- Cisco IOS PKI Overview Understanding and Planning a PKI
- Deploying RSA Keys Within a PKI
- Configuring Authorization and Revocation of Certificates in a PKI
- Configuring Certificate Enrollment for a PKI
- Setting Up Secure Device Provisioning for Enrollment in a PKI
- Configuring and Managing a Cisco IOS Certificate Server for PKI Deployment
- Storing PKI Credentials
- Source Interface Selection for Outgoing Traffic with Certificate Authority
- Finding Feature Information
- Prerequisites for Configuring a Cisco IOS Certificate Server
- Restrictions for Configuring a Cisco IOS Certificate Server
- Information About Cisco IOS Certificate Servers
- RSA Key Pair and Certificate of the Certificate Server
- Certificate Server Database
- Trustpoint of the Certificate Server
- Certificate Revocation Lists (CRLs)
- Certificate Server Error Conditions
- Certificate Enrollment Using a Certificate Server
- Types of CA Servers Subordinate and Registration Authorities (RAs)
- Automatic CA Certificate and Key Rollover
- Support for Specifying a Cryptographic Hash Function
- How to Set Up and Deploy a Cisco IOS Certificate Server
- Generating a Certificate Server RSA Key Pair
- Configuring Certificate Servers
- Prerequisites for Automatic CA Certificate Rollover
- Restrictions for Automatic CA Certificate Rollover
- Configuring a Certificate Server
- Configuring a Subordinate Certificate Server
- Configuring a Certificate Server to Run in RA Mode
- Configuring the Root Certificate Server to Delegate Enrollment Tasks to the RA Mode Certificate Server
- What to Do Next
- Configuring Certificate Server Functionality
- Working with Automatic CA Certificate Rollover
- Maintaining Verifying and Troubleshooting the Certificate Server Certificates and the CA
- Configuring Specific Storage and Publication Locations Examples
- Removing Enrollment Requests from the Enrollment Request Database Examples
- Autoarchiving the Certificate Server Root Keys Examples
- Restoring a Certificate Server from Certificate Server Backup Files Examples
- Subordinate Certificate Server Example
- RA Mode Certificate Server Example
- Enabling CA Certificate Rollover to Start Immediately Example
Configuring and Managing a Cisco IOS Certificate Server for PKI Deployment
This module describes how to set up and manage a Cisco IOS certificate server for public key infrastructure (PKI) deployment. A certificate server embeds a simple certificate server, with limited certification authority (CA) functionality, into the Cisco IOS software. Thus, the following benefits are provided to the user:
- Easier PKI deployment by defining default behavior. The user interface is simpler because default behaviors are predefined. That is, you can leverage the scaling advantages of PKI without all of the certificate extensions that a CA provides, thereby allowing you to easily enable a basic PKI-secured network.
- Direct integration with Cisco IOS software.
Note |
Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. |
- Finding Feature Information
- Prerequisites for Configuring a Cisco IOS Certificate Server
- Restrictions for Configuring a Cisco IOS Certificate Server
- Information About Cisco IOS Certificate Servers
- How to Set Up and Deploy a Cisco IOS Certificate Server
- Configuration Examples for Using a Certificate Server
- Where to Go Next
- Additional References
- Feature Information for the Cisco IOS Certificate Server
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring a Cisco IOS Certificate Server
Planning Your PKI Before Configuring the Certificate Server
Before configuring a Cisco IOS certificate server, it is important that you have planned for and chosen appropriate values for the settings you intend to use within your PKI (such as certificate lifetimes and certificate revocation list (CRL) lifetimes). After the settings have been configured in the certificate server and certificates have been granted, settings cannot be changed without having to reconfigure the certificate server and reenrolling the peers. For information on certificate server default settings and recommended settings, see the section "Certificate Server Default Values and Recommended Values."
Enabling an HTTP Server
The certificate server supports Simple Certificate Enrollment Protocol (SCEP) over HTTP. The HTTP server must be enabled on the router for the certificate server to use SCEP. (To enable the HTTP server, use the ip http server command.) The certificate server automatically enables or disables SCEP services after the HTTP server is enabled or disabled. If the HTTP server is not enabled, only manual PKCS10 enrollment is supported.
Note |
To take advantage of automatic CA certificate and key pair rollover functionality for all types of certificate servers, Cisco IOS Release 12.4(4)T or a later release must be used and SCEP must be used as the enrollment method. |
Configuring Reliable Time Services
Time services must be running on the router because the certificate server must have reliable time knowledge. If a hardware clock is unavailable, the certificate server depends on manually configured clock settings, such as Network Time Protocol (NTP). If there is not a hardware clock or the clock is invalid, the following message is displayed at bootup:
% Time has not been set. Cannot start the Certificate server.
After the clock has been set, the certificate server automatically switches to running status.
For information on manually configuring clock settings, see the section "Setting Time and Calendar Services" in the chapter "Performing Basic System Management" of the Cisco IOS Network Management Configuration Guide .
"crypto ca" to "crypto pki" CLI Change
As of Cisco IOS Release 12.3(7)T, all commands that begin as "crypto ca" have been changed to begin as "crypto pki." Although the router continues to accept crypto ca commands, all output is read back as crypto pki.
Restrictions for Configuring a Cisco IOS Certificate Server
The certificate server does not provide a mechanism for modifying the certificate request that is received from the client; that is, the certificate that is issued from the certificate server matches the requested certificate without modifications. If a specific certificate policy, such as name constraints, must be issued, the policy must be reflected in the certificate request.
Information About Cisco IOS Certificate Servers
- RSA Key Pair and Certificate of the Certificate Server
- Certificate Server Database
- Trustpoint of the Certificate Server
- Certificate Revocation Lists (CRLs)
- Certificate Server Error Conditions
- Certificate Enrollment Using a Certificate Server
- Types of CA Servers Subordinate and Registration Authorities (RAs)
- Automatic CA Certificate and Key Rollover
- Support for Specifying a Cryptographic Hash Function
RSA Key Pair and Certificate of the Certificate Server
The certificate server automatically generates a 1024-bit Rivest, Shamir, and Adelman (RSA) key pair. You must manually generate an RSA key pair if you prefer a different key pair modulus. For information on completing this task, see the section "Generating a Certificate Server RSA Key Pair."
Note |
The recommended modulus for a certificate server key pair is 2048 bits. |
The certificate server uses a regular Cisco IOS RSA key pair as its CA key. This key pair must have the same name as the certificate server. If you do not generate the key pair before the certificate server is created on the router, a general-purpose key pair is automatically generated during the configuration of the certificate server.
As of Cisco IOS Release 12.3(11)T and later releases, the CA certificate and CA key can be backed up automatically one time after they are generated by the certificate server. As a result, it is not necessary to generate an exportable CA key for backup purposes.
What to Do with Automatically Generated Key Pairs in Cisco IOS Software Prior to Release 12.3(11)T
If the key pair is automatically generated, it is not marked as exportable. Thus, you must manually generate the key pair as exportable if you want to back up the CA key. For information on how to complete this task, see the section "Generating a Certificate Server RSA Key Pair."
How the CA Certificate and CA Key Are Automatically Archived
At initial certificate server setup, you can enable the CA certificate and the CA key to be automatically archived so that they may be restored later if either the original copy or the original configuration is lost.
When the certificate server is turned on the first time, the CA certificate and CA key is generated. If automatic archive is also enabled, the CA certificate and the CA key is exported (archived) to the server database. The archive can be in PKCS12 or privacy-enhanced mail (PEM) format.
Note |
This CA key backup file is extremely important and should be moved immediately to another secured place. |
- This archiving action occurs only one time. Only the CA key that is (1) manually generated and marked exportable or (2) automatically generated by the certificate server is archived (this key is marked nonexportable).
- Autoarchiving does not occur if you generate the CA key manually and mark it "nonexportable."
- In addition to the CA certificate and CA key archive file, you should also regularly back up the serial number file (.ser) and the CRL file (.crl). The serial file and the CRL file are both critical for CA operation if you need to restore your certificate server.
- It is not possible to manually back up a server that uses nonexportable RSA keys or manually generated, nonexportable RSA keys. Although automatically generated RSA keys are marked as nonexportable, they are automatically archived once.
Certificate Server Database
The Cisco IOS certificate server stores files for its own use and may publish files for other processes to use. Critical files generated by the certificate server that are needed for its ongoing operation are stored to only one location per file type for its exclusive use. The certificate server reads from and writes to these files. The critical certificate server files are the serial number file (.ser) and the CRL storage location file (.crl). Files that the certificate server writes to, but does not read from again, may be published and available for use by other processes. An example of a file that may be published is the issued certificates file (.crt).
Performance of your certificate server may be affected by the following factors, which should be considered when you choose storage options and publication options for your certificate server files.
- The storage or publish locations you choose may affect your certificate server performance. Reading from a network location takes more time than reading directly from a router's local storage device.
- The number of files you choose to store or publish to a specific location may affect your certificate server performance. The local Cisco IOS file system may not always be suitable for a large number of files.
- The file types you choose to store or publish may affect your certificate server performance. Certain files, such as the .crl files, can become very large.
Note |
It is recommended that you store .ser and .crl files to your local Cisco IOS file system and publish your .crt files to a remote file system. |
Certificate Server Database File Storage
The certificate server allows the flexibility to store different critical file types to different storage locations depending on the database level set (see the database level command for more information). When choosing storage locations, consider the file security needed and server performance. For instance, serial number files and archive files (.p12 or .pem) might have greater security restrictions than the issued certificates file storage location (.crt) or the name file storage location (.cnm).
The table below shows the critical certificate server file types by file extension that may be stored to a specific location.
Table 1 | Certificate Server Storage Critical File Types |
File Extension |
File Type |
---|---|
.ser |
The main certificate server database file. |
.crl |
The CRL storage location. |
.crt |
The issued certificates storage location. |
.cnm |
The certificate name and expiration file storage location. |
.p12 |
The certificate server certificate archive file location in PKCS12 format. |
.pem |
The certificate server certificate archive file location in PEM format. |
Cisco IOS certificate server files may be stored to three levels of specificity:
- Default location, NVRAM
- Specified primary storage location for all critical files
- Specified storage location for specific critical file(s).
A more specific storage location setting overrides a more general storage location setting. For instance, if you have not specified any certificate server file storage locations, all certificate server files are stored to NVRAM. If you specify a storage location for the name file, only the name file is stored there; all other files continue to be stored to NVRAM. If you then specify a primary location, all files except the name file is now stored to this location, instead of NVRAM.
Note |
You may specify either .p12 or .pem; you cannot specify both types of archive files. |
Certificate Server Database File Publication
A publish file is a copy of the original file and is available for other processes to use or for your use. If the certificate server fails to publish a file, it does cause the server to shut down. You may specify one publish location for the issued certificates file and name file and multiple publish locations for the CRL file. See the table below for files types available for publication. You may publish files regardless of the database level that is set.
Table 2 | Certificate Server Publish File Types |
File Extension |
File Type |
---|---|
.crl |
The CRL publish location. |
.crt |
The issued certificates publish location. |
.cnm |
The certificate name and expiration file publish location. |
Trustpoint of the Certificate Server
If the certificate server also has an automatically generated trustpoint of the same name, then the trustpoint stores the certificate of the certificate server. After the router detects that a trustpoint is being used to store the certificate of the certificate server, the trustpoint is locked so that it cannot be modified.
Before configuring the certificate server you can perform the following:
- Manually create and set up this trustpoint (using the crypto pki trustpointcommand), which allows you to specify an alternative RSA key pair (using the rsakeypair command).
- Specify that the initial autoenrollment key pair is generated on a specific device, such as a configured and available USB token, using the on command.
