This document describes the process to enroll a Transport Layer Security (TLS) certificate through the Automated Certificate Management Environment (ACME) protocol on the Secure Firewall Firepower Threat Defense (FTD) platform.
Cisco recommends that you have knowledge on these topics:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
The current prerequisites and constraints for ACME enrollment on Secure Firewall FTD include:
When downgrading to a Secure Firewall FTD version that does not support ACME enrollment (version 7.7 or earlier):
Certificates enrolled via ACME are still accessible; however, their private keys become disassociated after the first save and reboot after the downgrade.
If a downgrade is necessary, use the recommended workaround:
The ACME protocol is intended to simplify the management of TLS certificates for network administrators. Through ACME, administrators can automate the tasks involved in acquiring and renewing TLS certificates. This automation is especially useful when working with certificate authorities (CAs) such as Let's Encrypt, which provide free, automated, and publicly accessible certificates via the ACME protocol.ACME facilitates the issuance of Domain Validation (DV) certificates. These certificates verify that the certificate requester has control over the specified domains. The validation typically occurs through an HTTP-based challenge process, where the applicant places a designated file on their web server. The Certificate Authority (CA) then accesses this file via the domain's HTTP server to confirm domain control. Successfully passing this challenge enables the CA to issue the DV certificate.
The enrollment process involves these steps:

ACME Enrollment HTTP-01 Authentication Flow.
The key benefits of using the ACME protocol for enrolling TLS certificates on Secure Firewall FTD include:
These advantages collectively enhance operational efficiency and security for Secure Firewall FTD deployments.
Before initiating the ACME enrollment process, ensure the next conditions are met:
1. Navigate to Objects > PKI > Cert Enrollment and click Add Cert Enrollment to begin the configuration process.

2. The ACME enrollment option is listed in the drop-down menu together with other enrollment methods. Select ACME from the Enrollment Type dropdown to continue.

3. The options for configuring certificate parameters are displayed, complete the fields with the appropriate information.

4. If you are using an ACME server that is not well known, you need to add the ACME server’s CA Certificate. Navigate to Objects > Cert Enrollment and click the Add Cert Enrollment button.



5. Navigate to Certificate Parameters, select the Custom FQDN option in the Include FQDN box, and fill in the Custom FQDN and Alternate FQDN fields with the primary FQDN and any alternative domain names to be included in the certificate.

6. Navigate to Key to modify the Key Type and Key Size settings.

7. (Optional) Enable Auto Enroll for the Identity Certificate.
Check theAuto Enrollcheckbox and specify the percentage for theAuto Enroll Lifetime.
This feature ensures that the certificate is renewed automatically before it expires. The percentage determines how far in advance of the expiration of the certificate the renewal process begins. For example, if set to 80%, the renewal process starts when the certificate has reached 80% of its validity period.

8. Click on Save.
1.Navigate to Firewall Devices > Certificates and click the Add button to enroll a new certificate.

2. Select the FTD device from the Device drop-down list and the certificate object previously created in Cert Enrollment.

3. Click on Add.
4. Once the deployment is completed, the status column displays the ID certificate button.

5. Validate the ID certificate information by clicking the ID button.

Confirm the certificate is enrolled with the command.show crypto ca certificates <Trust Point Name>.
firepower# show crypto ca certificatesACME_CERT
Certificate
Status: Available
Certificate Serial Number: 058f993097bd56758e44554194a953be
Certificate Usage: General Purpose
Public Key Type: RSA (2048 bits)
Signature Algorithm: ecdsa-with-SHA256
Issuer Name:
CN=acme Intermediate CA
O=acme
Subject Name:
CN=ftd-example.cisco.com
Validity Date:
start date: 11:20:55 UTC Jul 21 2025
end date: 11:21:55 UTC Jul 22 2025
Storage: immediate
Associated Trustpoints: ACME_CERT
Public Key Hashes:
SHA1 PublicKey hash: 26b7a0f7414364a45b246114478bb74f432520c4
SHA1 PublicKeyInfo hash: 24125d6e8674566c1551784f651975b562c520a
There are new syslogs in the Secure Firewall FTD to capture events related to the certificate enrollment using ACME protocol:
%FTD-5-717067: Starting ACME certificate enrollment for the trustpoint <private_acme> with CA <ca-acme.example.com>. Mode <manual>
%FTD-5-717068: ACME Certificate enrollment succeeded for trustpoint <private_acme> with CA <ca-acme.example.com>. Received a new certificate with Subject Name <CN=fj-asav.example.com> Issuer Name <CN=ca-acme Intermediate CA,O=ca-acme> Serial Number <truncated>
%FTD-3-717069: ACME Certificate enrollment failed for trustpoint <private_acme>
%FTD-5-717070: Keypair <Auto.private_acme> in the trustpoint <private_acme> is regenerated for <manual> ACME certificate enrollment
If an ACME certificate enrollment fails, consider the next steps to identify and resolve the issue:
For additional information, collect the output of the next debug commands:
| Revision | Publish Date | Comments |
|---|---|---|
1.0 |
06-Apr-2026
|
Initial Release |