Note
This command and its syntax is common to both the User Executable and Privilege Executable configuration modes.crypto [key|pki]
crypto key [export|generate|import|zeroize]
crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL {background|on|passphrase}
crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
crypto key generate rsa <RSA-KEYPAIR-NAME> [2048|4096] {on <DEVICE-NAME>}
crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> {background|on|passphrase}
crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
crypto key zeroize rsa <RSA-KEYPAIR-NAME> {force} {(on <DEVICE-NAME>)}
crypto pki [authenticate|export|generate|import|zeroise]
crypto pki authenticate <TRUSTPOINT-NAME> <LOCATION-URL> {background} {(on <DEVICE-NAME>)}
crypto pki export [request|trustpoint]
crypto pki export request [generate-rsa-key|short|use-rsa-key] <RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name]
crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name [<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>]
crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name (<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>)
crypto pki export request [generate-rsa-key|short [generate-rsa-key|use-rsa-key]|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> (<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>)
crypto pki export trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME)}
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name]
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {(email <SEND-TO-EMAIL>, fqdn <FQDN>,ip-address <IP>,on <DEVICE-NAME>)}
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {(email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>,on <DEVICE-NAME>)}
crypto pki import [certificate|crl|trustpoint]
crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background} {(on <DEVICE-NAME>})
crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
crypto pki zeroize trustpoint <TRUSTPOINT-NAME> {del-key} {(on <DEVICE-NAME>)}
crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
key | Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. |
export rsa <RSA-KEYPAIR-NAME> | Exports an existing RSA Keypair to a specified destination
|
<EXPORT-TO-URL> | Specify the RSA Keypair destination address.
Both IPv4 and IPv6 address formats are supported. After specifying the destination address (where the RSA Keypair is exported), configure one of the following parameters: background or passphrase. |
background | Optional. Performs export operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the export on. |
passphrase <KEY-PASSPHRASE> background | Optional. Encrypts RSA Keypair before exporting
|
on <DEVICE-NAME> | The following parameter is recursive and common
to all of the above parameters:
|
crypto key generate rsa <RSA-KEYPAIR-NAME> [2048|4096] {on <DEVICE-NAME>}
key | Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. |
generate rsa <RSA-KEYPAIR-NAME> [2048|4096] | Generates a new RSA Keypair
|
on <DEVICE-NAME> | Optional. Generates the new RSA Keypair on a
specified device
|
crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
key | Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. |
import rsa <RSA-KEYPAIR-NAME> | Imports a RSA Keypair from a specified source
|
<IMPORT-FROM-URL> | Specify the RSA Keypair source address. Both IPv4 and IPv6 address formats are supported. After specifying the source address (where the RSA Keypair is imported from), configure one of the following parameters: background or passphrase. |
background | Optional. Performs import operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the import on. |
passphrase <KEY-PASSPHRASE> background | Optional. Decrypts the RSA Keypair after
importing
|
on <DEVICE-NAME> | The following parameter is recursive and common
to the ‘background‘ and ‘passphrase‘ keywords:
|
crypto key zeroize rsa <RSA-KEYPAIR-NAME> {force} {(on <DEVICE-NAME>)}
key | Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. |
zeroize rsa <RSA-KEYPAIR-NAME> | Deletes a specified RSA Keypair
Note: All device
certificates associated with this key will also be
deleted.
|
force | Optional. Forces deletion of all certificates associated with the specified RSA Keypair. Optionally specify a device on which to force certificate deletion. |
on <DEVICE-NAME> | The following parameter is recursive and
optional:
|
crypto pki authenticate <TRUSTPOINT-NAME> <URL> {background} {(on <DEVICE-NAME>)}
pki | Enables Private Key Infrastructure (PKI) management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated Certificate Authority (CA) certificates. |
authenticate <TRUSTPOINT-NAME> | Authenticates a trustpoint and imports the corresponding CA certificate
|
url | Specify CA‘s location. Both IPv4 and IPv6 address formats are supported.
Note: The CA certificate is imported from the specified
location.
|
background | Optional. Performs authentication in the background. If selecting this option, you can optionally specify the device (access point, controller, or service platform) to perform the export on. |
on <DEVICE-NAME> | The following parameter is recursive and optional:
|
crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name (<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>)
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
export request | Exports CSR to the CA for digital identity certificate. The CSR contains applicant‘s details and RSA Keypair‘s public key. |
[generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> | Generates a new RSA Keypair or uses an existing
RSA Keypair
|
autogen-subject-name | Auto generates subject name from configuration parameters. The subject name identifies the certificate. |
<EXPORT-TO-URL> | Specify the CA‘s location. Both IPv4 and IPv6
address formats are supported. Note: The CSR is exported to the specified
location.