Note |
The automatically generated trustpoint and the certificate server certificate are not available for the certificate server device identity. Thus, any command-line interface (CLI) (such as the ip http secure-trustpoint command) that is used to specify the CA trustpoint to obtain certificates and authenticate the connecting client's certificate must point to an additional trustpoint configured on the certificate server device. |
If the server is a root certificate server, it uses the RSA key pairs and several other attributes to generate a self-signed certificate. The associated CA certificate has the following key usage extensions--Digital Signature, Certificate Sign, and CRL Sign.
After the CA certificate is generated, attributes can be changed only if the certificate server is destroyed.
Note |
A certificate server trustpoint must not be automatically enrolled using the auto-enroll command. Initial enrollment of the certificate server must be initiated manually and ongoing automatic rollover functionality may be configured with the auto-rollover command. For more information on automatic rollover functionality, see the section "Automatic CA Certificate and Key Rollover." |
Certificate Revocation Lists (CRLs)
By default, CRLs are issued once every 168 hours (1 calendar week). To specify a value other than the default value for issuing the CRL, execute the lifetime crl command. After the CRL is issued, it is written to the specified database location as ca-label.crl, where ca-label is the name of the certificate server.
CRLs can be distributed through SCEP, which is the default method, or a CRL distribution point (CDP), if configured and available. If you set up a CDP, use the cdp-urlcommand to specify the CDP location. If the cdp-url command is not specified, the CDP certificate extension is not included in the certificates that are issued by the certificate server. If the CDP location is not specified, Cisco IOS PKI clients automatically request a CRL from the certificate server with a SCEP GetCRL message. The CA then returns the CRL in a SCEP CertRep message to the client. Because all SCEP messages are enveloped and signed PKCS#7 data, the SCEP retrieval of the CRL from the certificate server is costly and not highly scalable. In very large networks, an HTTP CDP provides better scalability and is recommended if you have many peer devices that check CRLs. You may specify the CDP location by a simple HTTP URL string for example,
cdp-url http://my-cdp.company.com/filename.crl
The certificate server supports only one CDP; thus, all certificates that are issued include the same CDP.
If you have PKI clients that are not running Cisco IOS software and that do not support a SCEP GetCRL request and wish to use a CDP you may set up an external server to distribute CRLs and configure the CDP to point to that server. Or, you can specify a non-SCEP request for the retrieval of the CRL from the certificate server by specifying the cdp-url command with the URL in the following format where cs-addr is the location of the certificate server:
cdp-url http://cs-addr/cgi-bin/pkiclient.exe?operation=GetCRL
Note |
If your Cisco IOS CA is also configured as your HTTP CDP server, specify your CDP with the cdp-urlhttp://cs-addr/cgi-bin/pkiclient.exe?operation=GetCRL command syntax. |
It is the responsibility of the network administrator to ensure that the CRL is available from the location that is specified through the cdp-url command.
In order to force the parser to retain the embedded question mark within the specified location, enter Ctrl-v prior to the question mark. If this action is not taken, CRL retrieval through HTTP returns an error message.
The CDP location may be changed after the certificate server is running through the cdp-url command. New certificates contain the updated CDP location, but existing certificates are not reissued with the newly specified CDP location. When a new CRL is issued, the certificate server uses its current cached CRL to generate a new CRL. (When the certificate server is rebooted, it reloads the current CRL from the database.) A new CRL cannot be issued unless the current CRL has expired. After the current CRL expires, a new CRL is issued only after a certificate is revoked from the CLI.
Certificate Server Error Conditions
At startup, the certificate server checks the current configuration before issuing any certificates. It reports the last known error conditions through the show crypto pki servercommand output. Example errors can include any of the following conditions:
- Storage inaccessible
- Waiting for HTTP server
- Waiting for time setting
If the certificate server experiences a critical failure at any time, such as failing to publish a CRL, the certificate server automatically enters a disabled state. This state allows the network administrator to fix the condition; thereafter, the certificate server returns to the previous normal state.
Certificate Enrollment Using a Certificate Server
A certificate enrollment request functions as follows:
-
The certificate server receives the enrollment request from an end user, and the following actions occur:
- A request entry is created in the enrollment request database with the initial state. (See the table below for a complete list of certificate enrollment request states.)
- The certificate server refers to the CLI configuration (or the default behavior any time a parameter is not specified) to determine the authorization of the request. Thereafter, the state of the enrollment request is updated in the enrollment request database.
- At each SCEP query for a response, the certificate server examines the current request and performs one of the following actions:
If the connection of the client has closed, the certificate server waits for the client to request another certificate.
All enrollment requests transition through the certificate enrollment states that are defined in the table below. To see current enrollment requests, use the crypto pki server request pkcs10 command.
Table 3 | Certificate Enrollment Request State Descriptions |
Certificate Enrollment State |
Description |
---|---|
authorized |
The certificate server has authorized the request. |
denied |
The certificate server has denied the request for policy reasons. |
granted |
The CA core has generated the appropriate certificate for the certificate request. |
initial |
The request has been created by the SCEP server. |
malformed |
The certificate server has determined that the request is invalid for cryptographic reasons. |
pending |
The enrollment request must be manually accepted by the network administrator. |
SCEP Enrollment
All SCEP requests are treated as new certificate enrollment requests, even if the request specifies a duplicate subject name or public key pair as a previous certificate request.
Types of CA Servers Subordinate and Registration Authorities (RAs)
CA servers have the flexibility to be configured as a subordinate certificate server or an RA-mode certificate server.
Why Configure a Subordinate CA?
A subordinate certificate server provides all the same features as a root certificate server. The root RSA key pairs are extremely important in a PKI hierarchy, and it is often advantageous to keep them offline or archived. To support this requirement, PKI hierarchies allow for subordinate CAs that have been signed by the root authority. In this way, the root authority can be kept offline (except to issue occasional CRL updates), and the subordinate CA can be used during normal operation.
Why Configure an RA-Mode Certificate Server?
A Cisco IOS certificate server can be configured to run in RA mode. An RA offloads authentication and authorization responsibilities from a CA. When the RA receives a SCEP or manual enrollment request, the administrator can either reject or grant it on the basis of local policy. If the request is granted, it is forwarded to the issuing CA, and the CA automatically generates the certificate and return it to the RA. The client can later retrieve the granted certificate from the RA.
An RA is the authority charged with recording or verifying some or all of the data required for the CA to issue certificates. In many cases the CA undertakes all of the RA functions itself, but where a CA operates over a wide geographical area or when there is security concern over exposing the CA to direct network access, it may be administratively advisable to delegate some of the tasks to an RA and leave the CA to concentrate on its primary tasks of signing certificates and CRLs.
CA Server Compatibility
In Cisco IOS Release 15.1(2)T, new functionality was introduced that allows the IOS CA server in RA mode to interoperate with more than one type of CA server. See Configuring a Certificate Server to Run in RA Mode for more information.
Automatic CA Certificate and Key Rollover
CAs--root CAs, subordinate CAs, and RA-mode CAs--like their clients, have certificates and key pairs with expiration dates that need to be reissued when the current certificate and key pair are about to expire. When a root CA's certificate and key pair are expiring it must generate a self-signed rollover certificate and key pair. If a subordinate CA or an RA-mode CA's certificate and key pair are expiring, it requests a rollover certificate and key pair from its superior CA, obtaining the superior CA's new self-signed rollover certificates at the same time. The CA must distribute the new CA rollover certificate and keys too all its peers. This process, called rollover, allows for continuous operation of the network while the CAs and their clients are switching from an expiring CA certificate and key pair to a new CA certificate and key pair.
Rollover relies on the PKI infrastructure requirements of trust relationships and synchronized clocks. The PKI trust relationships allow (1) the new CA certificate to be authenticated, and (2) the rollover to be accomplished automatically without the loss of security. Synchronized clocks allow the rollover to be coordinated throughout your network.
Automatic CA Certificate Rollover How It Works
The CA server must have rollover configured. All levels of CAs must be automatically enrolled and have auto-rollover enabled. CA clients support rollover automatically when automatically enrolled. For more information about clients and automatic rollover, see the section " Automatic Certificate Enrollment " in the chapter "Configuring Certificate Enrollment for a PKI".
After CAs have rollover enabled and their clients are automatically enrolled, there are three stages to the automatic CA certificate rollover process.
Stage One: Active CA Certificate and Key Pair Only
In stage one, there is an active CA certificate and key pair only.
Stage Two: Rollover CA Certificate and Key Pair Generation and Distribution
In stage two, the rollover CA certificate and key pair are generated and distributed. The superior CA generates a rollover certificate and key pair. After the CA successfully saves its active configuration, the CA is ready to respond to client requests for the rollover certificate and key pair. When the superior CA receives a request for the new CA certificate and key pair from a client, the CA responds by sending the new rollover CA certificate and key pair to the requesting client. The clients store the rollover CA certificate and key pair.
Note |
When a CA generates its rollover certificate and key pair, it must be able to save its active configuration. If the current configuration has been altered, saving of the rollover certificate and key pair does not happen automatically. In this case, the administrator must save the configuration manually or rollover information is lost. |
Stage Three: Rollover CA Certificate and Key Pair Become the Active CA Certificate and Key Pair
In stage three, the rollover CA certificate and key pair become the active CA certificate and key pair. All devices that have stored a valid rollover CA certificate rename the rollover certificate to the active certificate and the once-active certificate and key pair are deleted.
After the CA certificate rollover, you may observe the following deviation from usual certificate lifetime and renewal time:
- The lifetime of the certificates issued during rollover is lower than the preconfigured value.
- In specific conditions, the renew time may be inferior to the configured percentage of the actual lifetime. The difference observed can be of up to 20% in cases where the certificate lifetime is less than one hour.
These differences are normal, and result from jitter (random time fluctuation) introduced by the algorithm on the Certificate server. This task is performed to avoid the hosts participating to the PKI synchronize their enrollment timer, which could result in congestion on the Certificate Server.
Note |
The lifetime fluctuations that occur do not affect proper functionning of the PKI, since the differences always result in a shorter lifetime, thus remaining within maximum configured lifetime for certificates. |
Support for Specifying a Cryptographic Hash Function
Secure Hash Algorithm (SHA) support allows a user to specify a cryptographic hash function for Cisco IOS certificate servers and clients. The cryptographic hash functions that can be specified are Message Digest algorithm 5 (MD5), SHA-1, SHA-256, SHA-384, or SHA-512.
Note |
Cisco no longer recommends using MD5; instead, you should use SHA-256. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. |
See the "Configuring a Subordinate Certificate Server" task for more information on specifying the hash (ca-trustpoint) and hash (cs-server) commands that are used to implement this feature.
How to Set Up and Deploy a Cisco IOS Certificate Server
- Generating a Certificate Server RSA Key Pair
- Configuring Certificate Servers
- Configuring Certificate Server Functionality
- Working with Automatic CA Certificate Rollover
- Maintaining Verifying and Troubleshooting the Certificate Server Certificates and the CA
Generating a Certificate Server RSA Key Pair
Perform this task to manually generate an RSA key pair for the certificate server. Manually generating a certificate server RSA key pair allows you to specify the type of key pair you want to generate, to create an exportable key pair for backup purposes, to specify the key pair storage location, or to specify the key generation location.
If you are running Cisco IOS Release 12.3(8)T or earlier releases, you may want to create an exportable certificate server key pair for backup, or archive purposes. If this task is not performed, the certificate server automatically generates a key pair, which is not marked as exportable. Automatic CA certificate archiving was introduced in Cisco IOS Release 12.3(11)T.
As of Cisco IOS Release 12.4(11)T and later releases, if your router has a USB token configured and available, the USB token can be used as cryptographic device in addition to a storage device. Using a USB token as a cryptographic device allows RSA operations such as key generation, signing, and authentication of credentials to be performed on a USB token. The private key never leaves the USB token and is not exportable. The public key is exportable. For titles of specific documents about configuring a USB token and making it available to use as a cryptographic device, see the "Related Documents" section.
