Enables digital certificate configuration and RSA Keypair management. Digital certificates are issued by CAs and contain user or device specific information, such as name, public key, IP address, serial number, company name etc. Use this command to generate, delete, export, or import encrypted RSA Keypairs and generate Certificate Signing Request (CSR).
Note
This command and its syntax is common to both the User Executable and Privilege Executable configuration modes.crypto [key|pki]
crypto key [export|generate|import|zeroize]
crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL {background|on|passphrase}
crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
crypto key generate rsa <RSA-KEYPAIR-NAME> [2048|4096] {on <DEVICE-NAME>}
crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> {background|on|passphrase}
crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
crypto key zeroize rsa <RSA-KEYPAIR-NAME> {force} {(on <DEVICE-NAME>)}
crypto pki [authenticate|export|generate|import|zeroise]
crypto pki authenticate <TRUSTPOINT-NAME> <LOCATION-URL> {background} {(on <DEVICE-NAME>)}
crypto pki export [request|trustpoint]
crypto pki export request [generate-rsa-key|short|use-rsa-key] <RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name]
crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name [<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>]
crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name (<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>)
crypto pki export request [generate-rsa-key|short [generate-rsa-key|use-rsa-key]|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> (<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>)
crypto pki export trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME)}
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name]
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {(email <SEND-TO-EMAIL>, fqdn <FQDN>,ip-address <IP>,on <DEVICE-NAME>)}
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {(email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>,on <DEVICE-NAME>)}
crypto pki import [certificate|crl|trustpoint]
crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background} {(on <DEVICE-NAME>})
crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
crypto pki zeroize trustpoint <TRUSTPOINT-NAME> {del-key} {(on <DEVICE-NAME>)}
crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
key | Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. |
export rsa <RSA-KEYPAIR-NAME> | Exports an existing RSA Keypair to a specified destination
|
<EXPORT-TO-URL> | Specify the RSA Keypair destination address. Both IPv4 and IPv6 address formats are supported. After specifying the destination address (where the RSA Keypair is exported), configure one of the following parameters: background or passphrase. |
background | Optional. Performs export operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the export on. |
passphrase <KEY-PASSPHRASE> background | Optional. Encrypts RSA Keypair before exporting
|
on <DEVICE-NAME> | The following parameter is recursive and common to all of the
above parameters:
|
crypto key generate rsa <RSA-KEYPAIR-NAME> [2048|4096] {on <DEVICE-NAME>}
key | Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. |
generate rsa <RSA-KEYPAIR-NAME> [2048|4096] | Generates a new RSA Keypair
|
on <DEVICE-NAME> | Optional. Generates the new RSA Keypair on a specified device
|
crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
key | Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. |
import rsa <RSA-KEYPAIR-NAME> | Imports a RSA Keypair from a specified source
|
<IMPORT-FROM-URL> | Specify the RSA Keypair source address. Both IPv4 and IPv6 address formats are supported. After specifying the source address (where the RSA Keypair is imported from), configure one of the following parameters: background or passphrase. |
background | Optional. Performs import operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the import on. |
passphrase <KEY-PASSPHRASE> background | Optional. Decrypts the RSA Keypair after importing
|
on <DEVICE-NAME> | The following parameter is recursive and common to the
‘background‘ and ‘passphrase‘ keywords:
|
crypto key zeroize rsa <RSA-KEYPAIR-NAME> {force} {(on <DEVICE-NAME>)}
key | Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. |
zeroize rsa <RSA-KEYPAIR-NAME> | Deletes a specified RSA Keypair
Note: All device
certificates associated with this key will also be
deleted.
