Configure a Trustpoint CA
About this task
Use this procedure to configure the certificate authority and perform related actions. You can configure up to eight CA trustpoints.
Procedure
Example
Switch:1>enable Switch:1#configure terminal Switch:1(config)#certificate ca ej common-name CaA2 key-name pki_key subject-name 822 Switch:1(config)#certificate ca ej action enroll Switch:1(config)#CP1 [07/21/16 12:22:11.992:CEST] 0x003a8604 00000000 GlobalRouter DIGITALCERT INFO Digital Certificate Module : Configuration Saved CP1 [07/21/16 12:22:12.284:CEST] 0x003a8639 00000000 GlobalRouter DIGITALCERT INFO Sent SCEP Request To CA : ej CP1 [07/21/16 12:22:12.504:CEST] 0x003a8615 00000000 GlobalRouter DIGITALCERT INFO Received SCEP Response With SUCCESS status! CP1 [07/21/16 12:22:12.508:CEST] 0x003a8611 00000000 GlobalRouter DIGITALCERT INFO Enroll Certificate Successful! CP1 [07/21/16 12:22:12.509:CEST] 0x003a8604 00000000 GlobalRouter DIGITALCERT INFO Digital Certificate Module : Configuration Saved
Display configured online CA trustpoints:
Switch:1(config)#show certificate ca CA table entry Name : a1 CommonName : CaA1 KeyName : rsa_2048 SubjectName : CaUrl : http://192.51.100.9:8080/ejbca/publicweb/apply/scep/test/pkiclient.exe UsePost : 1 SubjectCertValidityDays : 365 Action : (null) LastActionStatus : (null) LastActionFailureReason : CA-Auth Sha256Fingerprint : bd9bb74b3f4d75e86113222a8d291b6349c7a42c457e487b9be0a48b4f09cc7c UsedFor : CA table entry Name : a2 CommonName : CaA2 KeyName : pki_key SubjectName : 822 CaUrl : http://192.51.100.9:8080/ejbca/publicweb/apply/scep/test/pkiclient.exe UsePost : 1 SubjectCertValidityDays : 365 Action : (null) LastActionStatus : (null) LastActionFailureReason : CA-Auth Sha256Fingerprint : 0ccb8d0c38d36cf427187f0e1dd380536c078fd6fae39ec9872187327912056b UsedFor : Default
Variable Definitions
The following table defines parameters for the certificate ca command.
| 
 Variable  | 
 Value  | 
|---|---|
| 
                                 action caauth  | 
                            
                                 Authenticates the trustpoint CA by getting the certificate of the CA and stores the CA certificate locally.  | 
                        
| 
                                 action enroll [validity-days <7–1185>]  | 
                            
                                 Generates certificate signing request to obtain identity certificate from configured trustpoint CA, gets the digital certificate, and stores it locally, associating with the trustpoint CA. The validity-days specifies the number of days for which the certificate will remain valid. The default value is 365 days.  | 
                        
| 
                                 action get-crl  | 
                            
                                 Gets the Certificate Revocation List from the CDP and stores into a file.  | 
                        
| 
                                 action install  | 
                            
                                 Installs the subject certificate obtained from the given trustpoint CA.  | 
                        
| 
                                 action noop  | 
                            
                                 Specifies that no operation should be performed after configuring trustpoint.  | 
                        
| 
                                 action remove  | 
                            
                                 Releases the locally stored certificate associated with the trustpoint CA post revocation.  | 
                        
| 
                                 action renew [challenge-password WORD<0-128>]  | 
                            
                                 Specifies the password. This password is provided offline by the CA during the end entity registration.  | 
                        
| 
                                 action renew [validity-days <7–1185>]  | 
                            
                                 Generates certificate renewal request for given trustpoint CA, gets the digital certificate, and stores it locally by replacing the old certificate with the new one. The validity-days specifies the number of days for which the certificate will remain valid. The default value is 365 days.  | 
                        
| 
 ca WORD<1–45>  | 
                                
                                 Specifies the name of the CA. You can configure up to 8 CA trustpoints by specifying the CA name. It should be alphanumeric and case-sensitive. The maximum length should be 45 characters.  | 
| 
                                 ca-url WORD<0–1000>  | 
                            
                                 Specifies the trusted CA url.  | 
                        
| 
 common-name WORD<0–64>  | 
 Specifies the name of the owner of the device or user.  | 
| 
 key-name WORD<0–45>  | 
 Specifies the key pair generated by the command that was first associated with the CA trustpoint.  | 
| 
                                 install-file root-ca-filename WORD<1–80>  | 
                            
                                 Installs the Root CA file obtained offline from the CA.  | 
                        
| 
                                 sha256-fingerprint WORD<64-64>  | 
                            
                                 Specifies an encrypted fingerprint of the expected certificate to match.  | 
                        
| 
                                
                                 subject-name WORD<1-45> Note: 
                                     
                            Exception: Not supported on VSP 8600 Series.  | 
                            
                                 Specifies the configured Subject Identity label. The default is Global.  | 
                        
| 
 use-post <false | true>  | 
 Specify the HTTP request style. The default value is True. For example, True for EJBCA and False for Win2012 CA.  |