Note |
It is recommended that the private key be kept in a secure location and that you regularly archive the certificate server database. |
Note |
Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. |
DETAILED STEPS
Example
The following example generates a general usage 1024-bit RSA key pair on a USB token with the label "ms2" with crypto engine debugging messages shown:
Router(config)# crypto key generate rsa on usbtoken0 label ms2 modulus 1024
The name for the keys will be: ms2
% The key modulus size is 1024 bits
% Generating 1024 bit RSA keys, keys will be on-token, non-exportable...
Jan 7 02:41:40.895: crypto_engine: Generate public/private keypair [OK]
Jan 7 02:44:09.623: crypto_engine: Create signature
Jan 7 02:44:10.467: crypto_engine: Verify signature
Jan 7 02:44:10.467: CryptoEngine0: CRYPTO_ISA_RSA_CREATE_PUBKEY(hw)(ipsec)
Jan 7 02:44:10.467: CryptoEngine0: CRYPTO_ISA_RSA_PUB_DECRYPT(hw)(ipsec)
Now, the on-token keys labeled "ms2" may be used for enrollment.
The following example shows the successful import of an encryption key to a configured and available USB tokens:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# crypto key import rsa encryption on usbtoken0 url nvram:e password % Importing public Encryption key or certificate PEM file... filename [e-encr.pub]? Reading file from nvram:e-encr.pub % Importing private Encryption key PEM file... Source filename [e-encr.prv]? Reading file from nvram:e-encr.prv % Key pair import succeeded.
Configuring Certificate Servers
- Prerequisites for Automatic CA Certificate Rollover
- Restrictions for Automatic CA Certificate Rollover
- Configuring a Certificate Server
- Configuring a Subordinate Certificate Server
- Configuring a Certificate Server to Run in RA Mode
- Configuring the Root Certificate Server to Delegate Enrollment Tasks to the RA Mode Certificate Server
- What to Do Next
Prerequisites for Automatic CA Certificate Rollover
When configuring a certificate server, for automatic CA certificate rollover to run successfully, the following prerequisites are applicable for your CA servers:
- You must be running Cisco IOS Release 12.4(2)T or a later release on your CA servers.
- Your CA server must be enabled and fully configured with a reliable time of day, an available key pair, a self-signed, valid CA certificate associated with the key pair, a CRL, an accessible storage device, and an active HTTP/SCEP server.
- CA clients must have successfully completed automatic enrollment and have autoenrollment enabled with the same certificate server.
Note |
If you are running Cisco IOS 12.4(2)T or earlier releases, only your root CA supports automatic CA certificate rollover functionality. Cisco IOS 12.4(4)T or later releases support all CAs--root CAs, subordinate CAs, and RA-mode CAs. |
Restrictions for Automatic CA Certificate Rollover
When configuring a certificate server, in order for automatic CA certificate rollover to run successfully, the following restrictions are applicable:
- SCEP must be used to support rollover. Any device that enrolls with the PKI using an alternative to SCEP as the certificate management protocol or mechanism (such as enrollment profiles, manual enrollment, or TFTP enrollment) is not be able to take advantage of the rollover functionality provided by SCEP.
- If you have automatic archive configured on your network and the archive fails, rollover does not occur because the certificate server does not enter the rollover state, and the rollover certificate and key pair is not automatically saved.
Configuring a Certificate Server
Perform this task to configure a Cisco IOS certificate server and enable automatic rollover.
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router(config)# ip http server |
Enables the HTTP server on your system. |
||
|
Example: Router(config)# crypto pki server server-pki |
Defines a label for the certificate server and enters certificate server configuration mode.
|
||
|
Example: Router(cs-server)# no shutdown |
(Optional) Enables the certificate server.
|
||
|
Example: Router(cs-server)# auto-rollover 90 |
(Optional) Enables the automated CA certificate rollover functionality.
|
Examples
The following example shows how to configure the certificate server "ca":
Router(config)# crypto pki server ca Router(cs-server)# no shutdown % Once you start the server, you can no longer change some of % the configuration. Are you sure you want to do this? [yes/no]: yes % Generating 1024 bit RSA keys ...[OK] % Certificate Server enabled. Router(cs-server)# end ! Router# show crypto pki server Certificate Server ca: Status: enabled, configured CA cert fingerprint: 5A856122 4051347F 55E8C246 866D0AC3 Granting mode is: manual Last certificate issued serial number: 0x1 CA certificate expiration timer: 19:44:57 GMT Oct 14 2006 CRL NextUpdate timer: 19:45:25 GMT Oct 22 2003 Current storage dir: nvram: Database Level: Complete - all issued certs written as <serialnum>.cer
The following example shows how to enable automated CA certificate rollover on the server mycs with the auto-rollover command. The show crypto pki servercommand shows that the automatic rollover has been configured on the server mycs with an overlap period of 25 days.
Router(config)# crypto pki server mycs Router(cs-server)# auto-rollover 25 Router(cs-server)# no shut %Some server settings cannot be changed after CA certificate generation. % Generating 1024 bit RSA keys, keys will be non-exportable...[OK] % Exporting Certificate Server signing certificate and keys... % Certificate Server enabled. Router(cs-server)# Router# show crypto pki server Certificate Server mycs: Status:enabled Server's configuration is locked (enter "shut" to unlock it) Issuer name:CN=mycs CA cert fingerprint:70AFECA9 211CDDCC 6AA9D7FF 3ADB03AE Granting mode is:manual Last certificate issued serial number:0x1 CA certificate expiration timer:00:49:26 PDT Jun 20 2008 CRL NextUpdate timer:00:49:29 PDT Jun 28 2005 Current storage dir:nvram: Database Level:Minimum - no cert data written to storage Auto-Rollover configured, overlap period 25 days Autorollover timer:00:49:26 PDT May 26 2008
Configuring a Subordinate Certificate Server
Perform this task to configure a subordinate certificate server to grant all or certain SCEP or manual certificate requests and to enable automatic rollover.
Note |
|
Note |
Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. |
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode. |
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router (config)# crypto pki trustpoint sub |
Declares the trustpoint that your subordinate certificate server should use and enters ca-trustpoint configuration mode. |
||
|
Example: Router (ca-trustpoint)# enrollment url http://caserver.myexample.com - or-Router (ca-trustpoint)# enrollment url http://[2001:DB8:1:1::1]:80 |
Specifies the following enrollment parameters of the CA:
|
||
|
Example: Router (ca-trustpoint)# hash sha384 |
(Optional) Specifies the hash function for the signature that the Cisco IOS client uses to sign its self-signed certificates. The Cisco IOS client uses the MD5 cryptographic hash function for self-signed certificates by default. Any of the following command algorithm keyword options can be specified to over-ride the default setting for the trustpoint. This setting then becomes the default cryptographic hash algorithm function for self-signed certificates by default.
|
||
|
Example: Router (ca-trustpoint)# exit |
Exits ca-trustpoint configuration mode. |
||
|
Example: Router(config)# crypto pki server sub |
Enables a Cisco IOS certificate server and enters cs-server configuration mode.
|
||
|
Example: Router(cs-server) # issuer-name CN=sub CA, O=Cisco, C=us |
(Optional) Specifies the DN as the CA issuer name for the certificate server. |
||
|
Example: Router(cs-server)# mode sub-cs |
Places the PKI server into sub-certificate server mode. |
||
|
Example: Router(cs-server)# auto-rollover 90 |
(Optional) Enables the automated CA certificate rollover functionality. |
||
|
Example: Router(cs-server)# grant auto rollover ca-cert |
(Optional) Automatically grants reenrollment requests for subordinate CAs and RA-mode CAs without operator intervention.
|
||
|
Example: Router(cs-server)# hash sha384 |
(Optional) Sets the hash function for the signature that the Cisco IOS certificate authority (CA) uses to sign all of the certificates issued by the server.
|
||
|
Example: Router(cs-server)# no shutdown |
Enables or reenables the certificate server. If this is the first time that a subordinate certificate server is enabled, the certificate server generates the key and obtain its signing certificate from the root certificate server. |
Examples
If the certificate server fails to enable or if the certificate server has trouble handling the request that has been configured, you can use the debug crypto pki server command to troubleshoot your configuration as shown in the following examples (Clock Not Set and Trustpoint Not Configured):
Router# debug crypto pki server
Clock Not Set
Router(config)# crypto pki server sub Router(cs-server)# mode sub-cs Router(cs-server)# no shutdown %Some server settings cannot be changed after CA certificate generation. % Please enter a passphrase to protect the private key % or type Return to exit Password: *Jan 6 20:57:37.667: CRYPTO_CS: enter FSM: input state initial, input signal no shut Re-enter password: % Generating 1024 bit RSA keys ... *Jan 6 20:57:45.303: CRYPTO_CS: starting enabling checks *Jan 6 20:57:45.303: CRYPTO_CS: key 'sub' does not exist; generated automatically[OK] % Time has not been set. Cannot start the Certificate server
Trustpoint Not Configured
Router(config)# crypto pki server sub Router(cs-server)# mode sub-cs Router(cs-server)# no shutdown %Some server settings cannot be changed after CA certificate generation. % Please enter a passphrase to protect the private key or type Return to exit Password: Jan 6 21:00:15.961: CRYPTO_CS: enter FSM: input state initial, input signal no shut. Jan 6 21:03:34.309: CRYPTO_CS: enter FSM: input state initial, input signal time set. Jan 6 21:03:34.313: CRYPTO_CS: exit FSM: new state initial. Jan 6 21:03:34.313: CRYPTO_CS: cs config has been unlocked Re-enter password: % Generating 1024 bit RSA keys ... Jan 6 21:03:44.413: CRYPTO_CS: starting enabling checks Jan 6 21:03:44.413: CRYPTO_CS: associated trust point 'sub' does not exist; generated automatically Jan 6 21:03:44.417: CRYPTO_CS: key 'sub' does not exist; generated automatically[OK] Jan 6 21:04:03.993: CRYPTO_CS: nvram filesystem Jan 6 21:04:04.077: CRYPTO_CS: serial number 0x1 written. You must specify an enrollment URL for this CA before you can authenticate it. % Failed to authenticate the Certificate Authority
If the certificate server fails to obtain its signing certificate from the root certificate server, you can use the debug crypto pki transactionscommand to troubleshoot your configuration as shown in the following example:
Router# debug crypto pki transactions
Jan 6 21:07:00.311: CRYPTO_CS: enter FSM: input state initial, input signal time set
Jan 6 21:07:00.311: CRYPTO_CS: exit FSM: new state initial
Jan 6 21:07:00.311: CRYPTO_CS: cs config has been unlocked no sh
%Some server settings cannot be changed after CA certificate generation.
% Please enter a passphrase to protect the private key % or type Return to exit
Password:
Jan 6 21:07:03.535: CRYPTO_CS: enter FSM: input state initial, input signal no shut
Re-enter password:
% Generating 1024 bit RSA keys ...
Jan 6 21:07:10.619: CRYPTO_CS: starting enabling checks
Jan 6 21:07:10.619: CRYPTO_CS: key 'sub' does not exist; generated automatically[OK]
Jan 6 21:07:20.535: %SSH-5-ENABLED: SSH 1.99 has been enabled
Jan 6 21:07:25.883: CRYPTO_CS: nvram filesystem
Jan 6 21:07:25.991: CRYPTO_CS: serial number 0x1 written.
Jan 6 21:07:27.863: CRYPTO_CS: created a new serial file.