|
email <SEND-TO-EMAIL> | Exports CSR to a specified e-mail address
|
fqdn <FQDN> | Exports CSR to a specified FQDN (Fully Qualified Domain
Name)
|
ip-address <IP> | Exports CSR to a specified device or system
|
crypto pki export request [generate-rsa-key|short [generate-rsa-key|use-rsa-key]|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> (<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>)
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
export request | Exports CSR to the CA for a digital identity certificate. The CSR contains applicant‘s details and RSA Keypair‘s public key. |
[generate-rsa-key| short [generate-rsa-key|use-rsa-key]| use-rsa-key] <RSA-KEYPAIR-NAME> | Generates a new RSA Keypair or uses an existing RSA Keypair
|
subject-name <COMMON-NAME> | Configures a subject name, defined by the <COMMON-NAME> keyword,
to identify the certificate
|
<COUNTRY> | Sets the deployment country code (2 character ISO code) |
<STATE> | Sets the state name (2 to 64 characters in length) |
<CITY> | Sets the city name (2 to 64 characters in length) |
<ORGANIZATION> | Sets the organization name (2 to 64 characters in length) |
<ORGANIZATION-UNIT> | Sets the organization unit (2 to 64 characters in length) |
<EXPORT-TO-URL> | Specify the CA‘s location. Both IPv4 and IPv6 address formats are supported. The CSR is exported to the specified location. |
email <SEND-TO-EMAIL> | Exports CSR to a specified e-mail address
|
fqdn <FQDN> | Exports CSR to a specified FQDN
|
ip-address <IP> | Exports CSR to a specified device or system
|
crypto pki export trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
export trustpoint <TRUSTPOINT-NAME> | Exports a trustpoint along with CA certificate, (Certificate
Revocation List) (CRL), server certificate, and private key
|
<EXPORT-TO-URL> | Specify the destination address. Both IPv4 and IPv6 address formats are supported. The trustpoint is exported to the address specified here. |
background | Optional. Performs export operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the export on |
passphrase <KEY-PASSPHRASE> background | Optional. Encrypts the key with a passphrase before exporting
|
on <DEVICE-NAME> | The following parameter is recursive and common to the ‘background‘ and
‘passphrase‘ keywords:
|
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {(email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>,on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated certificates. |
generate | Generates a certificate and a trustpoint |
self-signed <TRUSTPOINT-NAME> | Generates a self-signed certificate and a trustpoint
|
[generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> | Generates a new RSA Keypair, or uses an existing RSA Keypair
|
autogen-subject-name | Auto generates the subject name from the configuration parameters. The subject name helps to identify the certificate. |
email <SEND-TO-EMAIL> | Optional. Exports the self-signed certificate to a specified e-mail
address
|
fqdn <FQDN> | Optional. Exports the self-signed certificate to a specified FQDN
|
ip-address <IP> | Optional. Exports the self-signed certificate to a specified device or
system
|
on <DEVICE-NAME> | Optional. Exports the self-signed certificate on a specified device
|
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {(email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>,on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated certificates. |
generate self-signed <TRUSTPOINT-NAME> | Generates a self-signed certificate and a
trustpoint
|
[generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> | Generates a new RSA Keypair, or uses an existing
RSA Keypair
|
subject-name <COMMON-NAME> | Configures a subject name, defined by the
<COMMON-NAME> keyword, to identify the certificate
|
<COUNTRY> | Sets the deployment country code (2 character ISO code) |
<STATE> | Sets the state name (2 to 64 characters in length) |
<CITY> | Sets the city name (2 to 64 characters in length) |
<ORGANIZATION> | Sets the organization name (2 to 64 characters in length) |
<ORGANIZATION-UNIT> | Sets the organization unit (2 to 64 characters in length) |
email <SEND-TO-EMAIL> | Optional. Exports the self-signed certificate to
a specified e-mail address
|
fqdn <FQDN> | Optional. Exports the self-signed certificate to
a specified FQDN
|
ip-address <IP> | Optional. Exports the self-signed certificate to
a specified device or system
|
crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background} {(on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
import | Imports certificates, CRL, or a trustpoint to the selected device |
[certificate|crl] <TRUSTPOINT-NAME> | Imports a signed server certificate or CRL
|
<IMPORT-FROM-URL> | Specify the signed server certificate or CRL
source address. Both IPv4 and IPv6 address formats are supported. The server certificate or the CRL (based on the parameter passed in the preceding step) is imported from the location specified here. |
background | Optional. Performs import operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the import on. |
on <DEVICE-NAME> | The following parameter is recursive and
optional:
|
crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
import | Imports certificates, CRL, or a trustpoint to the selected device |
trustpoint <TRUSTPOINT-NAME> | Imports a trustpoint and its associated CA
certificate, server certificate, and private key
|
<IMPORT-FROM-URL> | Specify the trustpoint source address. Both IPv4 and IPv6 address formats are supported. |
background | Optional. Performs import operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the import on. |
passphrase <KEY-PASSPHRASE> background | Optional. Decrypts trustpoint with a passphrase
after importing
|
on <DEVICE-NAME> | The following parameter is recursive and
optional:
|
crypto pki zeroize trustpoint <TRUSTPOINT-NAME> {del-key} {(on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
zeroize trustpoint <TRUSTPOINT-NAME> | Imports certificates, CRL, or a trustpoint to the selected device |
[certificate|crl] <TRUSTPOINT-NAME> | Deletes a trustpoint and its associated CA
certificate, server certificate, and private key
|
del-key | Optional. Deletes the private key associated with the server certificate. Optionally specify the device to perform deletion on. |
on <DEVICE-NAME> | The following parameter is recursive and
optional:
|
The system supports both IPv4 and IPv6 address formats. Provide source and destination locations using any one of the following options:
tftp://<hostname|IPv4>[:port]/path/file
ftp://<user>:<passwd>@<hostname|IPv4>[:port]/path/file
sftp://<user>@<hostname|IPv4>[:port]>/path/file
http://<hostname|IPv4>[:port]/path/file
cf:/path/file usb<n>:/path/file
tftp://<hostname|IPv6>[:port]/path/file
ftp://<user>:<passwd>@<hostname|IPv6>[:port]/path/file
sftp://<user>@<hostname|IPv6>[:port]>/path/file
http://<hostname|IPv6>[:port]/path/file
NOC-NX9500#crypto key generate rsa key 2048 RSA key size > 2048. Key generation started in background. NOC-NX9500#
no (user-exec-mode) | Removes server certificates, trustpoints and their associated certificates |