80.62.240.136, IP = 80.62.240.136, ID type homologous 1 received (IPV4_ADDR)

Jul 07 11:36:18 [IKEv1]: Group = 80.62.240.136, IP = 80.62.240.136, identity of IKE for peer name incompatibility Cert subject Alt

-Jason

Tags: Cisco Security

Similar Questions

  • L2l between an ASA 5505 and WatchGuard XTM330 with dynamic IP

    Hi guys,.

    I looked for a solution on this one but can't find inappropriate, most of the discussions were old and with dead links to the solution.

    We have an ASA 5505 with static IP address on the outside and a customer who have a WatchGuard XTM330 with dynamic IP address to the outside.

    Is it possible to have an L2L VPN between our ASA and the WatchGuard when he has a dynamic IP?

    I have no experience on the series of WatchGuard,

    so, I am very grateful for any answer!

    Thanks in advance and have a nice day

    BR

    Robin

    Hi Robin,

    Here are the links you can make reference when configuring static to the dynamic VPN tunnel: -.
    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-next-generation-firewalls/112075-dynamic-IPSec-ASA-router-CCP.html

    This one is with Pix on the remote side, but the configuration will remain the same on the local side: -.
    http://www.WatchGuard.com/docs/4-6-Firebox-CiscoPix.PDF

    Kind regards
    Dinesh Moudgil

    PS Please rate helpful messages.

  • Problem with Tunnel VPN L2L between 2 ASA´s

    Hi guys,.

    I have some problems with my VPN Site to site tunnel between 2 ASA (5520/5505).

    I watched a lot of videos on youtube, but I can't find out why the tunnel does not...

    Both devices can ping eachothers WAN IP address (outside interfaces), but I don't see any traffic between the 2 sites. It seems that the tunnel is not open to everyone. When i PING from the local to the Remote LAN (which should be an interesting traffic for the tunnel...), the its IKEv1 remains empty...

    Am I missing something? I can't understand it more why same phase 1 is not engaged.

    You NAT won't. In your config file traffic is NATted initially and then does not match any more crypto ACL. You must move the rule dynamic NAT/PAT until the end of the table on two ASAs NAT:

     no nat (INSIDE,OUTSIDE) source dynamic any interface nat (INSIDE,OUTSIDE) after-auto source dynamic any interface

  • IPSec Tunnel permanent between two ASA

    Hello

    I configured a VPN IPSec tunnel between two ASA 5505 firewall. I want to assure you as the IPSec tunnel (this is why the security association) is permanent and do not drop due to the idle state.

    What should I do?

    Thanks for any help

    Yves

    Disables keepalive IKE processing, which is enabled by default.

    (config) #tunnel - 10.165.205.222 group ipsec-attributes

    KeepAlive (ipsec-tunnel-config) #isakmp disable

    Set a maximum time for VPN connections with the command of vpn-session-timeout in group policy configuration mode or username configuration mode:

    attributes of hostname (config) #-Group Policy DfltGrpPolicy
    hostname (Group Policy-config) #vpn - idle - timeout no

    attributes of hostname (config) #-Group Policy DfltGrpPolicy
    hostname (Group Policy-config) #vpn - session - timeout no

    Thank you

    Ajay

  • AnyConnect with certificate and without MS Certificate Server

    Hello community.

    Is it possible to use anyconnect with certificate, but without a MS. Certificate Server
    I think a certificate installed on the asa and the certificate installed on the laptop or mobile client-side. If the certificate of the client is able to connect.
    I heard that if you use the certificate for anyconnect that the asa do not ask for login credentials, the anyconnect can be connected without credentials. I don't like this behavior.
    Is it possible to use the certificate and the asa is still to ask credentials?

    Thanks in advance

    Sent by Cisco Support technique iPhone App

    Yes to both:
    -3rd party CA to issue certificates for the ASA and customers
    -You can use the authentication of the hybrid to use certificates and passwords (one-time or static)

    Sent by Cisco Support technique Android app

  • VPN failover between the ASA

    I do a search in the search of the best solution for switching between two ASA and hoped that someone wants to point me in the right direction.