Jan 6 21:07:27.863: CRYPTO_CS: authenticating the CA 'sub'
Jan 6 21:07:27.867: CRYPTO_PKI: Sending CA Certificate Request:
GET /cgi-bin/pkiclient.exe?operation=GetCACert&message=sub HTTP/1.0
User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI)
Jan 6 21:07:27.867: CRYPTO_PKI: can not resolve server name/IP address
Jan 6 21:07:27.871: CRYPTO_PKI: Using unresolved IP Address 192.0.2.6 Certificate has the following attributes:
Fingerprint MD5: 328ACC02 52B25DB8 22F8F104 B6055B5B
Fingerprint SHA1: 02FD799D DD40C7A8 61DC53AB 1E89A3EA 2A729EE2
% Do you accept this certificate? [yes/no]:
Jan 6 21:07:30.879: CRYPTO_PKI: http connection opened
Jan 6 21:07:30.903: CRYPTO_PKI: HTTP response header:
HTTP/1.1 200 OK
Date: Thu, 06 Jan 2005 21:07:30 GMT
Server: server-IOS
Content-Type: application/x-x509-ca-cert
Expires: Thu, 06 Jan 2005 21:07:30 GMT
Last-Modified: Thu, 06 Jan 2005 21:07:30 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Accept-Ranges: none
Content-Type indicates we have received a CA certificate.
Jan 6 21:07:30.903: Received 507 bytes from server as CA certificate:
Jan 6 21:07:30.907: CRYPTO_PKI: transaction GetCACert completed
Jan 6 21:07:30.907: CRYPTO_PKI: CA certificate received.
Jan 6 21:07:30.907: CRYPTO_PKI: CA certificate received.
Jan 6 21:07:30.927: CRYPTO_PKI: crypto_pki_authenticate_tp_cert()
Jan 6 21:07:30.927: CRYPTO_PKI: trustpoint sub authentication status = 0 y Trustpoint CA certificate accepted.%
% Certificate request sent to Certificate Authority
% Enrollment in progress...
Router (cs-server)#
Jan 6 21:07:51.772: CRYPTO_CA: certificate not found
Jan 6 21:07:51.772: CRYPTO_CA: certificate not found
Jan 6 21:07:52.460: CRYPTO_CS: Publishing 213 bytes to crl file nvram:sub.crl
Jan 6 21:07:54.348: CRYPTO_CS: enrolling the server's trustpoint 'sub'
Jan 6 21:07:54.352: CRYPTO_CS: exit FSM: new state check failed
Jan 6 21:07:54.352: CRYPTO_CS: cs config has been locked
Jan 6 21:07:54.356: CRYPTO_PKI: transaction PKCSReq completed
Jan 6 21:07:54.356: CRYPTO_PKI: status:
Jan 6 21:07:55.016: CRYPTO_PKI: Certificate Request Fingerprint MD5: 1BA027DB 1C7860C7 EC188F65 64356C80
Jan 6 21:07:55.016: CRYPTO_PKI: Certificate Request Fingerprint SHA1: 840DB52C E17614CB 0C7BE187 0DFC884D D32CAA75
Jan 6 21:07:56.508: CRYPTO_PKI: can not resolve server name/IP address
Jan 6 21:07:56.508: CRYPTO_PKI: Using unresolved IP Address 192.0.2.6
Jan 6 21:07:56.516: CRYPTO_PKI: http connection opened
Jan 6 21:07:59.136: CRYPTO_PKI: received msg of 776 bytes
Jan 6 21:07:59.136: CRYPTO_PKI: HTTP response header:
HTTP/1.1 200 OK
Date: Thu, 06 Jan 2005 21:07:57 GMT
Server: server-IOS
Content-Type: application/x-pki-message
Expires: Thu, 06 Jan 2005 21:07:57 GMT
Last-Modified: Thu, 06 Jan 2005 21:07:57 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Accept-Ranges: none
Jan 6 21:07:59.324: The PKCS #7 message has 1 verified signers.
Jan 6 21:07:59.324: signing cert: issuer=cn=root1
Jan 6 21:07:59.324: Signed Attributes:
Jan 6 21:07:59.328: CRYPTO_PKI: status = 102: certificate request pending
Jan 6 21:08:00.788: CRYPTO_PKI: can not resolve server name/IP address
Jan 6 21:08:00.788: CRYPTO_PKI: Using unresolved IP Address 192.0.2.6
Jan 6 21:08:00.796: CRYPTO_PKI: http connection opened
Jan 6 21:08:11.804: CRYPTO_PKI: received msg of 776 bytes
Jan 6 21:08:11.804: CRYPTO_PKI: HTTP response header: HTTP/1.1 200 OK
Date: Thu, 06 Jan 2005 21:08:01 GMT
Server: server-IOS
Content-Type: application/x-pki-message
Expires: Thu, 06 Jan 2005 21:08:01 GMT
Last-Modified: Thu, 06 Jan 2005 21:08:01 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Accept-Ranges: none
Jan 6 21:08:11.992: The PKCS #7 message has 1 verified signers.
Jan 6 21:08:11.992: signing cert: issuer=cn=root1
Jan 6 21:08:11.996: Signed Attributes:
Jan 6 21:08:11.996: CRYPTO_PKI: status = 102: certificate request pending
Jan 6 21:08:21.996: CRYPTO_PKI: All sockets are closed for trustpoint sub.
Jan 6 21:08:31.996: CRYPTO_PKI: All sockets are closed for trustpoint sub.
Jan 6 21:08:41.996: CRYPTO_PKI: All sockets are closed for trustpoint sub.
Jan 6 21:08:51.996: CRYPTO_PKI: All sockets are closed for trustpoint sub.
Jan 6 21:09:01.996: CRYPTO_PKI: All sockets are closed for trustpoint sub.
Jan 6 21:09:11.996: CRYPTO_PKI: resend GetCertInitial, 1
Jan 6 21:09:11.996: CRYPTO_PKI: All sockets are closed for trustpoint sub.
Jan 6 21:09:11.996: CRYPTO_PKI: resend GetCertInitial for session: 0
Jan 6 21:09:11.996: CRYPTO_PKI: can not resolve server name/IP address
Jan 6 21:09:11.996: CRYPTO_PKI: Using unresolved IP Address 192.0.2.6
Jan 6 21:09:12.024: CRYPTO_PKI: http connection opened% Exporting Certificate Server signing certificate and keys...
Jan 6 21:09:14.784: CRYPTO_PKI: received msg of 1611 bytes
Jan 6 21:09:14.784: CRYPTO_PKI: HTTP response header:
HTTP/1.1 200 OK
Date: Thu, 06 Jan 2005 21:09:13 GMT
Server: server-IOS
Content-Type: application/x-pki-message
Expires: Thu, 06 Jan 2005 21:09:13 GMT
Last-Modified: Thu, 06 Jan 2005 21:09:13 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Accept-Ranges: none
Jan 6 21:09:14.972: The PKCS #7 message has 1 verified signers.
Jan 6 21:09:14.972: signing cert: issuer=cn=root1
Jan 6 21:09:14.972: Signed Attributes:
Jan 6 21:09:14.976: CRYPTO_PKI: status = 100: certificate is granted
Jan 6 21:09:15.668: The PKCS #7 message contains 1 certs and 0 crls.
Jan 6 21:09:15.688: Newly-issued Router Cert: issuer=cn=root serial=2
Jan 6 21:09:15.688: start date: 21:08:03 GMT Jan 6 2005
Jan 6 21:09:15.688: end date: 21:08:03 GMT Jan 6 2006
Jan 6 21:09:15.688: Router date: 21:09:15 GMT Jan 6 2005
Jan 6 21:09:15.692: Received router cert from CA
Jan 6 21:09:15.740: CRYPTO_CA: certificate not found
Jan 6 21:09:15.744: CRYPTO_PKI: All enrollment requests completed for trustpoint sub.
Jan 6 21:09:15.744: %PKI-6-CERTRET: Certificate received from Certificate Authority
Jan 6 21:09:15.744: CRYPTO_PKI: All enrollment requests completed for trustpoint sub.
Jan 6 21:09:15.744: CRYPTO_PKI: All enrollment requests completed for trustpoint sub.
Jan 6 21:09:15.748: CRYPTO_CS: enter FSM: input state check failed, input signal cert configured
Jan 6 21:09:15.748: CRYPTO_CS: starting enabling checks
Jan 6 21:09:15.748: CRYPTO_CS: nvram filesystem
Jan 6 21:09:15.796: CRYPTO_CS: found existing serial file.
Jan 6 21:09:15.820: CRYPTO_CS: old router cert flag 0x4
Jan 6 21:09:15.820: CRYPTO_CS: new router cert flag 0x44
Jan 6 21:09:18.432: CRYPTO_CS: DB version 1
Jan 6 21:09:18.432: CRYPTO_CS: last issued serial number is 0x1
Jan 6 21:09:18.480: CRYPTO_CS: CRL file sub.crl exists.
Jan 6 21:09:18.480: CRYPTO_CS: Read 213 bytes from crl file sub.crl.
Jan 6 21:09:18.532: CRYPTO_CS: SCEP server started
Jan 6 21:09:18.532: CRYPTO_CS: exit FSM: new state enabled
Jan 6 21:09:18.536: CRYPTO_CS: cs config has been locked
Jan 6 21:09:18.536: CRYPTO_PKI: All enrollment requests completed for trustpoint sub.
If the certificate server fails to enable or if the certificate server has trouble handling the request that has been configured, you can use the debug crypto pki server command to troubleshoot the progress of an enrollment. This command can also be used to debug the root CA (turn it on at the root CA).
Configuring a Certificate Server to Run in RA Mode
The Cisco IOS certificate server can act as an RA for a Cisco IOS CA or another third party CA. Read the details in Step 8 for more information about the transparent keyword option if a third-party CA is used.
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router (config)# crypto pki trustpoint ra-server |
Declares the trustpoint that your RA mode certificate server should use and enters ca-trustpoint configuration mode. |
||
|
Example: Router (ca-trustpoint)# enrollment url http://ca-server.company.com |
Specifies the enrollment URL of the issuing CA certificate server (root certificate server). |
||
|
Example: Router (ca-trustpoint)# subject-name cn=ioscs RA |
(Optional) Specifies the subject name the RA uses.
|
||
|
Example: Router (ca-trustpoint)# exit |
Exits ca-trustpoint configuration mode. |
||
|
Example: Router(config)# crypto pki server ra-server |
Enables a Cisco IOS certificate server and enters cs-server configuration mode.
|
||
|
Example: Router(cs-server)# mode ra |
Places the PKI server into RA certificate server mode. Use the transparent keyword to allow the CA server in RA mode to interoperate with more than one type of CA server. When the transparent keyword is used, the original PKCS#10 enrollment message is not re-signed and is forwarded unchanged. This enrollment message makes the IOS RA certificate server work with CA servers like the Microsoft CA server. |
||
|
Example: Router(cs-server)# auto-rollover 90 |
(Optional) Enables the automatic CA certificate rollover functionality.
|
||
|
Example: Router(cs-server)# grant auto rollover ra-cert |
(Optional) Automatically grants reenrollment requests for subordinate CAs and RA-mode CAs without operator intervention.
If this is the first time that a subordinate certificate server is enabled and enrolled, the certificate request must be manually granted. |
||
|
Example: Router(cs-server)# no shutdown |
Enables the certificate server.
|
||
|
Example: Router(cs-server)# no shutdown |
Reenables the certificate server. |
Configuring the Root Certificate Server to Delegate Enrollment Tasks to the RA Mode Certificate Server
Perform the following steps on the router that is running the issuing certificate server; that is, configure the root certificate server that is delegating enrollment tasks to the RA mode certificate server.
