
29-10
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 29 Configuring Certificates
Certificate Configuration
Note The password is required if the certificate for the security appliance needs to be revoked, so it is
crucial that you remember this password. Note it and store it in a safe place.
Yo u mus t en t e r t h e crypto ca enroll command for each trustpoint with which the security appliance
needs to enroll.
Note If your security appliance reboots after you issued the crypto ca enroll command but before you
received the certificate, reissue the crypto ca enroll command and notify the CA administrator.
Step 4 Verify that the enrollment process was successful using the show crypto ca certificate command. For
example, to show the certificate received from trustpoint Main:
hostname/contexta(config)# show crypto ca certificate Main
The output of this command shows the details of the certificate issued for the security appliance and the
CA certificate for the trustpoint.
Step 5 Save the configuration using the write memory command:
hostname/contexta(config)# write memory
Obtaining Certificates Manually
This procedure provides steps for configuring certificates using manual certificate requests. These steps
should be repeated for each trustpoint you configure for manual enrollment. When you have completed
this procedure, the security appliance will have received a CA certificate for the trustpoint and one or
two certificates for signing and encryption purposes. If you use DSA keys, the certificate received is for
signing only. If you use general-purpose RSA keys, the certificate received is for signing and encryption.
If you use separate RSA keys for signing and encryption, the certificates received are used for each
purpose exclusively.
Note Whether a trustpoint requires that you manually obtain certificates is determined by the use of the
enrollment terminal command when you configure the trustpoint (see the “Configuring Trustpoints”
section on page 29-6).
To obtain certificates manually, perform the following steps:
Step 1 Obtain a base-64 encoded CA certificate from the CA represented by the trustpoint.
Step 2 Import the CA certificate. To do so, use the crypto ca authenticate command. The following example
shows a CA certificate request for the trustpoint Main.
hostname (config)# crypto ca authenticate Main
Enter the base 64 encoded CA certificate.
End with a blank line or the word "quit" on a line by itself
MIIDRTCCAu+gAwIBAgIQKVcqP/KW74VP0NZzL+JbRTANBgkqhkiG9w0BAQUFADCB
[ certificate data omitted ]
/7QEM8izy0EOTSErKu7Nd76jwf5e4qttkQ==
quit
Comentarios a estos manuales