RV042 certificate Generation

Stupid question, I created a RV042 as a VPN gateway to a client about a year ago. It is running firmware 1.3.12.19 - tm (February 13, 2009 13:03:21). I created a new certificate. When I download the client certificate, it comes as a .zip file. It is possible not to be opened by a zip (windows, Winzip or 7-zip) utility. It seems that I can just rename the file to a .pem file, but I assure you it is true. They got time-outs QuickVPN, but which looks like it has been fixed in 1.3.13.

Yes

Tags: Cisco Support

Similar Questions

  • Blog post "vCO Workflow to automate certificate generation process.

    In this post we'll take a look in a workflow that can help to automate the generation of certificate. Certificates that are generated from the vCO/vRO workflow are standard certificates that can be used with the VMware products or for any other use or software. Here are some files that can be produced by the workflow

    file Setup - openssl.cfg - OpenSSL

    -rui.crt - CRT certificate

    -rui.csr - Certificate Signing Request.

    certificate - rui.key - private key from an individual (PEM formatted)

    -rui.p12 - PKCS12 package containing the private key and CRT.

    -rui.p7b - PKCS7 package containing CRT

    -rui.pem - PEM certificate with the private key

    -rui orig.key - private key of a specific certificate


    Most aspects of certificate and properties, such as subject alternative names (SAN) are customizable during execution.

    We will take a peek into little opportunities that offer the workflow in this package:

    Use case 1: create the certificate request file - in the first use case, we will use the workflow in the package to create the certificate request (.) CSR file). This file can then be used by administrators to generate an internal enterprise CA certificate form or send to external public certificate authorities that will generate the certificate instead.

    Use case 2: convert a certificate in the PEM - in the second case, we will use the workflow in the package to convert an existing certificate. Certificate PEM. Let's say that you have received a certificate, you must use on your device to VMware. To use this certificate, you must convert to PEM Format to be used by the device. It can be a certificate .cer or a PKCS12 (P12) or the PKCS7 (P7B) certificate package containing the certificate.

    Use case 3: using the "generate certificate: WF to automate the end-to-end process - in the third case we will use a workflow to automate the process of generation of certificate to - end of use.» Since the creation of the OpenSSL configuration file, create a certificate request file, this submission to a certification authority, on receipt of the generated certificate, converting to usable Linux PEM format and finally export the certificate package.


    Best regards

    Kaloferov spas

    ... and here is the link

    vCO Workflow to automate certificate generation process

    vCO Workflow to automate certificate generation process. Kaloferov spas & #039; s Blog

    BR, Spas

  • RV042 certificate record

    RV042, Firmware 1.3.12.19 - tm, when I try to save the certificate to the client, the file is saved as: RV042_1005_1015_Client.zip instead of .pem.  QuickVPN won't recognize the .zip file as a valid certificate.

    The problem is probably caused by the extension of file chosen when the certificate has been

    exported. Glad to know that it works now.

  • VCenter Orchestrator certificates

    If I import a certificate from a vCenter Orchestrator, and then afterwards I implement PKI to give my vCenter a certificate approved, will be my workflow who fail vCenter until I have import the new certificate?

    Thank you!

    Hello

    I think it will be. If you plan to change the cert of the vRO also I think that the order should be:

    -Change the certificate of the vRO. If you are using a public CA certificate that all the imported certificates will be deleted form the keystore that we create new keystore in the present case.

    -Change the certificate of vCenter.

    -Import the certificate vCenter vCO.

    You might find this interesting:

    How to change the SSL to a vCO device certificate

    How to change the SSL to a vCO device certificate | Kaloferov spas & #039; s Blog

    How to change the certificate SSL of WIndows installed vCO

    How to change the certificate installed WIndows SSL vCO | Kaloferov spas & #039; s Blog

    vCO Workflow to automate certificate generation process

    vCO Workflow to automate certificate generation process. Kaloferov spas & #039; s Blog

  • Configuration of SSL AD IOM

    Hi all

    I need to create users on announcement by password, I try to configure SSL between IOM & AD communication. I am following the guide of connector AD Base documentation. I did the installation of certificates, enabling ldaps services and I'm stuck on the last step adjustment upwards the target system certificate as a certificate approved

    http://download.Oracle.com/docs/CD/E11223_01/ doc.910 /e11197/deploy.htm#BIHJFIID

    I've exported the AD Certificate Authority .cer file and try to import the host to IOM using below command

    keytool-import - alias ALIAS - file CER_FILE - keystore MY_CACERTS - storepass PASSWORD

    In my case

    C:/Oracle/middleware/jrockit_160_17_R28.0.0-679/JRE/bin/keytool-import - alias wl103-storepass - C: / oimcert.cer - keystore C:/Oracle/Middleware/jrockit_160_17_R28.0.0-679/jre/lib/security/cacerts XXXXXX * file

    The problem is when the certificate is generated, I did not mention the password (not invited for the password during the process of Certification AD certificate generation) and but to import this certificate file to the host of the IOM that I need to provide the password (*-storepass XXXXXX *).

