top of page
logo_community_4x.png

How To - use OpenConnect and Cisco ASA Firewall with untrusted Certificate

  • Writer: IGEL Community
    IGEL Community
  • May 31, 2023
  • 1 min read

Written by Kolja Knispel , IGEL COMMUNITY MEMBER


This use case worked only at the Commandline, were ist was possible to accept an untrusted certificate, coming from the Cisco ASA and manually choose an VPN UserGroup.


This was not possible in the OpenConnect GUI. So Konstantin Fritzenwallner created a Script written in a profile.


The Profile has adjustable environment variables for the Certificate Hash and the Authgroup. You can see the hash of an Certificate with this command:

openssl x509 -fingerprint -noout -in /wfs/zert.pem | sed 's/://g'


OR


in a Browser (deleting the ":") So it workes also in the GUI.


You can find the clean profile below. Please be aware that this is not officially supported by IGEL.





 
 
 

Comments


bottom of page