How can I regenerate the sslvpn-full-default-authority?
Applicable products
SNS appliances
Description
This article gives you the procedure allowing the regeneration of the sslvpn-full-default-authority.
If you use default certificates for SSL VPN feature and use it in "Site mode" or use it with OpenVPN Client, you MUST download again the SSL VPN client configuration.
Procedure
- Delete the
~/ConfigFiles/Certificates/sslvpn-full-default-authority
folder:rm -rf ~/ConfigFiles/Certificates/sslvpn-full-default-authority
- Remove the CA index if present:
sed -i.old '/[0-9]=sslvpn-full-default-authority/d' ~/ConfigFiles/Certificates/pki.conf
- [Optional] If your configuration has been migrated from an older version, a setting may be present in
pki.conf
that specifies SHA-1 for the CA's signature algorithm. This can lead to errors on newer Openvpn client versions, such asca md too weak
on the client. This can be fixed with the following command:setconf ~/ConfigFiles/Certificates/pki.conf ca digest sha256
- Execute the following commands:
sslinit
enopenvpn
nrestart openvpn; nrestart openvpn_udp; nrestart monitord