    Please let me know how to overcome the problem

    Kind regards
    Madhu

    Have you tried using passwords:

    changeit

    or

    xellerate

  • Errors of certificate RV042 browser by connecting to the web-based GUI

    I put the RV042 for QuickVPN access.  The router config recommend turning on HTTPS in the firewall when using QuickVPN.  The side effect of this is any web browser get me certificate errors and warns me not not to continue to connect to the router config.  How can I fix this so the browser does not throw these messages?

    Router Linksys brand is using the latest firmware for this material (1.3.13.02 - tm)

    Hi Tim,.

    The deeper issue, it's because of the certification on the cisco.com area which you do not own. And when you connect to your router probably with your own domain name or ip address that it compares this information with the information stored in the certificate. Because it will never match across is a mistake. The RV0xx series routers are not able to install 3rd party certificates, then it will not be able to resolve in their current version. I'm not aware of any decision to modify the code to solve this problem. The RV220W and SA500 series routers have the ability to install a third-party certificate. The SA is the only other model that has the ability in the line of small business to double WAN.

    Cisco Small Business Support Center

    Randy Manthey

    CCNA, CCNA - security

  • Certificates RV042

    A certificate signed by an authority can be used to access VPN clients? Or the RV042 supports only those it generates self-signed?

    Keith,

    RV042 supports only the self-signed certificate

    Jasbryan

  • Distance fail RV082 after generation VPN certificate.

    My RV082 is 2.0.0.19.  I allowed remote management and know the port. I was able to remotely manage the router and tried to install a work using QuickVPN virtual private network.  I created a user account and select the button "generate certificate".  Once done, I selected to download the certificate to the client.  That's when I lost my connection.  No matter what I did, I could connect no longer. I deleted cookies, temporary files, history and everything else I can think of, but have no idea of what's going on.  It's as if the router does not selectively block access.  Any help would be greatly appreciated.   Thank you.

    Hello

    I tried this specific scenario and was able to verify your results. Here is a work around:

    -Router access locally.

    -Disable Remote management---> record

    -Enable remote Managment---> record

    This will allow you to find the command prompt to add the certificate newly generated.

    However, the steps that you followed to create users was correct. Essentially by recording not between each change on the page, you created a conflict in the firmware where the desired change would generate a popup prompt. Given that you have made 3 changes at the same time, he created this conflict.

    To ensure that you don't waste a remote access: if it please change one at a time and click on save page. This allows the router invite all instructions messages / entry for the corresponding settings.

    -Lavaud

  • Problem of generation of ISE CSR Cisco with wildcard certificate.

    We buy the Wildcard SSL certificate to be used in Cisco ISE but when I enter the following attributes given by the seller, I have this error.

    « *. domain.com is not a valid generic name. The attributes that I created in the CSR as follows:

    CN = *. domain.com

    SAN

    DNS name: ise.domain.com

    The above parameters is given by the seller. They said I should put this attribute because the certification authority (DigiCert), accepts that this certificate wildcard question format.

    The seller rejected my previous CSR I created successfully with the following attributes below. This is based on the Cisco Documentation.

    CN = ISE.domain.com

    SAN

    DNS name: ise.domain.com

    DNS name: *. domain.com

    I just want to confirm if the attribute given by the seller are valid for the Cisco ISE generate the CSR. Or to use the valid FQDN in the entrances to CN and not the generic name. And use the generic name in the name SAN DNS entry.

    Please advice. Appreciate the prompt respose of the expert.

    Thank you.

    Kind regards

    Mike

    Mike,

    A wildcard cert is definitely the way to go in a distributed environment.  Use the host name the node of your Admin got into the CN field:

    CN = ise, OR = domain, OU = com

    then enter the SAN field as asown above the CSR.

    Please rate useful messages and mark this question as answered if, in fact, does that answer your question.  Otherwise, feel free to post additional questions.

    Charles Moreton

  • Failure of the generation of certificate when installing RS

    I install the SRM 1 update on the server with Virtual Center 2.5 update 3.   I get following error (or see attached screenshot):

    Failed to generate the certificate.

    Details:

    Error: Invalid Argument: DR_CERT_SERVER certificate filed is too long (> 32)

    I have

    I can recreate the error on both my Virtual Center servers.