Note |
Granting enrollment requests for an RA is essentially the same process as granting enrollment requests for client devices--except that enrollment requests for an RA are displayed in the section "RA certificate requests" of the command output for the crypto pki server info-requests command. |
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router > enable |
Enables privileged EXEC mode.
|
||
|
Example: Router# crypto pki server root-server info requests |
Displays the outstanding RA certificate request.
|
||
|
Example: Router# crypto pki server root-server grant 9 |
Grants the pending RA certificate request.
|
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router (config)# crypto pki server root-server |
Enables a Cisco IOS certificate server and enters cs-server configuration mode. |
||
|
Example: Router(cs-server)# grant ra-auto |
(Optional) Specifies that all enrollment requests from an RA are to be granted automatically.
|
What to Do Next
After you have configured a certificate server, you can use the preconfigured default values or specify values through the CLI for the functionality of the certificate server. If you choose to specify values other than the defaults, see the following section, "Configuring Certificate Server Functionality."
Configuring Certificate Server Functionality
After you have enabled a certificate server and are in certificate server configuration mode, use any of the steps in this task to configure basic certificate server functionality values other than the default values.
- Certificate Server Default Values and Recommended Values
- Certificate Server File Storage and Publication Locations
Certificate Server Default Values and Recommended Values
The default values for a certificate server are intended to address a relatively small network (of about ten devices). For example, the database settings are minimal (through the database level minimalcommand) and the certificate server handles all CRL requests through SCEP. For larger networks, it is recommended that you use either the database setting "names" or "complete" (as described in the database level command) for possible audit and revocation purposes. Depending on the CRL checking policy, you should also use an external CDP in a larger network.
Certificate Server File Storage and Publication Locations
You have the flexibility to store file types to different storage and publication locations.
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router (cs-server)# database url tftp://cert-svr-db.company.com |
Specifies the primary location where database entries for the certificate server are written. If this command is not specified, all database entries are written to NVRAM. |
||
|
Example: Router (cs-server)# database url ser nvram: |
Specifies certificate server critical file storage location by file type.
|
||
|
Example: Router (cs-server)# database url crl publish tftp://csdb_specific_crl_files.company.com |
Specifies certificate server publish location by file type.
|
||
|
Example: Router (cs-server)# database level complete |
Controls what type of data is stored in the certificate enrollment database.
|
||
|
Example: Router (cs-server)# database username user password PASSWORD |
(Optional) Sets a username and password when a user is required to access a primary certificate enrollment database storage location. |
||
|
Example: Router (cs-server)# database archive pem |
(Optional) Sets the CA key and CA certificate archive format and password to encrypt the file. The default value is pkcs12, so if this subcommand is not configured, autoarchiving continues, and the PKCS12 format is used.
|
||
|
Example: Router (cs-server)# issuer-name my-server |
(Optional) Sets the CA issuer name to the specified distinguished name (DN-string). The default value is as follows: issuer-name cn={cs-label }. |
||
|
Example: Router (cs-server)# lifetime certificate 888 |
(Optional) Specifies the lifetime, in days, of a CA certificate or a certificate. Valid values range from 1 day to 1825 days. The default CA certificate lifetime is 3 years; the default certificate lifetime is 1 year. The maximum certificate lifetime is 1 month less than the lifetime of the CA certificate. |
||
|
Example: Router (cs-server)# lifetime crl 333 |
(Optional) Defines the lifetime, in hours, of the CRL that is used by the certificate server. Maximum lifetime value is 336 hours (2 weeks). The default value is 168 hours (1 week). |
||
|
Example: Router (cs-server)# lifetime enrollment-request 888 |
(Optional) Specifies how long an enrollment request should stay in the enrollment database before being removed. Maximum lifetime is 1000 hours. |
||
|
Example: Router (cs-server)# cdp-url http://my-cdp.company.com |
(Optional) Defines the CDP location to be used in the certificates that are issued by the certificate server.
If you have PKI clients that are not running Cisco IOS software and that do not support a SCEP GetCRL request, use the following URL format: http://server.company.com/certEnroll/filename.crl Or, if your Cisco IOS certificate server is also configured as your CDP, use the following URL format http://cs-addr/cgi-bin/pkiclient.exe?operation=GetCRL where cs-addr is the location of the certificate server. In order to force the parser to retain the embedded question mark within the specified location, enter Ctrl-v prior to the question mark. If this action is not taken, CRL retrieval through HTTP returns an error message.
|
||
|
Example: Router (cs-server)# no shutdown |
Enables the certificate server. You should issue this command only after you have completely configured your certificate server. |
Examples
The following example shows how to configure a CDP location where the PKI clients do not support SCEP GetCRL requests:
Router(config)# crypto pki server aaa Router(cs-server)# database level minimum Router(cs-server)# database url tftp://10.1.1.1/username1/ Router(cs-server)# issuer-name CN=aaa
Router(cs-server)# cdp-url http://server.company.com/certEnroll/aaa.crl
After a certificate server has been enabled on a router, the show crypto pki servercommand displays the following output:
Router# show crypto pki server
Certificate Server status:enabled, configured
Granting mode is:manual
Last certificate issued serial number:0x1
CA certificate expiration timer:19:31:15 PST Nov 17 2006
CRL NextUpdate timer:19:31:15 PST Nov 25 2003
Current storage dir:nvram:
Database Level:Minimum - no cert data written to storage
Working with Automatic CA Certificate Rollover
- Starting Automated CA Certificate Rollover Immediately
- Requesting a Certificate Server Client Rollover Certificate
- Exporting a CA Rollover Certificate
Starting Automated CA Certificate Rollover Immediately
Use this task to initiate the automated CA certificate rollover process immediately on your root CA server.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# crypto pki server mycs rollover |
Immediately starts the CA certificate rollover process by generating a shadow CA certificate. To delete the CA certificate rollover certificate and keys, use the cancel keyword. |
Requesting a Certificate Server Client Rollover Certificate
Use this task to request a certificate server client's rollover certificate.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode. |
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# crypto pki server mycs rollover request pkcs10 terminal |
Requests a client rollover certificate from the server. |
Example
The following example shows a rollover certificate request being inputted into the server:
Router# crypto pki server mycs rollover request pkcs10 terminal
% Enter Base64 encoded or PEM formatted PKCS10 enrollment request.
% End with a blank line or "quit" on a line by itself.
-----BEGIN CERTIFICATE REQUEST-----
MIIBUTCBuwIBADASMRAwDgYDVQQDEwdOZXdSb290MIGfMA0GCSqGSIb3DQEBAQUA
A4GNADCBiQKBgQDMHeev1ERSs320zbLQQk+3lhV/R2HpYQ/iM6uT1jkJf5iy0UPR
wF/X16yUNmG+ObiGiW9fsASF0nxZw+fO7d2X2yh1PakfvF2wbP27C/sgJNOw9uPf
sBxEc40Xe0d5FMh0YKOSAShfZYKOflnyQR2Drmm2x/33QGol5QyRvjkeWQIDAQAB
oAAwDQYJKoZIhvcNAQEEBQADgYEALM90r4d79X6vxhD0qjuYJXfBCOvv4FNyFsjr
aBS/y6CnNVYySF8UBUohXYIGTWf4I4+sj6i8gYfoFUW1/L82djS18TLrUr6wpCOs
RqfAfps7HW1e4cizOfjAUU+C7lNcobCAhwF1o6q2nIEjpQ/2yfK9O7sb3SCJZBfe
eW3tyCo=
-----END CERTIFICATE REQUEST-----
Exporting a CA Rollover Certificate
Use this task to export a CA rollover certificate.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# crypto pki export mycs pem terminal rollover |
Exports a CA shadow certificate. |
Maintaining Verifying and Troubleshooting the Certificate Server Certificates and the CA
- Managing the Enrollment Request Database
- Removing Requests from the Enrollment Request Database
- Deleting a Certificate Server
- Verifying and Troubleshooting Certificate Server and CA Status
- Verifying CA Certificate Information
Managing the Enrollment Request Database
SCEP supports two client authentication mechanisms--manual and preshared key. Manual enrollment requires the administrator at the CA server to specifically authorize the enrollment requests; enrollment using preshared keys allows the administrator to preauthorize enrollment requests by generating a one-time password (OTP).
Use any of the optional steps within this task to help manage the enrollment request database by performing functions such as specifying enrollment processing parameters that are to be used by SCEP and by controlling the run-time behavior or the certificate server.
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
||
|
Example: Router# crypto pki server mycs grant all |
Grants all or specific SCEP requests. |
||
|
Example:
Example: Router# crypto pki server mycs reject all |
Rejects all or specific SCEP requests. |
||
|
Example: Router# crypto pki server mycs password generate 75 |
Generates a OTP for SCEP requests.
|
||
|
Example: Router# crypto pki server mycs revoke 3 |
Revokes a certificate on the basis of its serial number. |
||
|
Example: Router# crypto pki server mycs request pkcs10 terminal pem |
Manually adds either a base64-encoded or PEM-formatted PKCS10 certificate enrollment request to the request database. After the certificate is granted, it is displayed on the console terminal using base64 encoding.
|
||
|
Example: Router# crypto pki server mycs info crl |
Displays information regarding the status of the current CRL. |
||
|
Example: Router# crypto pki server mycs info requests |
Displays all outstanding certificate enrollment requests. |
Removing Requests from the Enrollment Request Database
After the certificate server receives an enrollment request, the server can leave the request in a pending state, reject it, or grant it. The request stays in the enrollment request database for 1 week until the client polls the certificate server for the result of the request. If the client exits and never polls the certificate server, you can remove either individual requests or all requests from the database.
Use this task to remove requests from the database and allow the server to be returned to a clean slate with respect to the keys and transaction IDs. Also, you can use this task to help troubleshoot a SCEP client that may not be behaving properly.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# crypto pki server mycs remove 15 |
Removes enrollment requests from the enrollment request database. |
Deleting a Certificate Server
Users can delete a certificate server from the PKI configuration if they no longer want it on the configuration. Typically, a subordinate certificate server or an RA is being deleted. However, users may delete a root certificate server if they are moving it to another device through the archived RSA keys.
Perform this task to delete a certificate server from your PKI configuration.
Note |
When a certificate server is deleted, the associated trustpoint and key are also deleted. |
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router > enable |
Enables privileged EXEC mode.
|
|
Example: Router # configure terminal |
Enters global configuration mode. |
|
Example: Router (config)# no crypto pki server mycs |
Deletes a certificate server and associated trustpoint and key. |
Verifying and Troubleshooting Certificate Server and CA Status
Use any of the following optional steps to verify the status of the certificate server or the CA.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# debug crypto pki server |
Enables debugging for a crypto PKI certificate server.
|
|
Example: Router# dir slot0: |
Displays a list of files on a file system.
|
Verifying CA Certificate Information
To obtain information relating to the CA certificates including the certificate server rollover process, rollover certificates, and timers, you may use any of the following commands.
