top of page
  • Writer's pictureIGEL Community

How To - use OpenConnect and Cisco ASA Firewall with untrusted Certificate

Written by Kolja Knispel , IGEL COMMUNITY MEMBER


This use case worked only at the Commandline, were ist was possible to accept an untrusted certificate, coming from the Cisco ASA and manually choose an VPN UserGroup.


This was not possible in the OpenConnect GUI. So Konstantin Fritzenwallner created a Script written in a profile.


The Profile has adjustable environment variables for the Certificate Hash and the Authgroup. You can see the hash of an Certificate with this command:

openssl x509 -fingerprint -noout -in /wfs/zert.pem | sed 's/://g'


OR


in a Browser (deleting the ":") So it workes also in the GUI.


You can find the clean profile below. Please be aware that this is not officially supported by IGEL.


OpenConnect_Trust_Cert_profiles
.zip
Download ZIP • 1.91MB



Comments


bottom of page