    Thoughts?  Update my conclusions after dinner.  I need to eat.



    If you are evaluating your karma, please consider awarding points to 'Correct' or 'useful '.

    Sean Clark - vExpert, VCP- http://Twitter.com/vseanclark - http://seanclark.us

    your vCenter server FQDN > 32 characters would cause this error. they are > 32 tanks?

    see you soon

    Lee Dilworth

    PS: If you want to use self-signed certs, see also: http://kb.vmware.com/kb/1008390

  • Linkysys RV042 QuickVPN to router problems

    Hello

    Any help with this issue is greatly appreciated because I was stuck on this for a few days now, it's my first time posting to a forum... I have setup VPN connections before, but only through packages such as openswan and openvpn not through this device.

    My VPN router is connected directly to a DSL modem, directly behind the RV042 I placed my test on port machine 1 time Wan1 & port 1 show as Gree (active).

    Modem...
    DHCP enabled

    local IP address: 10.1.1.1

    The VPN has...

    Wan1: 10.1.1.2

    LAN1: 10.222.43.1

    Test machine...

    IP address: 10.222.43.100

    I got two Linksys RV042 Setup devices such as end point / VPN connections between one local area network to another.

    However before doing that I tested the installation of a test machine (for laptop Windows 7 Professional & also tried XP Professional with exactly the same results) for the VPN router device. I have configured the router with the basic configuration, as described in the guide step by step / pdf and user test configuration & a tunnel I left every thing as default and only changed what is necessary.

    I generated a certificate for the server and distributed a client certificate on my customer's computer and installed in the "C:\Program Files (x 86) \Linksys\Linksys VPN Client\" directory (if I understand correctly I can simply upload to this place and its installed for the customer).

    Above is a race down the steps listed in the installation guide provided on the CD, whenever I try to connect to the server, I get the following error message.

    Failed to establish a connection.

    This could be caused by one of the following:

    1. Incorrect password.

    2. No valid IP for the network card.

    3. Incorrect server address.

    4. You may need to disable your Windows firewall.

    5. Local IP address conflicts with the subnet of remote VPN server.

    1. I know that my password is correct

    2. I don't know what that means 'no IP address valid for the network adapter', although I am able to access the internet via the modem on my test laptop and have access to the web interface of the RV042 so I assumed that my IP is valid?

    3. I know that the address of the server is correct, I tried the two internal address of the RV042 and address the RV042 wan1

    4. I get exactly the same error message if the firewall is enabled or disabled on the XP or 7 machines.

    5. it's one I leave me puzzled, there is no connected computer so I don't know how there could be a conflict. However, just to make sure that I changed the IP address of the laptop outside the range allocated to the tunnel, and I still get the same error message.

    I checked the "system log" server log file and that's what I get, it appears that the server actually accepts the connection between what I can make of this series of posts.

    Jan 22 10:32:04 2010         Connection Accepted         TCP 10.222.43.100:3374->209.46.39.47:443 on ixp1

    Jan 22 10:32:32 2010        Connection Accepted        ICMP type 8 code 0 10.1.1.2->10.1.1.1 on ixp1

    Jan 22 10:33:44 2010         Authentication Success         HTTP Basic authentication succeeded for user: test

    The log on the local machine, however, show that there is an error but it just says: "Failed to connect" so I am very confused about the whole issue.

    2010/01/22 11:46:13 [STATUS]OS Version: Windows XP

    2010/01/22 11:46:13 [STATUS]Windows Firewall is OFF

    2010/01/22 11:46:13 [STATUS]One network interface detected with IP address 10.222.43.100

    2010/01/22 11:46:13 [STATUS]Connecting...

    2010/01/22 11:46:13 [STATUS]Connecting to remote gateway with IP address: 10.1.1.2

    2010/01/22 11:46:14 [STATUS]Remote gateway was reached by https ...

    2010/01/22 11:46:14 [STATUS]Remote gateway was reached by https ...

    2010/01/22 11:46:14 [WARNING]Failed to connect!

    Thanks for reading and thanks in advance for any help provided.

    JC

    As your objective here is to do a LAN to LAN VPN, I don't mind playing with the VPN client software to test the router.  The VPN configuration can be pretty shakey on the rv series, and I recommend that you play with the options, just keep base.

    Set up each local network be on a separate subnet.  That is to say, we're on 192.168.1.x, 192.168.2.x on.  On the VPN tab, set up accounts for both gateway to gateway vpn routers.  Test the connection into the router admin screens.  Check the connection with pings to each side of the lan systems.  Then try to use applications/files that you plan to use and see if it works.  If so, then success!  If this is not the case, check the different options to the title of each gateway account.  These options can make or break the vpn connection.  Good luck.

