- Cisco IOS PKI Overview Understanding and Planning a PKI
- Deploying RSA Keys Within a PKI
- Configuring Authorization and Revocation of Certificates in a PKI
- Configuring Certificate Enrollment for a PKI
- Configuring and Managing a Cisco IOS Certificate Server for PKI Deployment
- Storing PKI Credentials
- Source Interface Selection for Outgoing Traffic with Certificate Authority
- PKI Trustpool Management
- Finding Feature Information
- Prerequisites for PKI Trustpool Management
- Restrictions for PKI Trustpool Management
- Information About PKI Trustpool Management
- How to Configure PKI Trustpool Management
- Configuration Example for PKI Trustpool Management
- Additional References
- Feature Information for PKI Trustpool Management
PKI Trustpool Management
The PKI Trustpool Management feature is used to authenticate sessions, such as HTTPS, that occur between devices by using commonly recognized trusted agents called certificate authorities (CAs). The Cisco IOS software uses the PKI Trustpool Management feature, which is enabled by default, to create a scheme to provision, store, and manage a pool of certificates from known CAs in a way similar to the services a browser provides for securing sessions.
- Finding Feature Information
- Prerequisites for PKI Trustpool Management
- Restrictions for PKI Trustpool Management
- Information About PKI Trustpool Management
- How to Configure PKI Trustpool Management
- Configuration Example for PKI Trustpool Management
- Additional References
- Feature Information for PKI Trustpool Management
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for PKI Trustpool Management
The use of certificates requires that a crypto subsystem is included in the Cisco IOS software image.
Restrictions for PKI Trustpool Management
Device certificates that use CA certificates cannot be enrolled in a PKI trustpool.
Information About PKI Trustpool Management
- CA Certificate Storage in a PKI Trustpool
- PKI Trustpool Updating
- CA Handling in Both the PKI Trustpool and a Trustpoint
CA Certificate Storage in a PKI Trustpool
The router uses a built-in CA certificate bundle that is contained in a special certificate store called a PKI trustpool, which is updated automatically from Cisco. This PKI trustpool is known by Cisco and other vendors. A CA certificate bundle can be in the following formats:
- X.509 certificates in Distinguished Encoding Rules (DER) binary format enveloped within a public-key cryptographic message syntax standard 7 (pkcs7), which is used to sign and encrypt messages under a PKI. An X.509 certificate is a PKI and Privilege Management Infrastructure (PMI) standard that specifies, among other things, standard formats for public key certificates, certificate revocation lists, attribute certificates, and a certification path validation algorithm.
- A file containing concatenated X.509 certificates in Privacy Enhanced Mail (PEM) format with PEM headers.
PKI Trustpool Updating
The PKI trustpool is treated as a single entity that needs to be updated when the following conditions occur:
- A certificate in the PKI trustpool is due to expire or has been reissued.
- The published CA certificate bundle contains additional trusted certificates that are needed by a given application.
- The configuration has been corrupted.
Note |
A built-in certificate in the PKI trustpool cannot be physically replaced. However, a built-in certificate is rendered inactive after an update if its X.509 subject-name attribute matches the certificate in the CA certificate bundle. |
The PKI trustpool can be updated automatically or manually. The PKI trustpool may be used by certficate validation depending upon the application using it. See the "Manually Updating Certificates in the PKI Trustpool" and "Configuring Optional PKI Trustpool Policy Parameters" sections for more information.
The PKI trustpool timer matches the CA certificate with the earliest expiration time. If the timer is running and a bundle location is not configured and not explicitly disabled, syslog warnings are issued to alert the administrator that the PKI trustpool policy option is not set.
Automatic PKI trustpool updates use the configured URL.
When the PKI trustpool expires, the policy is read, the bundle is loaded, and the PKI trustpool is replaced. If the automatic PKI trustpool update encounters problems when initiating, then the following schedule is used to initiate the update until the download is successful: 20 days, 15 days, 10 days, 5 days, 4 days, 3 days, 2 days, 1 day, and then once every hour.
CA Handling in Both the PKI Trustpool and a Trustpoint
There may be circumstances where a CA resides in both the PKI trustpool and a trustpoint; for example, a trustpoint is using a CA and a CA bundle is downloaded later with this same CA inside. In this scenario, the CA in the trustpoint and the policy of this trustpoint is considered before the CA in the PKI trustpool or PKI trustpool policy to ensure that any current behavior is not altered when the PKI Trustpool Management feature is implemented on the router.
How to Configure PKI Trustpool Management
- Manually Updating Certificates in the PKI Trustpool
- Configuring Optional PKI Trustpool Policy Parameters
Manually Updating Certificates in the PKI Trustpool
The PKI Trustpool Management feature is enabled by default and uses the built-in CA certificate bundle in the PKI trustpool, which receives automatic updates from Cisco. Perform this task to manually update certificates in the PKI trustpool if they are not current, are corrupt, or if certain certificates need to be updated.
DETAILED STEPS
Configuring Optional PKI Trustpool Policy Parameters
DETAILED STEPS
Configuration Example for PKI Trustpool Management
The following show crypto pki trustpool command output displays the certificates in PKI trustpool:
Note |
The command output in this example is abridged because it is verbose. |
Router# show crypto pki trustpool CA Certificate Status: Available Version: 3 Certificate Serial Number (hex): 00D01E474000000111C38A964400000002 Certificate Usage: Signature Issuer: cn=DST Root CA X3 o=Digital Signature Trust Co. Subject: cn=Cisco SSCA o=Cisco Systems CRL Distribution Points: http://crl.identrust.com/DSTROOTCAX3.crl Validity Date: start date: 12:58:31 PST Apr 5 2007 end date: 12:58:31 PST Apr 5 2012 CA Certificate Status: Available Version: 3 Certificate Serial Number (hex): 6A6967B3000000000003 Certificate Usage: Signature Issuer: cn=Cisco Root CA 2048 o=Cisco Systems Subject: cn=Cisco Manufacturing CA o=Cisco Systems CRL Distribution Points: http://www.cisco.com/security/pki/crl/crca2048.crl Validity Date: start date: 14:16:01 PST Jun 10 2005 end date: 12:25:42 PST May 14 2029
Additional References
Related Documents
Related Topic | Document Title |
---|---|
Cisco IOS commands |
|
Security commands |
Technical Assistance
Description | Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for PKI Trustpool Management
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for PKI Trustpool Management |
Feature Name | Releases | Feature Information |
---|---|---|
PKI Trustpool Management |
15.2(2)T 15.1(1)SY |
This feature is used to authenticate sessions, such as HTTPS, that occur between devices by using commonly recognized trusted agents called certificate authorities (CAs). The Cisco IOS software uses the PKI Trustpool Management feature, which is enabled by default, to create a scheme to provision, store, and manage a pool of certificates from known CAs in a way similar to the services a browser provides for securing sessions. The following commands were introduced or modified: cabundle url, chain-validation (ca-trustpool), crypto pki trustpool import, crypto pki trustpool policy, crl, default (ca-trustpool), match certificate (ca-trustpool), ocsp, revocation-check (ca-trustpool), show (ca-trustpool), show crypto pki trustpool, source interface (ca-trustpool), storage, vrf (ca-trustpool). |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.