How can I regenerate the sslvpn-full-default-authority?
Applicable products
SNS appliances
Description
This article gives you the procedure allowing the regeneration of the sslvpn-full-default-authority.
If you use default certificates for SSL VPN feature and use it in "Site mode" or use it with OpenVPN Client, you MUST download again the SSL VPN client configuration.
Procedure
- Delete the
~/ConfigFiles/Certificates/sslvpn-full-default-authorityfolder:rm -rf ~/ConfigFiles/Certificates/sslvpn-full-default-authority - Remove the CA index if present:
sed -i.old '/[0-9]=sslvpn-full-default-authority/d' ~/ConfigFiles/Certificates/pki.conf
- [Optional] If your configuration has been migrated from an older version, a setting may be present in
pki.confthat specifies SHA-1 for the CA's signature algorithm. This can lead to errors on newer Openvpn client versions, such asca md too weakon the client. This can be fixed with the following command:setconf ~/ConfigFiles/Certificates/pki.conf ca digest sha256
- Execute the following commands:
sslinit
enopenvpn
nrestart openvpn; nrestart openvpn_udp; nrestart monitord