  • problem with the ios certificate server does not update the CRL

    Hi all

    The background is that I'm putting a DMVPN solution with tunnels ipsec between the rays created by using certificates.

    I use a cisco 877 as the CA server (its 12.4 (6) T5) running to provide certificates for the spoke routers. This part works very well - rays can apply for a certificate and get a number very well.

    The problem is CA, life of LCR is set to 24 hours, but the CA is not updated the LCR so when the rays see CRL (as defined in their trustpoint) they point to a mistake that the CRL is obsolete and does not connect.

    If making a ' #sh cryptographic pki server ' it lists a ' CRL NextUpdate timer. It has a timestamp that is 24 hours after the last certificate was revocked. The only way I can get the LCR to be rebuilt must revoke a certificate.

    So, my question is, am I missing something here? I thought that it would automatically generations a new CRL list file every 24 hours.

    Can anyone help?

    Thank you.

    Hey Marc (?)

    This seems to correspond to this bug:

    CSCsy95838    AC IOS: LCR of the not updated, update timer not started

    However, it does not mention if 12.4 (6) T5 is affected, only that it was found 12.4 (15) T3 and resolved to 12.4 (15) T10 and other more recent versions.

    I suggest trying the last 12.4 (15) Tx, 15.0 (1) Mx or 15.1 (4) Mx version if you can.

    I assumed that you have much of it, but just in case: as a workaround, you can disable CRL checking on all routers DMVPN, of course they will still allow connections from routers with a revoked RADIUS.

    As (temporary?) substitute for a Revocation list, you can use a 'certificate ACL' with which you can create kind of a 'local CRL Manual:

      crypto pki certificate map certACL 10    serial-number ne    serial-number ne    etc. 

      crypto pki trustpoint myTP
       match certificate certACL
    (note the "ne" stands for "not equal" so you are permitting any certificate whose serial number is not listed)
    Of course, you would have to configure (and maintain!) participating on each router in the DMVPN so it's heavy, but I guess if you revoke often certs, that it might be an option.
    HTH
    Herbert

    --

    If this post answered your question, please click the button of "right answer".

  • Cisco NAC SSL certificate replacement

    Hello

    My apologies if this is posted in the wrong community.

    We have a NAC Manager and 2 CASES where the external SSL CA certificates are expiring November 1. Here are the certificates based on the internal IP addresses of the applainces.

    Due to a change in the CAB Forum, external case will be putting anymore based on interally CERT be resolved IPs or hostnames, so I need to replace these certificates with those based on their FULL domain name.

    However, I do have the option to generate a CSR based on the existing cert or to generate a new temporary certificate. This will allow me to generate a certificate based on the FULL domain name, but I'm not sure of the generation of impact that causes a new certificate?

    Did anyone done this before? If so, is it safe to do it or it will cause problems within the devices / with end users who connect?

    What is the only way to generate a new certificate?

    Thanks in advance for any help or suggestions you can provide

    Richard,

    No need to remove the old cert, generating a new cert temp will not cause any problem.

    This should respond to your request.

    http://www.Cisco.com/c/en/us/TD/docs/security/NAC/appliance/configuratio...

    ~ JG

    Note the useful messages

  • Registration of certificate

    Someone would be kind enough to clarify a minor point for me. If I have an ASA with a domain FULL of asa1.mycompany.com and I wish to terminate Anyconnect sessions top pointing to the sslvpn.mycompany.com DNS entry. During the generation of my identity Cert, made the field CN = domain FULL of the ASA or the VPN name, etc. I want to just make sure I generate certificate request correctly before sending to the Slighly CA. not sure if that makes a difference. Regards Darren

    If you find this useful rate please, thank you! :)

  • Version 4.1 ACS certificate problem

    Our self-signed certificate has expired and I tried to install a valid certificate of our internal CA. The generation of CSR, addition of our internal CA as a valid root, import and installation of the new key all seemed to go smoothly. However, when I restarted the service to activate the new cert I was no longer able to access the server via the web interface.

    Connection via the console allows me to see that everything works apparently fine, but I cannot manage the server through the web and therefore cannot add/remove/edit and entries.

    Attempted to update the certificate on the second certificate, signed by association with a car and he is also updated without problem, but the web interface works in this system.

    I need advice on how to get the web interface work.

    Can you give us some details on what happens when you try to access the server via a browser? What is happening in the browser? Messages?

    Have you tried using http: instead of https:?

    Have you tried another browser?

    Your ACS running Windows, it is the camera, or?

Maybe you are looking for