Imports a TLS certificate and a private key in PKCS12 format.
Note
When the password is not provided in the CLI command, the user will be prompted for it when the CLI is executed.Privileged EXEC mode
Use the below mentioned command to import a TLS server certificate and private key (in
PKCS12
format) to an SLX device (with no trust point) and establish a
secure connection.
Note
Server Certificates are to be imported on the SLX device mandatorily, before configuring gNMI server.CLI Command:
crypto ca import-pkcs {type pkcs12 cert-type gNMI-server } protocol {FTP | SCP} directory dir-name file file-name source-ip source-ip host host-address user user-name password scp password [ pkcs-passphrase pkcs-export-password ] [ use-vrf vrf-name ]} crypto ca import-pkcs {type pkcs12 cert-type https } protocol {FTP | SCP} directory dir-name file file-name source-ip source-ip host host-address user user-name password scp password [ pkcs-passphrase pkcs-export-password ] [ use-vrf vrf-name ]}
Certificates for the following servers can be imported:
HTTPS Server
gNMI Server
Certificates for the following clients can be imported:
LDAP Client
RADIUS Client
SYSLOG Client
Use the no form of the command to remove a certificate and key.
This example specifies HTTPS authentication and SCP using a VRF named red.
device# crypto ca import-pkcs12 cert-type https protocol SCP host 10.70.12.102 user fvt directory /users/crypto file pkcs12cert.p12 password ********** pkcs-passphrase ******** use-vrf red
This example removes an HTTPS certificate and key.
device# no crypto ca import-pkcs type pkcs12 cert-type https
This example specifies gNMI server authentication.
device# crypto ca import-pkcs type pkcs12 cert-type gNMI-server directory /root/gselvaraj/NH217/ file nh217.pfx protocol SCP host 10.24.12.107 user root password *** pkcs-passphrase ***
This example removes gNMI server certificate and key.
device# no crypto ca import-pkcs type pkcs12 cert-type gNMI-server