|
force | Optional. Forces deletion of all certificates associated with the specified RSA Keypair. Optionally specify a device on which to force certificate deletion. |
on <DEVICE-NAME> | The following parameter is recursive and optional:
|
crypto pki authenticate <TRUSTPOINT-NAME> <URL> {background} {(on <DEVICE-NAME>)}
pki | Enables Private Key Infrastructure (PKI) management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated Certificate Authority (CA) certificates. |
authenticate <TRUSTPOINT-NAME> | Authenticates a trustpoint and imports the corresponding CA
certificate
|
url | Specify CA‘s location. Both IPv4 and IPv6 address formats are
supported. Note: The
CA certificate is imported from the specified
location.
|
background | Optional. Performs authentication in the background. If selecting this option, you can optionally specify the device (access point, controller, or service platform) to perform the export on. |
on <DEVICE-NAME> | The following parameter is recursive and optional:
|
crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name (<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>)
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
export request | Exports CSR to the CA for digital identity certificate. The CSR contains applicant‘s details and RSA Keypair‘s public key. |
[generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> | Generates a new RSA Keypair or uses an existing RSA Keypair
|
autogen-subject-name | Auto generates subject name from configuration parameters. The subject name identifies the certificate. |
<EXPORT-TO-URL> | Specify the CA‘s location. Both IPv4 and IPv6 address formats are
supported. Note: The
CSR is exported to the specified location.
|
email <SEND-TO-EMAIL> | Exports CSR to a specified e-mail address
|
fqdn <FQDN> | Exports CSR to a specified Fully Qualified Domain
Name (FQDN)
|
ip-address <IP> | Exports CSR to a specified device or system
|
crypto pki export request [generate-rsa-key|short [generate-rsa-key|use-rsa-key]|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> (<EXPORT-TO-URL>,email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>)
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
export request | Exports CSR to the CA for a digital identity certificate. The CSR contains applicant‘s details and RSA Keypair‘s public key. |
[generate-rsa-key| short [generate-rsa-key|use-rsa-key]| use-rsa-key] <RSA-KEYPAIR-NAME> | Generates a new RSA Keypair or uses an existing RSA Keypair
|
subject-name <COMMON-NAME> | Configures a subject name, defined by the <COMMON-NAME>
keyword, to identify the certificate
|
<COUNTRY> | Sets the deployment country code (2 character ISO code) |
<STATE> | Sets the state name (2 to 64 characters in length) |
<CITY> | Sets the city name (2 to 64 characters in length) |
<ORGANIZATION> | Sets the organization name (2 to 64 characters in length) |
<ORGANIZATION-UNIT> | Sets the organization unit (2 to 64 characters in length) |
<EXPORT-TO-URL> | Specify the CA‘s location. Both IPv4 and IPv6 address formats are supported. The CSR is exported to the specified location. |
email <SEND-TO-EMAIL> | Exports CSR to a specified e-mail address
|
fqdn <FQDN> | Exports CSR to a specified FQDN
|
ip-address <IP> | Exports CSR to a specified device or system
|
crypto pki export trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
export trustpoint <TRUSTPOINT-NAME> | Exports a trustpoint along with CA certificate, Certificate
Revocation List (CRL), server certificate, and private
key
|
<EXPORT-TO-URL> | Specify the destination address. Both IPv4 and IPv6 address formats are supported. The trustpoint is exported to the address specified here. |
background | Optional. Performs export operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the export on |
passphrase <KEY-PASSPHRASE> background | Optional. Encrypts the key with a passphrase before exporting
|
on <DEVICE-NAME> | The following parameter is recursive and common to the
‘background‘ and ‘passphrase‘ keywords:
|
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {(email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>,on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated certificates. |
generate | Generates a certificate and a trustpoint |
self-signed <TRUSTPOINT-NAME> | Generates a self-signed certificate and a trustpoint
|
[generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> | Generates a new RSA Keypair, or uses an existing RSA Keypair
|