Note |
These commands are not exclusive to shadow certificate information. If no shadow certificate exists, the following commands display the active certificate information. |
DETAILED STEPS
Step 1 | The crypto pki certificate chain command can be used to view the certificate chain details and to distinguish the current active certificate from the rollover certificate in the certificate chain. The following example shows a certificate chain with an active CA certificate and a shadow, or rollover, certificate: Example:
Router(config)# crypto pki certificate chain mica
certificate 06
certificate ca 01
! This is the peer's shadow PKI certificate.
certificate rollover 0B
! This is the CA shadow PKI certificate
certificate rollover ca 0A
|
Step 2 | The crypto pki server info requests command displays all outstanding certificate enrollment requests The following example shows the output for shadow PKI certificate information requests: Example: Router# crypto pki server myca info requests Enrollment Request Database: RA certificate requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- RA rollover certificate requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- Router certificates requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- 1 pending A426AF07FE3A4BB69062E0E47198E5BF hostname=client Router rollover certificates requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- 2 pending B69062E0E47198E5BFA426AF07FE3A4B hostname=client |
Step 3 | The show crypto pki certificates command displays information about your certificate, the certification authority certificate, shadow certificates, and any registration authority certificates. The following example displays the certificate of the router and the certificate of the CA. There is no shadow certificate available. A single, general-purpose RSA key pair was previously generated, and a certificate was requested but not received for that key pair. Note that the certificate status of the router shows "Pending." After the router receives its certificate from the CA, the Status field changes to "Available" in the show output. Example:
Router# show crypto pki certificates
Certificate
Subject Name
Name: myrouter.example.com
IP Address: 192.0.2.1
Serial Number: 04806682
Status: Pending
Key Usage: General Purpose
Fingerprint: 428125BD A3419600 3F6C7831 6CD8FA95 00000000
CA Certificate
Status: Available
Certificate Serial Number: 3051DF7123BEE31B8341DFE4B3A338E5F
Key Usage: Not Set
|
Step 4 | The show crypto pki server command displays the current state and configuration of the certificate server. The following example shows that the certificate server "routercs" has rollover configured. The CA auto-rollover time has occurred and the rollover, or shadow, PKI certificate is available. The status shows the rollover certificate fingerprint and rollover CA certificate expiration timer information. Example:
Router# show crypto pki server
Certificate Server routercs:
Status: enabled, configured
Issuer name: CN=walnutcs
CA cert fingerprint: 800F5944 74337E5B C2DF6C52 9A7B1BDB
Granting mode is: auto
Last certificate issued serial number: 0x7
CA certificate expiration timer: 22:10:29 GMT Jan 29 2007
CRL NextUpdate timer: 21:50:56 GMT Mar 5 2004
Current storage dir: nvram:
Database Level: Minimum - no cert data written to storage
Rollover status: available for rollover
Rollover CA cert fingerprint: 6AAF5944 74227A5B 23DF3E52 9A7F1FEF
Rollover CA certificate expiration timer: 22:10:29 GMT Jan 29 2017
|
Step 5 | The show crypto pki trustpointscommand displays the trustpoints that are configured in the router. The following output shows that a shadow CA certificate is available and shows the SCEP capabilities reported during the last enrollment operation: Example:
Router# show crypto pki trustpoints
Trustpoint vpn:
Subject Name:
cn=Cisco SSL CA
o=Cisco Systems
Serial Number: 0FFEBBDC1B6F6D9D0EA7875875E4C695
Certificate configured.
Rollover certificate configured.
Enrollment Protocol:
SCEPv1, PKI Rollover |
Configuration Examples for Using a Certificate Server
- Configuring Specific Storage and Publication Locations Examples
- Removing Enrollment Requests from the Enrollment Request Database Examples
- Autoarchiving the Certificate Server Root Keys Examples
- Restoring a Certificate Server from Certificate Server Backup Files Examples
- Subordinate Certificate Server Example
- RA Mode Certificate Server Example
- Enabling CA Certificate Rollover to Start Immediately Example
Configuring Specific Storage and Publication Locations Examples
The following example shows the configuration of a minimal local file system, so that the certificate server can respond quickly to certificate requests. The .ser and .crl files are stored on the local Cisco IOS file system for fast access, and a copy of all of the .crt files are published to a remote location for long-term logging.
crypto pki server myserver !Pick your database level. database level minimum !Specify a location for the .crt files that is different than the default local !Cisco IOS file system. database url crt publish http://url username user1 password secret
Note |
Free space on the local file system should be monitored, in case the .crl file becomes too large. |
The following example shows the configuration of a primary storage location for critical files, a specific storage location for the critical file serial number file, the main certificate server database file, and a password protected file publication location for the CRL file:
Router(config)# crypto pki server mycs Router(cs-server)# database url ftp://cs-db.company.com ! % Server database url was changed. You need to move the % existing database to the new location. ! Router(cs-server)# database url ser nvram: Router(cs-server)# database url crl publish ftp://crl.company.com username myname password mypassword Router(cs-server)# end
The following output displays the specified primary storage location and critical file storage locations specified:
Router# show Sep 3 20:19:34.216: %SYS-5-CONFIG_I: Configured from console by user on console Router# show crypto pki server Certificate Server mycs: Status: disabled Server's configuration is unlocked (enter "no shut" to lock it) Issuer name: CN=mycs CA cert fingerprint: -Not found- Granting mode is: manual Last certificate issued serial number: 0x0 CA certificate expiration timer: 00:00:00 GMT Jan 1 1970 CRL not present. Current primary storage dir: ftp://cs-db.company.com Current storage dir for .ser files: nvram: Database Level: Minimum - no cert data written to storage The following output displays all storage and publication locations. The serial number file (.ser) is stored in NVRAM. The CRL file will be published to ftp://crl.company.com with a username and password. All other critical files will be stored to the primary location, ftp://cs-db.company.com. Router# show running-config section crypto pki server crypto pki server mycs shutdown database url ftp://cs-db.company.com database url crl publish ftp://crl.company.com username myname password 7 12141C0713181F13253920 database url ser nvram: Router#
Removing Enrollment Requests from the Enrollment Request Database Examples
The following examples show both the enrollment requests that are currently in the enrollment request database and the result after one of the enrollment requests has been removed from the database.
Enrollment Request Currently in the Enrollment Request Database
The following example shows that the crypto pki server info requests command has been used to display the enrollment requests that are currently in the Enrollment Request Database:
Router# crypto pki server myserver info requests
Enrollment Request Database:
RA certificate requests:
ReqID State Fingerprint SubjectName
------------------------------------------------------------------------
Router certificates requests:
ReqID State Fingerprint SubjectName
------------------------------------------------------------------------
2 pending 1B07F3021DAAB0F19F35DA25D01D8567 hostname=host1.company.com
1 denied 5322459D2DC70B3F8EF3D03A795CF636 hostname=host2.company.com
crypto pki server remove Command Used to Remove One Enrollment Request
The following example shows that the crypto pki server remove command has been used to remove Enrollment Request 1:
Router# crypto pki server myserver remove 1
Enrollment Request Database After the Removal of One Enrollment Request
The following example shows the result of the removal of Enrollment Request 1 from the Enrollment Request Database:
Router# crypto pki server mycs info requests
Enrollment Request Database:
RA certificate requests:
ReqID State Fingerprint SubjectName
-----------------------------------------------------------------
Router certificates requests:
ReqID State Fingerprint SubjectName
-----------------------------------------------------------------
2 pending 1B07F3021DAAB0F19F35DA25D01D8567 hostname=host1.company.com
Autoarchiving the Certificate Server Root Keys Examples
The following output configurations and examples show what you might see if the database archive command has not been configured (that is, configured using the default value); if the database archive command has been configured to set the CA certificate and CA key archive format as PEM, without configuring a password; and if the database archive command has been configured to set the CA certificate and CA key archive format as PKCS12, with a password configured. The last example is sample content of a PEM-formatted archive file.
database archive Command Not Configured
Note |
The default is PKCS12, and the prompt for the password appears after the no shutdown command has been issued. |
Router (config)# crypto pki server myserver Router (cs-server)# no shutdown % Generating 1024 bit RSA keys ...[OK] % Ready to generate the CA certificate. %Some server settings cannot be changed after CA certificate generation. Are you sure you want to do this? [yes/no]: y % Exporting Certificate Server signing certificate and keys... ! Note the next two lines, which are asking for a password. % Please enter a passphrase to protect the private key. Password: % Certificate Server enabled. Router (cs-server)# end Router# dir nvram: Directory of nvram:/ 125 -rw- 1693 <no date> startup-config 126 ---- 5 <no date> private-config 1 -rw- 32 <no date> myserver.ser 2 -rw- 214 <no date> myserver.crl ! Note the next line, which indicates PKCS12 format. 3 -rw- 1499 <no date> myserver.p12
database archive Command and pem Keyword Configured
Note |
The prompt for the password appears after the no shutdown command has been issued. |
Router (config)# crypto pki server myserver Router (cs-server)# database archive pem Router (cs-server)# no shutdown % Generating 1024 bit RSA keys ...[OK] % Ready to generate the CA certificate. %Some server settings cannot be changed after CA certificate generation. Are you sure you want to do this? [yes/no]: y % Exporting Certificate Server signing certificate and keys... !Note the next two lines, which are asking for a password. % Please enter a passphrase to protect the private key. Password: % Certificate Server enabled. Router (cs-server)# end Router# dir nvram Directory of nvram:/ 125 -rw- 1693 <no date> startup-config 126 ---- 5 <no date> private-config 1 -rw- 32 <no date> myserver.ser 2 -rw- 214 <no date> myserver.crl ! Note the next line showing that the format is PEM. 3 -rw- 1705 <no date> myserver.pem
database archive Command and pkcs12 Keyword (and Password) Configured
Note |
When the password is entered, it is encrypted. However, it is recommended that you remove the password from the configuration after the archive has finished. |
Router (config)# crypto pki server myserver Router (cs-server)# database archive pkcs12 password cisco123 Router (cs-server)# no shutdown % Generating 1024 bit RSA keys ...[OK] % Ready to generate the CA certificate. % Some server settings cannot be changed after CA certificate generation. Are you sure you want to do this? [yes/no]: y % Exporting Certificate Server signing certificate and keys... ! Note that you are not being prompted for a password. % Certificate Server enabled. Router (cs-server)# end Router# dir nvram: Directory of nvram:/ 125 -rw- 1693 <no date> startup-config 126 ---- 5 <no date> private-config 1 -rw- 32 <no date> myserver.ser 2 -rw- 214 <no date> myserver.crl ! Note that the next line indicates that the format is PKCS12. 3 -rw- 1499 <no date> myserver.p12
PEM-Formatted Archive
The following sample output shows that autoarchiving has been configured in PEM file format. The archive consists of the CA certificate and the CA private key. To restore the certificate server using the backup, you would have to import the PEM-formatted CA certificate and CA key individually.
Note |
In addition to the CA certificate and CA key archive files, you should also back up the serial file (.ser) and the CRL file (.crl) regularly. The serial file and the CRL file are both critical for CA operation if you need to restore your certificate server. |
Router# more nvram:mycs.pem
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
!The private key is protected by the password that is
configured in "database archive pem password pwd" or that
is entered when you are prompted for the password.
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,106CE91FFD0A075E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-----END RSA PRIVATE KEY-----
Restoring a Certificate Server from Certificate Server Backup Files Examples
The following example shows that restoration is from a PKCS12 archive and that the database URL is NVRAM (the default).
