Configure a Trustpoint CA
About this task
Use this procedure to configure the certificate authority and perform related actions. You can configure up to eight CA trustpoints.
Procedure
Example
Switch:1>enable Switch:1#configure terminal Switch:1(config)#certificate ca ej common-name CaA2 key-name pki_key subject-name 822 Switch:1(config)#certificate ca ej action enroll Switch:1(config)#CP1 [07/21/16 12:22:11.992:CEST] 0x003a8604 00000000 GlobalRouter DIGITALCERT INFO Digital Certificate Module : Configuration Saved CP1 [07/21/16 12:22:12.284:CEST] 0x003a8639 00000000 GlobalRouter DIGITALCERT INFO Sent SCEP Request To CA : ej CP1 [07/21/16 12:22:12.504:CEST] 0x003a8615 00000000 GlobalRouter DIGITALCERT INFO Received SCEP Response With SUCCESS status! CP1 [07/21/16 12:22:12.508:CEST] 0x003a8611 00000000 GlobalRouter DIGITALCERT INFO Enroll Certificate Successful! CP1 [07/21/16 12:22:12.509:CEST] 0x003a8604 00000000 GlobalRouter DIGITALCERT INFO Digital Certificate Module : Configuration Saved
Display configured online CA trustpoints:
Switch:1(config)#show certificate ca CA table entry Name : a1 CommonName : CaA1 KeyName : rsa_2048 SubjectName : CaUrl : http://192.51.100.9:8080/ejbca/publicweb/apply/scep/test/pkiclient.exe UsePost : 1 SubjectCertValidityDays : 365 Action : (null) LastActionStatus : (null) LastActionFailureReason : CA-Auth Sha256Fingerprint : bd9bb74b3f4d75e86113222a8d291b6349c7a42c457e487b9be0a48b4f09cc7c UsedFor : CA table entry Name : a2 CommonName : CaA2 KeyName : pki_key SubjectName : 822 CaUrl : http://192.51.100.9:8080/ejbca/publicweb/apply/scep/test/pkiclient.exe UsePost : 1 SubjectCertValidityDays : 365 Action : (null) LastActionStatus : (null) LastActionFailureReason : CA-Auth Sha256Fingerprint : 0ccb8d0c38d36cf427187f0e1dd380536c078fd6fae39ec9872187327912056b UsedFor : Default
Variable Definitions
The following table defines parameters for the certificate ca command.
Variable |
Value |
---|---|
action caauth |
Authenticates the trustpoint CA by getting the certificate of the CA and stores the CA certificate locally. |
action enroll [validity-days <7–1185>] |
Generates certificate signing request to obtain identity certificate from configured trustpoint CA, gets the digital certificate, and stores it locally, associating with the trustpoint CA. The validity-days specifies the number of days for which the certificate will remain valid. The default value is 365 days. |
action get-crl |
Gets the Certificate Revocation List from the CDP and stores into a file. |
action install |
Installs the subject certificate obtained from the given trustpoint CA. |
action noop |
Specifies that no operation should be performed after configuring trustpoint. |
action remove |
Releases the locally stored certificate associated with the trustpoint CA post revocation. |
action renew [challenge-password WORD<0-128>] |
Specifies the password. This password is provided offline by the CA during the end entity registration. |
action renew [validity-days <7–1185>] |
Generates certificate renewal request for given trustpoint CA, gets the digital certificate, and stores it locally by replacing the old certificate with the new one. The validity-days specifies the number of days for which the certificate will remain valid. The default value is 365 days. |
ca WORD<1–45> |
Specifies the name of the CA. You can configure up to 8 CA trustpoints by specifying the CA name. It should be alphanumeric and case-sensitive. The maximum length should be 45 characters. |
ca-url WORD<0–1000> |
Specifies the trusted CA url. |
common-name WORD<0–64> |
Specifies the name of the owner of the device or user. |
key-name WORD<0–45> |
Specifies the key pair generated by the command that was first associated with the CA trustpoint. |
install-file root-ca-filename WORD<1–80> |
Installs the Root CA file obtained offline from the CA. |
sha256-fingerprint WORD<64-64> |
Specifies an encrypted fingerprint of the expected certificate to match. |
subject-name WORD<1-45> Note:
Exception: Not supported on VSP 8600 Series. |
Specifies the configured Subject Identity label. The default is Global. |
use-post <false | true> |
Specify the HTTP request style. The default value is True. For example, True for EJBCA and False for Win2012 CA. |