autogen-subject-name | Auto generates the subject name from the configuration parameters. The subject name helps to identify the certificate. |
email <SEND-TO-EMAIL> | Optional. Exports the self-signed certificate to a specified
e-mail address
|
fqdn <FQDN> | Optional. Exports the self-signed certificate to a specified FQDN
|
ip-address <IP> | Optional. Exports the self-signed certificate to a specified
device or system
|
on <DEVICE-NAME> | Optional. Exports the self-signed certificate on a specified
device
|
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {(email <SEND-TO-EMAIL>,fqdn <FQDN>,ip-address <IP>,on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated certificates. |
generate self-signed <TRUSTPOINT-NAME> | Generates a self-signed certificate and a trustpoint
|
[generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> | Generates a new RSA Keypair, or uses an existing RSA Keypair
|
subject-name <COMMON-NAME> | Configures a subject name, defined by the <COMMON-NAME>
keyword, to identify the certificate
|
<COUNTRY> | Sets the deployment country code (2 character ISO code) |
<STATE> | Sets the state name (2 to 64 characters in length) |
<CITY> | Sets the city name (2 to 64 characters in length) |
<ORGANIZATION> | Sets the organization name (2 to 64 characters in length) |
<ORGANIZATION-UNIT> | Sets the organization unit (2 to 64 characters in length) |
email <SEND-TO-EMAIL> | Optional. Exports the self-signed certificate to a specified
e-mail address
|
fqdn <FQDN> | Optional. Exports the self-signed certificate to a specified FQDN
|
ip-address <IP> | Optional. Exports the self-signed certificate to a specified
device or system
|
crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background} {(on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
import | Imports certificates, CRL, or a trustpoint to the selected device |
[certificate|crl] <TRUSTPOINT-NAME> | Imports a signed server certificate or CRL
|
<IMPORT-FROM-URL> | Specify the signed server certificate or CRL source address. Both
IPv4 and IPv6 address formats are supported. The server certificate or the CRL (based on the parameter passed in the preceding step) is imported from the location specified here. |
background | Optional. Performs import operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the import on. |
on <DEVICE-NAME> | The following parameter is recursive and optional:
|
crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background|passphrase <KEY-PASSPHRASE> background} {(on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
import | Imports certificates, CRL, or a trustpoint to the selected device |
trustpoint <TRUSTPOINT-NAME> | Imports a trustpoint and its associated CA certificate, server
certificate, and private key
|
<IMPORT-FROM-URL> | Specify the trustpoint source address. Both IPv4 and IPv6 address formats are supported. |
background | Optional. Performs import operation in the background. If selecting this option, you can optionally specify the device (access point or controller) to perform the import on. |
passphrase <KEY-PASSPHRASE> background | Optional. Decrypts trustpoint with a passphrase after importing
|
on <DEVICE-NAME> | The following parameter is recursive and optional:
|
crypto pki zeroize trustpoint <TRUSTPOINT-NAME> {del-key} {(on <DEVICE-NAME>)}
pki | Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. |
zeroize trustpoint <TRUSTPOINT-NAME> | Imports certificates, CRL, or a trustpoint to the selected device |
[certificate|crl] <TRUSTPOINT-NAME> | Deletes a trustpoint and its associated CA certificate, server
certificate, and private key
|
del-key | Optional. Deletes the private key associated with the server certificate. Optionally specify the device to perform deletion on. |
on <DEVICE-NAME> | The following parameter is recursive and optional:
|
The system supports both IPv4 and IPv6 address formats. Provide source and destination locations using any one of the following options:
IPv4 URLs:
tftp://<hostname|IPv4>[:port]/path/file
ftp://<user>:<passwd>@<hostname|IPv4>[:port]/path/file
sftp://<user>@<hostname|IPv4>[:port]>/path/file
http://<hostname|IPv4>[:port]/path/file
cf:/path/file
usb<n>:/path/file
IPv6 URLs:
tftp://<hostname|IPv6>[:port]/path/file
ftp://<user>:<passwd>@<hostname|IPv6>[:port]/path/file
sftp://<user>@<hostname|IPv6>[:port]>/path/file
http://<hostname|IPv6>[:port]/path/file
ap510-133B3B#crypto key generate rsa local 2048 on ap510-133B3B RSA Keypair successfully generated ap510-133B3B#