    The situation is this, we got:

    -Head Office 2:

    Each is equipped with an ASA 5505

    -10 branches

    Each is equipped with a 887 integrated services router.

    Each is BranchOffice must have a redundant VPN connection at the headquarters of these two, and they all need to use the first person as main and the other in high school. In case of failure, all branches need to use the second connection VPN going the second seat.

    In my research, I'm looking for the best possible solution, with faster failover, but have no idea where to start my research.

    I hope someone has a good answer for this one.

    Thank you very much in advance,

    Kind regards

    Dwayne

    I do not understand why people continue to use ASA devices for VPN endpoint.  the ASA is NOT designed for complex VPN scenarios.  It is designed for simple scenarios.  In terms of VPN by using comparison, ASA is a person with a basic education while Cisco IOS is like a person with a college degree.

    For the scenario, you will be much better using Cisco IOS routers everywhere, where you can implement the GRE/IPSec or DMVPN.  Both cases will be sastify to your needs.

  • Lost Windows XP product key operating system but still have box with certificate and XP CD years ago. How can I recover my product key?

    Lost XP product but key BONES who still box with certificate and XP CD years ago. How can I recover my product key? Thank you

    Here are some utilities, which will display your product keys:

    Belarc Advisor: http://www.belarc.com/free_download.html
    (He did a good job of providing a wealth of information.
    However may not detect a key to office, then try one of the other two below)

    Also: http://www.magicaljellybean.com/keyfinder.shtml
    and: http://www.nirsoft.net/utils/product_cd_key_viewer.html

    J W Stuart: http://www.pagestart.com

  • ISE with certificate - without AD

    Hello

    We would like to implement the following:

    Corporate (non-private) Tablet and mobile devices (Ipad, Android) can connect to company SSID wireless with certificate installed on it.

    but without members of AD, so certificates exist only on the server public key infrastructure. (of course the auth is based only - TLS certificate)

    I know the BYOD is very even, but - as I understand - AD authentication based on the final phase, after which the certificate of authenticity is a simple certificate.

    Is it possible to implement without AD? The provision of certificate is a special assistance service, not controlled by the user.

    TIA

    Attila

    Of course, also your authorization rule does not try to match something like an ad group, you should be fine with EAP - TLS without integration AD.

  • New bug fixes with switching between tools

    Thank God! A problem with switching between tools in Adobe. When you transfer between open documents tool (framing or healing tool box & etc.) switch to default (first of all on the shortcut menu). Thank you guys for this problem, because it made me sick.

    Lots of Cuddles!

    Hi AndreyNosov,

    Thanks a ton for your comments.

    I'm sure, this is the must have set once you update the last update for Photoshop 2015.5.1

    Photoshop CC 2015.5.1 update now available

    Kind regards

    Mohit

  • Manager certificates 're-record of lstool' failed: 1 / VCSA Certificate Manager Option 1: certificate to replace Machine SSL with certificate custom

    As a result of this post...

    Configuration of VMware vSphere 6.0 CA VMware as a subordinate certification authority

    .. .we have now installed a brand-new VCSA. This is a clean install.

    "In accordance with the recommendation of support, I am now trying to do ' Option 1: certificate to replace Machine SSL with certificate custom" using a Microsoft CA

    This is the error message:

    2016 07-13 T 15: 24:25.268Z of INFORMATION serial number of the certificate manager before replacement: < redacted >

    2016 07-13 T 15: 24:25.268Z of INFORMATION: < redacted Certificate Manager after replacement serial number >

    2016 07-13 T 15: 24:25.268Z INFO-Certificate Manager footprint before replacement:< redacted >

    2016 07-13 T 15: 24:25.268Z INFO-Certificate Manager footprint after replacement:< redacted >

    2016 07-13 T 15: 24:25.268Z certificate MACHINE_SSL_CERT certificate INFORMATION-Manager replaced successfully. Serial number and the fingerprint has changed.

    2016 07-13 T 15: 24:44.90Z ERROR-certificate error when replacing Manager machine SSL Cert, please visit /var/log/vmware/vmcad/certificate-manager.log for more information.

    2016 07-13 T 15: 24:44.91Z "lstool record" has no certificate ERROR Manager: 1

    A pension case is ongoing. But if someone has any ideas?

