I'm glad to hear that so many people have had success with 
this upgrade.

Unfortunately, ours did not go so well.

Our CAM is an HA-pair, each with it's self-generated SSL 
cert (apparently signed by www.perfigo.com).  We have two 
test standalone CASes, each with a similarly self-generated 
cert.  Then we have a production CAS HA-pair, which share a 
Verisign chained cert for the pair's service FQDN.

The root CA and chained combination *are* included in
the CAM, as well as both units of the CAS HA-pair.

Unfortunately, that didn't quite cut the mustard, and
the upgrade broke the connection between the HA-CAM and
the HA-CAS.  After nearly five(!) hours of priority 1
TAC handling, we finally got the connection back by
regenerating the (now discouraged) self-generated
www.perfigo.com-signed cert.  We generated this on one
unit of the HA-CAS for the service IP and then copied it
to the other.

Speaking of which, we often get the following message
when trying to login to the /admin interface on our HA
CAS boxes.

We'll get the following error: 

    The link that you requested is not present on this Clean
    Access System. If you reached this page by following a
    link from the user interface of the Clean Access Manager
    or Server, then please report this as a bug.

This happens on the individual IP for each CAS, and
sometimes on the service IP.  It's inconsistent, and
sometimes survives reboots, and sometimes survives
browser clearing/restarting.  Truly a new "feature" that
we're not able to pin down yet.  But... suffice it to
say, it makes managing the boxes a bit difficult when
you can't login to the darn things.

Anyway, we'll try some of the suggestions made here.

Want a laugh?  One of the early suggestions made by TAC
was that I should put official Verisign certs on all
the devices.  *sigh*

Thank goodness for this list.

 - Christopher

======================

On Sat, 16 Aug 2008 (13:57 -0400), Rob Chee wrote:

> Date: Sat, 16 Aug 2008 13:57:33 -0400
> From: Rob Chee <[EMAIL PROTECTED]>
> Reply-To: Cisco Clean Access Users and Administrators
>     <[email protected]>
> To: [email protected]
> Subject: Re: [CLEANACCESS] 4.1.6 Software Posted
> 
> Thanks for that tip about the "Netscape Cert Type". I ran into that too. It
> turns out that the Entrust Standard SSL certificate only supports the "SSL
> Server" type. You have to buy their Advantage SSL certificate to get both the
> "SSL Server" and "SSL Client" functionality.
> 
> I also ran into another weird problem. I had a Verisign certificate, which
> uses an intermediate root CA certificate, on the NAS. I made sure I added the
> root and intermediate CA certificate onto the NAM. When I did the upgrade the
> NAS and NAM wouldn't talk. In the NAS and NAM logs there were complaints about
> invalid chaining certificate. I checked the Trusted Certifcate Authority on
> the NAS and the NAM and made sure the intermediate and root CA Verisign
> certificate existed on both. I ended up solving the problem by re-inputting
> the private key and CA-Signed Certificate on the NAS. Once I did that and
> rebooted everything worked fine. I also saw in the 4.1.6 NAS config guide that
> the cacerts file can get corrupted. That may have been what happened during
> the upgrade. The config guide recommends the following
> 
>    If you check nslookup and date from the CAS, and both the DNS and
>    TIME settings on the CAS are correct, this can indicate that the
>    cacerts file on the CAS is corrupted. In this case, Cisco recommends
>    backing up the existing cacerts file from
>    /usr/java/j2sdk1.4/lib/security/cacerts, overriding it with the file
>    from /perfigo/common/conf/cacerts, then performing ?service perfigo
>    restart? on the CAS.
> 
> 
> ------------------------------------------------------
> Rob Chee, CCIE #8188 (R&S and Security)
> Senior Network Consultant
> Chesapeake NetCraftsmen, LLC.
> Company Website:  http://www.netcraftsmen.net
> My Blog:  http://cnc-networksecurity.blogspot.com
> Mobile:  571-437-2829
> ------------------------------------------------------
> 
> 
> Hall, Rand wrote:
> > Here's a 4.1.6 pre-install checklist item for you:
> > 
> > Make sure your certificates' "Netscape Cert Type" is not just "SSL Server".
> > They need to support Client for the new CAS-CAM Authentication. We were
> > making use of IPSCA's free edu certificates--which only support Server. As
> > an aside, you get what you pay for. IPSCA support is virtually unreachable.
> > I've been waiting 5 days. Comodo was very responsive to my credit card
> > yesterday ;-)
> > 
> > 
> > Cheers,
> > Rand
> > 
> > --
> > Rand P. Hall * Director, Network Services
> > Merrimack College * SunGard Higher Education
> > 315 Turnpike Street, North Andover MA 01845 * Tel 978-837-5000
> > Fax 978-837-5383 * [EMAIL PROTECTED] * www.sungardhe.com
> > 
> > CONFIDENTIALITY:  This e-mail (including any attachments) may contain
> > confidential, proprietary and privileged information, and unauthorized
> > disclosure or use is prohibited.  If you received this e-mail in error,
> > please notify the sender and delete this e-mail from your system.
> > 
> > 
> > -----Original Message-----
> > From: Cisco Clean Access Users and Administrators
> > [mailto:[EMAIL PROTECTED] On Behalf Of Chris Evans
> > Sent: Thursday, August 07, 2008 10:07 AM
> > To: [email protected]
> > Subject: Re: 4.1.6 Software Posted
> > 
> > You need to insure that the CAM has the CA certificate corresponding to the
> > certificate issued to the CAS (there are options in the GUI in 4.1.6 to
> > allow you to upload that certificate).
> > 
> > The CAS and CAM do not have to have certificates issued by the same CA, but
> > they both need to have the CA certificates for each other.
> > 
> > In code prior to 4.1.6, the CAS needed the CA certificate corresponding to
> > the certificate issued on the CAM (but the CAM didn't need the CA
> > certificate for the cert on the CAS).  Most people used the self-generated
> > cert on the CAM, so the CA cert for this was already "built in".  In 4.1.6
> > code, the CAM likewise needs the CA certificate for the certificate issued
> > to the CAS - this is a new requirement and is the limitation you'll likely
> > run into.
> > 
> > Strictly speaking for it to function, you don't need to issue a new
> > certificate to the CAM if you are using the "perfigo-based" certificates
> > (but it needs the CA certificate corresponding to the certs on the CASes!),
> > but as implied elsewhere in the alias, it's a good security practice to do
> > so.
> > 
> > Hall, Rand wrote:
> >   
> > > So, what are the ramifications for leaving the Perfigo certificate in
> > > place?
> > > 
> > > I have a "real" certificate installed on the CAS but not on the CAM. I'm
> > > scheduled to update tomorrow morning but am not looking forward to being
> > > dead in the water if the certificate is a deal-killer.
> > > 
> > > 
> > > Cheers,
> > > Rand
> > > 
> > > --
> > > Rand P. Hall * Director, Network Services
> > > Merrimack College * SunGard Higher Education
> > > 315 Turnpike Street, North Andover MA 01845 * Tel 978-837-5000
> > > Fax 978-837-5383 * [EMAIL PROTECTED] * www.sungardhe.com
> > > 
> > > CONFIDENTIALITY:  This e-mail (including any attachments) may contain
> > > confidential, proprietary and privileged information, and unauthorized
> > > disclosure or use is prohibited.  If you received this e-mail in error,
> > > please notify the sender and delete this e-mail from your system.
> > > 
> > > 
> > > -----Original Message-----
> > > From: Cisco Clean Access Users and Administrators
> > > [mailto:[EMAIL PROTECTED] On Behalf Of Muhammad Ismail
> > > Sent: Wednesday, August 06, 2008 3:53 PM
> > > To: [email protected]
> > > Subject: Re: 4.1.6 Software Posted
> > > 
> > > We have installed the version 4.1.6 on a test environment. Does not look
> > > too different from version 4.1.3.1. However, one thing you would notice
> > > right away is a message with red text asking you make sure you have
> > > certificates for CAM and CAS. See the message in screen shot.
> > > 
> > > 
> > > Muhammad/.
> > > 
> > > Muhammad I. Ismail
> > > Network Security Specialist
> > > Western CT State University
> > > (203) 837-8991 (O)
> > > [EMAIL PROTECTED]
> > > 
> > > 
> > > 
> > > -----Original Message-----
> > > From: Cisco Clean Access Users and Administrators
> > > [mailto:[EMAIL PROTECTED] On Behalf Of Eric Kenny
> > > Sent: Wednesday, August 06, 2008 11:40 AM
> > > To: [email protected]
> > > Subject: Re: 4.1.6 Software Posted
> > > 
> > > Yes.
> > > 
> > > Eric J. Kenny
> > > Network Analyst
> > > Marist College
> > > 3399 North Rd.
> > > Poughkeepsie, NY 12601
> > > 845.575.3820
> > > 
> > > On Aug 6, 2008, at 10:35 AM, Walt Howd wrote:
> > > 
> > >       
> > > > Has the 4.1.6 agent been released for 4.1.3 installations? We have
> > > > auto update of the agent disabled.
> > > > 
> > > > Walt
> > > >           
> > >       
> > 
> >   

Reply via email to