Nowadays IOS routers can be configured with WebVPN (Clientless SSL VPN) functionalities. WebVPN allows a user to securely access resources on the corporate LAN from anywhere with an SSL-enabled Web browser. To secure the connection you should use a SSL certificate to encrypt all transferred data. There are different ways of creating and importing SSL certificates on an IOS router, but I always use the same method:
- 1. I generate a CSR and private key on my own laptop with Cygwin and OpenSSL;
- 2. I sent the CSR to a CA for signing, like VeriSign or GeoTrust;
- 3. I create a PKCS12 certificate with the signed cert and the private key;
- 4. Import the PKCS12 certificate on the router;
With this procedure I always have the “real” certificate, and all related files, on my own laptop for backup purposes. Mostly you can also generate a CSR on an appliance and import the signed certificate to the appliance and you are also done. But sometimes you don’t have the opportunity to export the certificate for backup purposes. So what if the appliance crashes or needs to be replaced?
Now I will show you how to import the PKCS12 to an IOS router. First we need to create a trustpoint on the router. The trustpoint contains the certificate authority that signed the certificate in use.
router(config)#crypto pki trustpoint trustpoint_www
Next I will import the certificate. There are multiple ways for importing the certificate, but I just use TFTP to transfer the certificate from my laptop to the router.
router(config)#crypto ca import trustpoint_www pkcs12 tftp: passphrase
% Importing pkcs12…
Address or name of remote host ? 10.10.1.58
Source filename [trustpoint_home]? www-booches-nl.pfx
Reading file from tftp://10.10.1.58/www-booches-nl.pfx
Loading www-booches-nl.pfx from 10.10.1.58 (via BVI1): !
[OK – 2629 bytes]
CRYPTO_PKI: Imported PKCS12 file successfully.
The certificate is now successfully imported into the router and can be associated with the WebVPN configuration. Useful commands to verify your trustpoints and certificates are:
show crypto pki certificates
show crypto pki trustpoints
Latest posts by René Jorissen (see all)
- ClearPass & MobileIron – Error: not well-formed (invalid token) - October 28, 2016
- FortiMail – Howto configure DLP - October 27, 2016
- FortiMail – Howto enable DLP - October 25, 2016