    <>rant

    It is incredibly frustrating that something (replacement of a SSL certificate) that should be so simple is so hard.

    It's extremely annoying to know that the Certificate Manager is able to completely screw up a VCSA.

    How VMware is justified in the marketing of this new approach ver.6 as a 'simplification' of the management of SSL certificates?

    < / end of rant >

    Thank you

    Robert

    This has been fixed by an Incident of Support VMware

    I don't know how to fix them, but it took over 2 days (except "waiting for a response" time)

  • Signing in Adobe Reader using XI signed with certificate grayed out


    We recently released Adobe Reader XI, we use internally an integrated Adobe Acrobat Microsoft Certificate Server to digitally sign pdf documents using digital certificates, this works on Adobe Acrobat Standard for XI.

    However it seems that Adobe reader has the options under sign > "works with certificates" but everything on the Menu shows greyed out. Are there settings that must be enabled for this make it functional?

    Hi bossombritto,

    Please see the links below, can be a great help:-

    Kind regards
    Nicos

  • Signature with certificates usin an iPad.

    My company uses Adobe Reader XI and individuals sign a PDF file by using certificates. I have a user who needs to be able to sign with certificates using an iPad. What software for iPad would sign with certificates?

    Hello

    Based on certificates of signatures are supported in the desktop version of Adobe Acrobat Pro, Standard and Reader only.

    Sorry for the inconvenience.

  • I have a list of data with tabs between text instead of columns, I converted to a table?

    Hi all

    I have a list of 20 pages of data, but instead of it being in the columns of it is spaced with tabs between the numbers. For example:

    2012-01-01 12 60 0 4 1,112

    is: 2012-01-01 < tab > 12 < tab > 60 < tab > 0 < tab > 4 < tab > 1.112

    Is there a way to put this in a table without having to fill it all in manually? Convert the tabs list in a table as a whole?

    Any suggestions are appreciated.

    Thank you!

    Luuk

    1. Select the text

    2. Select the "Table" menu > "convert text to table...". »

    3. click on OK.

    See also help: help InDesign | Creating tables -paragraph 'create an array of existing text.

  • Projector flash win - signature with certificate

    Hello

    One of my clients want to sign an exe file with certificate.

    I bought a certificate 'standard code signing' and I want to use signtool.exe to sign the application, but all the time, I get an error.

    has anyone tries to sign an exe application?

    I'll be greatfull for any help.


    If you fish through the answer to this persons post to get 1.5 work and then read about the 2.6 update, it should give you enough information on how to try to get Aviation4 to work, but I don't know if it will be:

    http://StackOverflow.com/questions/5529666/setting-up-Flash-CS4-to-use-Adobe-Air-2-6

    TBH I would honestly only using Flash CS4 animation assets and be entirely by using a code editor various, esp, one who has the best completion of code such as FlashDevelop or better still, eclipse with FDT.

    Let me know if you get Aviation4 working in CS4, just out of curiosity. (I use Flash Builder 4.7 myself).

  • PDF file signed with certificate of certification of company

    Hi all

    I have a question about signing PDF documents. I have MS enterprise CA in my network and timestamp server. We use certificates to sign documents MS office document signing.

    Is it possible to sign PDF documents with adobe reader? In the preferences-> Security and preferences-> Signatures there are some settings where I can see my certificate and can set timestamp server, but areshowed of certificates as not approved and sign with certificate option is grayed out.

    If it is posible to sign documents PDF in this way could someone share with me the steps how to do?

    Signature is currently single operation Acrobat. It is not available in the player, which explains why some commands are gray in Reader. You can validate signatures PDF in Reader that's why you can run commands that are related to the validation of the signature.

    You can use Trusted identities UI (11.x is in the preferences-> Edit-> Signatures-> certificates identities & Trusted-> more...) to import your certificates of root and set the trust. You can also set the trust of the Signature Properties dialog box (right-click a signature and select "Show Signature Properties" in the drop-down list). In the Signature Properties dialog box click "Of the see the signatory certificate" which will bring up the dialog box display the certificate in which you can select a certificate in the chain and then click on the 'Trust' tab to bring up the component change Trust.

Maybe you are looking for