Hey Mates,
we are using Remote Access VPN (on 80.20) with certificates and we operate our own public key infrastructure (ADCS)
We have been using this for a while and all is/was fine.
However, now the Issuing CA has been renewed because we got to the point where the validity of the CA certificate was less than the validity time of certificates, i.e. the Issuing CA Cert is valid for another 1 1/2 years, some certificates signed by it have a validity of 2 years. So, issued cert validity > ca certificate validity
They used a new key pair for the new certificate and now the new certificate has: CA Version v1.1, a new keypair, but the same CN
I am wondering, how to get this certificate in the firewall. When I tried to add it, i got an error message that the CN is already in use and that the import failed.
I am not sure, but do I need both?
There are certificates that are signed by the old CA and are still valid for another year. Will these certificates be invalid if I delete the old CA certificate and import the new one?
Do I even need to change something at all?
I am kinda lost here and would highly appreciate input
Cheers,
D
Also, another thing in that direction. Does anybody know in detail how the Gateways check a CRL (e.g. in case the CRL ist hosted internally and externally - where does it go?) or can point me to a resource where it is described?