Applying SSL Certificate on a Cisco Router


Cisco AnyConnect VPN client software, the successor of the legacy VPN Client v5, is restrictive when it comes to connecting to VPN Servers that has invalid, expired or revoked SSL certificates. With that, AnyConnect wont allow you to connect if you are not using a valid SSL certificate on your router. (Tip: Self-signed certificate will work if you dont wish to purchase a CA-signed one).

So below is a hassle-free and simplified way of updating your certificate on your Cisco Router.

Example is to renew/update license for

The easiest way is to create a new Trustpoint on the router and adjust the VPN settings to that Trustpoint. This is to avoid certificate confusion.

Create a new trustpoint

MRK-AKL-RTR-01(config)#crypto pki trustpoint godaddy.trustpoint-2017
MRK-AKL-RTR-01(ca-trustpoint)#enrollment terminal
MRK-AKL-RTR-01(ca-trustpoint)# serial-number none
MRK-AKL-RTR-01(ca-trustpoint)# fqdn
MRK-AKL-RTR-01(ca-trustpoint)# ip-address none
MRK-AKL-RTR-01(ca-trustpoint)# revocation-check none
MRK-AKL-RTR-01(ca-trustpoint)# rsakeypair GDKey

MRK-AKL-RTR-01(config)#cry pki en
MRK-AKL-RTR-01(config)#cry pki enroll godaddy.trustpoint-2017
% Start certificate enrollment ..

% The subject name in the certificate will include:,O=MyCompany,OU=MyMSP,L=Auckland,ST=Auckland,C=NZ
% The subject name in the certificate will include:
Display Certificate Request to terminal? [yes/no]: yes
Certificate Request follows:


—End – This line not part of the certificate request—

Sent CSR to GoDaddy for renewal.

Log-on to Godaddy portal, find the certificate you need ( and revoke the existing license and request a new one by providing the CSR details above.

remember to add delimiter below so it will be accepted by the system


Godaddy will then process validation by sending email to the owner of the addresses (typically DNS Administrator/Hosting Company or the registered office. Once its validated it will generate a new certificate which you can download from Godaddy portal.


Download the Certificate.

The .zip file will contain two files.

First one, is bearing the Certificate Serial Number (ea1e85c5c31a8a8) is the actual Certificate and the gd_bundle is the authentication certificate. You can view the base64 (“text-version”)version by opening the certificate via Notepad.
On the router, import the generated certificates through the new trustpoints and associate it to the SSL-VPN configuration in the next steps.

You will need to Input the authenticate certificate first (bundle) and then the actual certificate (one with serial number)

MRK-AKL-RTR-01(config)#crypto pki authenticate godaddy.trustpoint-2017

Enter the base 64 encoded CA certificate.
End with a blank line or the word “quit” on a line by itself


Trustpoint ‘godaddy.trustpoint-2017’ is a subordinate CA and holds a non self sgned cert
Certificate has the following attributes:
Fingerprint MD5: XXX
Fingerprint SHA1: XXX

% Do you accept this certificate? [yes/no]: yes
Trustpoint CA certificate accepted.
% Certificate successfully imported

MRK-AKL-RTR-01(config)#crypto pki import godaddy.trustpoint-2017 certificate

Enter the base 64 encoded certificate.
End with a blank line or the word “quit” on a line by itself


% Router Certificate successfully imported

and then reconfigure the SSL-VPN to point to the new trustpoint bearing the updated certificate.

MRK-AKL-RTR-01(config)#webvpn gateway Cisco-WebVPN-Gateway
MRK-AKL-RTR-01(config-webvpn-gateway)#ssl trustpoint godaddy.trustpoint-2017



Examine the URL and look into the certificate details, you should be able to see the new serial number in the details.


3 thoughts on “Applying SSL Certificate on a Cisco Router

  1. Hello admin, i’ve been reading your posts for some time and I really like coming back here.
    I can see that you probably don’t make money on your website.

    I know one simple method of earning money, I think you
    will like it. Search google for: dracko’s tricks


  2. Great info here, thanks. I had to do this recently and all the online guides (apart from this one), seem to be written for the Cisco ASA.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s