

**Note: If your desired certificate does not appear in the SSL certificate drop-down menu, it may not have been properly imported into the certificate console. button can be used for verification purposes. From the SSL certificate drop down menu select an appropriate alternative to the SHA-2 512 ECDSA appliance certificate. From the Site Bindings window, select https 443, and click Edit. From the right-hand panel, click Bindings. Expand Sites and click Default Web Site. From the left-hand panel, in the manager window, expand the directory under your machine’s name. Open Internet Information Services Manager (IIS) A SHA-1 appliance certificate or purchased wild-card certificate should do the job.

Resolution: Bind a different certificate to Default Web Site in IIS. This is confirmed if a VPN connection can be successfully established through Cisco's An圜onnect client, but not though Cisco's SSL Clientless VPN Service. One of them could be that Cisco cannot read the SHA-2 512 ECDSA appliance certificate, that's bound to the SecureAuth server's IIS Bindings, by deafult. Description: When attempting to connect to a SecureAuth server through Cisco's SSL Clientless VPN service, the following error is encountered: Connection failed Server (IP address) unavailable.Ĭause: There could be a few reasons for this error.