Router# copy tftp://192.0.2.71/backup.ser nvram:mycs.ser Destination filename [mycs.ser]? 32 bytes copied in 1.320 secs (24 bytes/sec) Router# copy tftp://192.0.2.71/backup.crl nvram:mycs.crl Destination filename [mycs.crl]? 214 bytes copied in 1.324 secs (162 bytes/sec) Router# configure terminal Router (config)# crypto pki import mycs pkcs12 tftp://192.0.2.71/backup.p12 cisco123 Source filename [backup.p12]? CRYPTO_PKI: Imported PKCS12 file successfully. Router (config)# crypto pki server mycs ! fill in any certificate server configuration here Router (cs-server)# no shutdown % Certificate Server enabled. Router (cs-server)# end Router# show crypto pki server Certificate Server mycs: Status: enabled Server's current state: enabled Issuer name: CN=mycs CA cert fingerprint: 34885330 B13EAD45 196DA461 B43E813F Granting mode is: manual Last certificate issued serial number: 0x1 CA certificate expiration timer: 01:49:13 GMT Aug 28 2007 CRL NextUpdate timer: 01:49:16 GMT Sep 4 2004 Current storage dir: nvram: Database Level: Minimum - no cert data written to storage
The following example shows that restoration is from a PEM archive and that the database URL is flash:
Router# copy tftp://192.0.2.71/backup.ser flash:mycs.ser Destination filename [mycs.ser]? 32 bytes copied in 1.320 secs (24 bytes/sec) Router# copy tftp://192.0.2.71/backup.crl flash:mycs.crl Destination filename [mycs.crl]? 214 bytes copied in 1.324 secs (162 bytes/sec) Router# configure terminal ! Because CA cert has Digital Signature usage, you need to import using the "usage-keys" keyword Router (config)# crypto ca import mycs pem usage-keys terminal cisco123 % Enter PEM-formatted CA certificate. % End with a blank line or "quit" on a line by itself. ! Paste the CA cert from .pem archive. -----BEGIN CERTIFICATE----- MIIB9zCCAWCgAwIBAgIBATANBgkqhkiG9w0BAQQFADAPMQ0wCwYDVQQDEwRteWNz MB4XDTA0MDkwMjIxMDI1NloXDTA3MDkwMjIxMDI1NlowDzENMAsGA1UEAxMEbXlj czCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuGnnDXJbpDDQwCuKGs5Zg2rc K7ZJauSUotTmWYQvNx+ZmWrUs5/j9Ee5FV2YonirGBQ9mc6u163kNlrIPFck062L GpahBhNmKDgod1o2PHTnRlZpEZNDIqU2D3hACgByxPjrY4vUnccV36ewLnQnYpp8 szEu7PYTJr5dU5ltAekCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAYYwHwYDVR0jBBgwFoAUaEEQwYKCQ1dm9+wLYBKRTlzxaDIwHQYDVR0O BBYEFGhBEMGCgkNXZvfsC2ASkU5c8WgyMA0GCSqGSIb3DQEBBAUAA4GBAHyhiv2C mH+vswkBjRA1Fzzk8ttu9s5kwqG0dXp25QRUWsGlr9nsKPNdVKt3P7p0A/KochHe eNiygiv+hDQ3FVnzsNv983le6O5jvAPxc17RO1BbfNhqvEWMsXdnjHOcUy7XerCo +bdPcUf/eCiZueH/BEy/SZhD7yovzn2cdzBN -----END CERTIFICATE----- % Enter PEM-formatted encrypted private SIGNATURE key. % End with "quit" on a line by itself. ! Paste the CA private key from .pem archive. -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,5053DC842B04612A 1CnlF5Pqvd0zp2NLZ7iosxzTy6nDeXPpNyJpxB5q+V29IuY8Apb6TlJCU7YrsEB/ nBTK7K76DCeGPlLpcuyEI171QmkQJ2gA0QhC0LrRo09WrINVH+b4So/y7nffZkVb p2yDpZwqoJ8cmRH94Tie0YmzBtEh6ayOud11z53qbrsCnfSEwszt1xrW1MKrFZrk /fTy6loHzGFzl3BDj4r5gBecExwcPp74ldHO+Ld4Nc9egG8BYkeBCsZZOQNVhXLN I0tODOs6hP915zb6OrZFYv0NK6grTBO9D8hjNZ3U79jJzsSP7UNzIYHNTzRJiAyu i56Oy/iHvkCSNUIK6zeIJQnW4bSoM1BqrbVPwHU6QaXUqlNzZ8SDtw7ZRZ/rHuiD RTJMPbKquAzeuBss1132OaAUJRStjPXgyZTUbc+cWb6zATNws2yijPDTR6sRHoQL 47wHMr2Yj80VZGgkCSLAkL88ACz9TfUiVFhtfl6xMC2yuFl+WRk1XfF5VtWe5Zer 3Fn1DcBmlF7O86XUkiSHP4EV0cI6n5ZMzVLx0XAUtdAl1gD94y1V+6p9PcQHLyQA pGRmj5IlSFw90aLafgCTbRbmC0ChIqHy91UFa1ub0130+yu7LsLGRlPmJ9NE61JR bjRhlUXItRYWY7C4M3m/0wz6fmVQNSumJM08RHq6lUB3olzIgGIZlZkoaESrLG0p qq2AENFemCPF0uhyVS2humMHjWuRr+jedfc/IMl7sLEgAdqCVCfV3RZVEaNXBud1 4QjkuTrwaTcRXVFbtrVioT/puyVUlpA7+k7w+F5TZwUV08mwvUEqDw== -----END RSA PRIVATE KEY----- quit % Enter PEM-formatted SIGNATURE certificate. % End with a blank line or "quit" on a line by itself. ! Paste the CA cert from .pem archive again. -----BEGIN CERTIFICATE----- MIIB9zCCAWCgAwIBAgIBATANBgkqhkiG9w0BAQQFADAPMQ0wCwYDVQQDEwRteWNz MB4XDTA0MDkwMjIxMDI1NloXDTA3MDkwMjIxMDI1NlowDzENMAsGA1UEAxMEbXlj czCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuGnnDXJbpDDQwCuKGs5Zg2rc K7ZJauSUotTmWYQvNx+ZmWrUs5/j9Ee5FV2YonirGBQ9mc6u163kNlrIPFck062L GpahBhNmKDgod1o2PHTnRlZpEZNDIqU2D3hACgByxPjrY4vUnccV36ewLnQnYpp8 szEu7PYTJr5dU5ltAekCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAYYwHwYDVR0jBBgwFoAUaEEQwYKCQ1dm9+wLYBKRTlzxaDIwHQYDVR0O BBYEFGhBEMGCgkNXZvfsC2ASkU5c8WgyMA0GCSqGSIb3DQEBBAUAA4GBAHyhiv2C mH+vswkBjRA1Fzzk8ttu9s5kwqG0dXp25QRUWsGlr9nsKPNdVKt3P7p0A/KochHe eNiygiv+hDQ3FVnzsNv983le6O5jvAPxc17RO1BbfNhqvEWMsXdnjHOcUy7XerCo +bdPcUf/eCiZueH/BEy/SZhD7yovzn2cdzBN -----END CERTIFICATE----- % Enter PEM-formatted encrypted private ENCRYPTION key. % End with "quit" on a line by itself. ! Because the CA cert only has Digital Signature usage, skip the encryption part. quit % PEM files import succeeded. Router (config)# crypto pki server mycs Router (cs-server)# database url flash: ! Fill in any certificate server configuration here. Router (cs-server)# no shutdown % Certificate Server enabled. Router (cs-server)# end Router # show crypto pki server Certificate Server mycs: Status: enabled Server's current state: enabled Issuer name: CN=mycs CA cert fingerprint: F04C2B75 E0243FBC 19806219 B1D77412 Granting mode is: manual Last certificate issued serial number: 0x2 CA certificate expiration timer: 21:02:55 GMT Sep 2 2007 CRL NextUpdate timer: 21:02:58 GMT Sep 9 2004 Current storage dir: flash: Database Level: Minimum - no cert data written to storage
Subordinate Certificate Server Example
The following configuration and output is typical of what you might see after configuring a subordinate certificate server:
Router (config)# crypto pki trustpoint sub Router (ca-trustpoint)# enrollment url http://192.0.2.6 Router (ca-trustpoint)# exit Router (config)# crypto pki server sub Router (cs-server)# mode sub-cs Router (ca-server)# no shutdown %Some server settings cannot be changed after CA certificate generation. % Please enter a passphrase to protect the private key % or type Return to exit Password: Jan 6 22:32:22.698: CRYPTO_CS: enter FSM: input state initial, input signal no shut Re-enter password: % Generating 1024 bit RSA keys ... Jan 6 22:32:30.302: CRYPTO_CS: starting enabling checks Jan 6 22:32:30.306: CRYPTO_CS: key 'sub' does not exist; generated automatically [OK] Jan 6 22:32:39.810: %SSH-5-ENABLED: SSH 1.99 has been enabled Certificate has the following attributes: Fingerprint MD5: 328ACC02 52B25DB8 22F8F104 B6055B5B Fingerprint SHA1: 02FD799D DD40C7A8 61DC53AB 1E89A3EA 2A729EE2 % Do you accept this certificate? [yes/no]: Jan 6 22:32:44.830: CRYPTO_CS: nvram filesystem Jan 6 22:32:44.922: CRYPTO_CS: serial number 0x1 written. Jan 6 22:32:46.798: CRYPTO_CS: created a new serial file. Jan 6 22:32:46.798: CRYPTO_CS: authenticating the CA 'sub'y Trustpoint CA certificate accepted.% % Certificate request sent to Certificate Authority % Enrollment in progress... Router (cs-server)# Jan 6 22:33:30.562: CRYPTO_CS: Publishing 213 bytes to crl file nvram:sub.crl Jan 6 22:33:32.450: CRYPTO_CS: enrolling the server's trustpoint 'sub' Jan 6 22:33:32.454: CRYPTO_CS: exit FSM: new state check failed Jan 6 22:33:32.454: CRYPTO_CS: cs config has been locked Jan 6 22:33:33.118: CRYPTO_PKI: Certificate Request Fingerprint MD5: CED89E5F 53B9C60E > AA123413 CDDAD964 Jan 6 22:33:33.118: CRYPTO_PKI: Certificate Request Fingerprint SHA1: 70787C76 ACD7E67F 7D2C8B23 98CB10E7 718E84B1 % Exporting Certificate Server signing certificate and keys... Jan 6 22:34:53.839: %PKI-6-CERTRET: Certificate received from Certificate Authority Jan 6 22:34:53.843: CRYPTO_CS: enter FSM: input state check failed, input signal cert configured Jan 6 22:34:53.843: CRYPTO_CS: starting enabling checks Jan 6 22:34:53.843: CRYPTO_CS: nvram filesystem Jan 6 22:34:53.883: CRYPTO_CS: found existing serial file. Jan 6 22:34:53.907: CRYPTO_CS: old router cert flag 0x4 Jan 6 22:34:53.907: CRYPTO_CS: new router cert flag 0x44 Jan 6 22:34:56.511: CRYPTO_CS: DB version Jan 6 22:34:56.511: CRYPTO_CS: last issued serial number is 0x1 Jan 6 22:34:56.551: CRYPTO_CS: CRL file sub.crl exists. Jan 6 22:34:56.551: CRYPTO_CS: Read 213 bytes from crl file sub.crl. Jan 6 22:34:56.603: CRYPTO_CS: SCEP server started Jan 6 22:34:56.603: CRYPTO_CS: exit FSM: new state enabled Jan 6 22:34:56.603: CRYPTO_CS: cs config has been locked Jan 6 22:35:02.359: CRYPTO_CS: enter FSM: input state enabled, input signal time set Jan 6 22:35:02.359: CRYPTO_CS: exit FSM: new state enabled Jan 6 22:35:02.359: CRYPTO_CS: cs config has been locked
- Root Certificate Server Differentiation Example
- Show Output for a Subordinate Certificate Server Example
Root Certificate Server Differentiation Example
When issuing certificates, the root certificate server (or parent subordinate certificate server) differentiates the certificate request from "Sub CA," "RA," and peer requests, as shown in the following sample output:
Router# crypto pki server server1 info req
Enrollment Request Database:
RA certificate requests:
ReqID State Fingerprint SubjectName
----------------------------------------------------------------------------
Subordinate CS certificate requests:
ReqID State Fingerprint SubjectName
----------------------------------------------------------------------------
1 pending CB9977AD8A73B146D3221749999B0F66 hostname=host-subcs.company.com
RA certificate requests:
ReqID State Fingerprint SubjectName
-----------------------------------------------------------------------------
Router certificate requests:
ReqID State Fingerprint SubjectName
-----------------------------------------------------------------------------
Show Output for a Subordinate Certificate Server Example
The following show crypto pki server commandoutput indicates that a subordinate certificate server has been configured:
Router# show crypto pki server
Certificate Server sub:
Status: enabled
Server's configuration is locked (enter "shut" to unlock it)
Issuer name: CN=sub
CA cert fingerprint: 11B586EE 3B354F33 14A25DDD 7BD39187
Server configured in subordinate server mode
Upper CA cert fingerprint: 328ACC02 52B25DB8 22F8F104 B6055B5B
Granting mode is: manual
Last certificate issued serial number: 0x1
CA certificate expiration timer: 22:33:44 GMT Jan 6 2006
CRL NextUpdate timer: 22:33:29 GMT Jan 13 2005
Current storage dir: nvram:
Database Level: Minimum - no cert data written to storage
RA Mode Certificate Server Example
The following output is typical of what you might see after having configured an RA mode certificate server:
Router-ra (config)# crypto pki trustpoint myra Router-ra (ca-trustpoint)# enrollment url http://192.0.2.17 ! Include "cn=ioscs RA" or "ou=ioscs RA" in the subject-name. Router-ra (ca-trustpoint)# subject-name cn=myra, ou=ioscs RA, o=company, c=us Router-ra (ca-trustpoint)# exit Router-ra (config)# crypto pki server myra Router-ra (cs-server)# mode ra Router-ra (cs-server)# no shutdown % Generating 1024 bit RSA keys ...[OK] Certificate has the following attributes: Fingerprint MD5: 32661452 0DDA3CE5 8723B469 09AB9E85 Fingerprint SHA1: 9785BBCD 6C67D27C C950E8D0 718C7A14 C0FE9C38 % Do you accept this certificate? [yes/no]: yes Trustpoint CA certificate accepted. % Ready to request the CA certificate. %Some server settings cannot be changed after the CA certificate has been requested. Are you sure you want to do this? [yes/no]: yes % % Start certificate enrollment .. % Create a challenge password. You will need to verbally provide this password to the CA administrator in order to revoke your certificate. For security reasons your password will not be saved in the configuration. Please make a note of it. Password: Re-enter password: % The subject name in the certificate will include: cn=myra, ou=ioscs RA, o=company, c=us % The subject name in the certificate will include: Router-ra.company.com % Include the router serial number in the subject name? [yes/no]: no % Include an IP address in the subject name? [no]: no Request certificate from CA? [yes/no]: yes % Certificate request sent to Certificate Authority % The certificate request fingerprint will be displayed. % The 'show crypto pki certificate' command will also show the fingerprint. % Enrollment in progress... Router-ra (cs-server)# Sep 15 22:32:40.197: CRYPTO_PKI: Certificate Request Fingerprint MD5: 82B41A76 AF4EC87D AAF093CD 07747D3A Sep 15 22:32:40.201: CRYPTO_PKI: Certificate Request Fingerprint SHA1: 897CDF40 C6563EAA 0FED05F7 0115FD3A 4FFC5231 Sep 15 22:34:00.366: %PKI-6-CERTRET: Certificate received from Certificate Authority Router-ra (cs-server)# Router-ra(cs-server)# end Router-ra# show crypto pki server Certificate Server myra: Status: enabled Issuer name: CN=myra CA cert fingerprint: 32661452 0DDA3CE5 8723B469 09AB9E85 ! Note that the certificate server is running in RA mode Server configured in RA mode RA cert fingerprint: C65F5724 0E63B3CC BE7AE016 BE0D34FE Granting mode is: manual Current storage dir: nvram: Database Level: Minimum - no cert data written to storage
The following output shows the enrollment request database of the issuing certificate server after the RA has been enabled:
Note |
The RA certificate request is recognized by the issuing certificate server because "ou=ioscs RA" is listed in the subject name. |
Router-ca# crypto pki server mycs info request Enrollment Request Database: Subordinate CA certificate requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- ! The request is identified as RA certificate request. RA certificate requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- 12 pending 88F547A407FA0C90F97CDE8900A30CB0 hostname=Router-ra.company.com,cn=myra,ou=ioscs RA,o=company,c=us Router certificates requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- ! Issue the RA certificate. Router-ca# crypto pki server mycs grant 12
The following output shows that the issuing certificate server is configured to issue a certificate automatically if the request comes from an RA:
Router-ca(config)# crypto pki server mycs Router-ca (cs-server)# grant ra-auto % This will cause all certificate requests already authorized by known RAs to be automatically granted. Are you sure you want to do this? [yes/no]: yes Router-ca (cs-server)# end Router-ca# show crypto pki server Certificate Server mycs: Status: enabled Server's current state: enabled Issuer name: CN=mycs CA cert fingerprint: 32661452 0DDA3CE5 8723B469 09AB9E85 ! Note that the certificate server will issue certificate for requests from the RA. Granting mode is: auto for RA-authorized requests, manual otherwise Last certificate issued serial number: 0x2 CA certificate expiration timer: 22:29:37 GMT Sep 15 2007 CRL NextUpdate timer: 22:29:39 GMT Sep 22 2004 Current storage dir: nvram: Database Level: Minimum - no cert data written to storage
The following example shows the configuration of "myra", an RA server, configured to support automatic rollover from "myca", the CA. After the RA server is configured, automatic granting of certificate reenrollment requests is enabled:
crypto pki trustpoint myra enrollment url http://myca subject-name ou=iosca RA rsakeypair myra crypto pki server myra mode ra auto-rollover crypto pki server mycs grant auto rollover ra-cert auto-rollover 25
Enabling CA Certificate Rollover to Start Immediately Example
The following example shows how to enable automated CA certificate rollover on the server mycs with the crypto pki servercommand. The show crypto pki server command then shows the current state of the mycs server and that the rollover certificate is currently available for rollover.
Router(config)# crypto pki server mycs rollover Jun 20 23:51:21.211:%PKI-4-NOSHADOWAUTOSAVE:Configuration was modified. Issue "write memory" to save new IOS CA certificate ! The config has not been automatically saved because the config has been changed. Router# show crypto pki server Certificate Server mycs: Status:enabled Server's configuration is locked (enter "shut" to unlock it) Issuer name:CN=mycs CA cert fingerprint:E7A5FABA 5D7AA26C F2A9F7B3 03CE229A Granting mode is:manual Last certificate issued serial number:0x2 CA certificate expiration timer:00:49:26 PDT Jun 20 2008 CRL NextUpdate timer:00:49:29 PDT Jun 28 2005 Current storage dir:nvram: Database Level:Minimum - no cert data written to storage Rollover status:available for rollover ! Rollover certificate is available for rollover. Rollover CA certificate fingerprint:9BD7A443 00A6DD74 E4D9ED5F B7931BE0 Rollover CA certificate expiration time:00:49:26 PDT Jun 20 2011 Auto-Rollover configured, overlap period 25 days
Where to Go Next
After the certificate server is successfully running, you can either begin enrolling clients through manual mechanisms (as explained in the modul e "Configuring Certificate Enrollment for a PKI") or begin configuring SDP, which is a web-based enrollment interface, (as explained in the module "Setting Up Secure Device Provisioning (SDP) for Enrollment in a PKI.")
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
PKI and security commands |
Cisco IOS Security Command Reference |
USB Token RSA Operations: Using the RSA keys on a USB token for initial autoenrollment |
"Configuring Certificate Enrollment for a PKI" chapter in the Cisco IOS Security Configuration Guide: Secure Connectivity. See the " Configuring Certificate Servers" section. |
USB Token RSA Operations: Benefits of using USB tokens |
"Storing PKI Credentials " module in the Cisco IOS Security Configuration Guide: Secure Connectivity. |
Certificate server client certificate enrollment, autoenrollment, and automatic rollover |
"Configuring Certificate Enrollment for a PKI " module in the Cisco IOS Security Configuration Guide: Secure Connectivity . |
Setting up and logging into a USB token |
"Storing PKI Credentials " module in the Cisco IOS Security Configuration Guide: Secure Connectivity. |
Web-based certificate enrollment |
" Setting Up Secure Device Provisioning (SDP) for Enrollment in a PKI " module in the Cisco IOS Security Configuration Guide: Secure Connectivity . |
RSA keys in PEM formatted files |
"Deploying RSA Keys Within a PKI " module in the Cisco IOS Security Configuration Guide: Secure Connectivity. |
Choosing a certificate revocation mechanism |
"Configuring Authorization and Revocation of Certificates in a PKI " module in the Cisco IOS Security Configuration Guide: Secure Connectivity. |
Recommended cryptographic algorithms |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for the Cisco IOS Certificate Server
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 4 | Feature Information for the Cisco IOS Certificate Server |
Feature Name |
Releases |
Feature Information |
||
---|---|---|---|---|
Cisco IOS USB Token PKI Enhancements-- Phase 2 |
12.4(11)T |
This feature enhances USB token functionality by using the USB token as a cryptographic device. USB tokens may be used for RSA operations such as key generation, signing, and authentication. The following sections in this document provide information about this feature:
|
||
IOS Certificate Server (CS) Split Database |
12.4(4)T |
This feature allows the user to set storage locations and publish locations for specific certificate server file types. The following sections provide information about this feature: The following command was modified by this feature: database url |
||
Subordinate/RA Mode IOS Certificate Server (CS) Rollover |
12.4(4)T |
This feature expands on Certificate Authority (CA) Key Rollover introduced in 12.4(2)T to allow CA certificate rollover for subordinate CAs and RA-mode CAs. This functionality allows the rollover expiring CA certificates and keys and to have these changes propagate through the PKI network without manual intervention. The following sections provide information about this feature: The following command was modified by this feature: grant auto rollover |
||
Certificate Authority (CA) Key Rollover |
12.4(2)T |
This feature introduces the ability for root or subordinate CAs to roll over expiring CA certificates and keys and to have these changes propagate through the PKI network without manual intervention. The following sections provide information about this feature: The following commands were introduced or modified by this feature: auto-rollover, crypto pki certificate chain, crypto pki export pem, crypto pki server info request, crypto pki server, show crypto pki certificates, show crypto pki server, and show crypto pki trustpoint |
||
Cisco IOS Certificate Server |
12.3(8)T |
This feature introduces support for the Cisco IOS certificate server, which offers users a CA that is directly integrated with Cisco IOS software to more easily deploy basic PKI networks. The following sections provide information about this feature: |
||
The Certificate Server Auto Archive Enhancement1 |
12.3(11)T |
This enhancement enables the CA certificate and CA key to be backed up automatically just once after they are generated by the certificate server. As a result, it is not necessary to generate an exportable CA key if CA backup is desirable. The following sections provide information about this feature: The following commands were introduced by this feature: crypto pki server remote, database archive |
||
The Certificate Server Registration Authority (RA) Mode enhancement |
12.3(7)T |
A certificate server can be configured to run in RA mode. The following section provides information about this feature: The following commands were introduced by this feature: grant ra-auto, lifetime enrollment-requests |
||
PKI Status 1 |
12.3(11)T |
This enhancement provides a quick snapshot of current trustpoint status. The following section provides information about this enhancement: The following command was modified by this enhancement : show crypto pki trustpoints |
||
Subordinate Certificate Server 1 |
12.3(14)T |
This enhancement allows you to configure a subordinate certificate server to grant all or certain SCEP or manual certificate requests. The following section provides information about this enhancement: The following command was introduced by this enhancement : mode sub-cs |
||
RSA 4096-bit Key Generation in Software Crypto Engine Support |
15.1(1)T |
The range value for the modulus keyword value for the crypto key generate rsa command is extended from 360 to 2048 bits to 360 to 4096 bits. |
||
IOS PKI Server RA Mode Support for Non-IOS CA Servers |
15.1(2)T |
This enhancement allows the IOS CA server in RA mode to interoperate with more than one type of CA server. The following section provides information about this feature: The transparent keyword was added to the mode ra command to allow the CA server in RA mode to interoperate with more than one type of CA server. |
||
Public Key Infrastructure (PKI) IPv6 Support for VPN Solutions |
15.2(1)T |
The enrollment url (ca-trustpoint) command was modified to allow the specification of an IPv6 address in the URL for the CA. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.