List of questions
Related questions
Question 156 - 300-730 discussion
Users are getting untrusted server warnings when they connect to the URL https://asa.lab from their browsers. This URL resolves to 192.168.10.10, which is the IP address for a Cisco ASA configured for a clientless VPN. The VPN was recently set up and issued a certificate from an internal CA server. Users can connect to the VPN by ignoring the message, however, when users access other webservers that use certificates issued by the same internal CA server, they do not experience this issue. Which action resolves this issue?
Import the CA that signed the certificate into the machine trusted root CA store.
Reissue the certificate with asa.lab in the subject alternative name field.
Import the CA that signed the certificate into the user trusted root CA store.
Reissue the certificate with 192.168.10.10 in the subject common name field.
0 comments
Leave a comment first