Cisco PIX 525 Especificaciones Pagina 472

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 604
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 471
29-6
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 29 Configuring Certificates
Certificate Configuration
Note When generating DSA keys, you may encounter a delay. On a Cisco PIX 515E Firewall, this
delay may extend up to few minutes.
Step 2 (Optional) Use the show crypto key mypubkey command to view key pair(s). Use the rsa and dsa
keywords to specify which type of keys you want to view. The following example shows an RSA
general-purpose key:
hostname/contexta(config)# show crypto key mypubkey rsa
Key pair was generated at: 16:39:47 central Feb 10 2005
Key name: <Default-RSA-Key>
Usage: General Purpose Key
Modulus Size (bits): 1024
Key Data:
30819f30 0d06092a 864886f7 0d010101 05000381 8d003081 89028181 00ea51b7
0781848f 78bccac2 4a1b5b8d 2f3e30b4 4cae9f86 f4485207 159108c9 f5e49103
9eeb0f5d 45fd1811 3b4aafce 292b3b64 b4124a6f 7a777b08 75b88df1 8092a9f8
5508e9e5 2c271245 7fd1c0c3 3aaf1e04 c7c4efa4 600f4c4a 6afe56ad c1d2c01c
e08407dd 45d9e36e 8cc0bfef 14f9e6ac eca141e4 276d7358 f7f50d13 79020301 0001
Key pair was generated at: 16:34:54 central Feb 10 2005
Step 3 Save the key pair you have generated. To do so, save the running configuration by entering the write
memory command.
Removing Key Pairs
To remove key pairs, use the crypto key zeroize command in global configuration mode.
The following example removes RSA key pairs:
hostname(config)# crypto key zeroize rsa
WARNING: All RSA keys will be removed.
WARNING: All device certs issued using these keys will also be removed.
Do you really want to remove these keys? [yes/no] y
hostname(config)#
Configuring Trustpoints
For information about trustpoints, see the About Trustpoints” section on page 29-3.
To configure a trustpoint, perform the following steps:
Step 1 Create a trustpoint corresponding to the CA from which the security appliance needs to receive its
certificate.
hostname/contexta(config)# crypto ca trustpoint
trustpoint
For example, to declare a trustpoint called Main:
hostname/contexta(config)# crypto ca trustpoint Main
hostname/contexta(config-ca-trustpoint)#
Upon entering this command, you enter the Crypto ca trustpoint configuration mode.
Vista de pagina 471
1 2 ... 467 468 469 470 471 472 473 474 475 476 477 ... 603 604

Comentarios a estos manuales

Sin comentarios