- Read Me First
- Cisco IOS XE PKI Overview Understanding and Planning a PKI
- Deploying RSA Keys Within a PKI
- Configuring Authorization and Revocation of Certificates in a PKI
- Configuring Certificate Enrollment for a PKI
- PKI Credentials Expiry Alerts
- Configuring and Managing a Cisco IOS XE Certificate Server for PKI Deployment
- Storing PKI Credentials
- Source Interface Selection for Outgoing Traffic with Certificate Authority
- PKI Trustpool Management
- PKI Split VRF in Trustpoint
- EST Client Support
- OCSP Response Stapling
- Finding Feature Information
- Prerequisites for Configuring a Cisco IOS XE Certificate Server
- Restrictions for Configuring a Cisco IOS XE Certificate Server
- Information About Cisco IOS XE Certificate Servers
- RSA Key Pair and Certificate of the Certificate Server
- Certificate Server Database
- Trustpoint of the Certificate Server
- Certificate Revocation Lists (CRLs)
- Certificate Server Error Conditions
- Certificate Enrollment Using a Certificate Server
- Types of CA Servers Subordinate and Registration Authorities (RAs)
- Automatic CA Certificate and Key Rollover
- Support for Specifying a Cryptographic Hash Function
- How to Set Up and Deploy a Cisco IOS XE Certificate Server
- Generating a Certificate Server RSA Key Pair
- Configuring Certificate Servers
- Prerequisites for Automatic CA Certificate Rollover
- Restrictions for Automatic CA Certificate Rollover
- Configuring a Certificate Server
- Configuring a Subordinate Certificate Server
- Configuring a Certificate Server to Run in RA Mode
- Configuring the Root Certificate Server to Delegate Enrollment Tasks to the RA Mode Certificate Server
- What to Do Next
- Configuring Certificate Server Functionality
- Working with Automatic CA Certificate Rollover
- Maintaining Verifying and Troubleshooting the Certificate Server Certificates and the CA
- Example: Configuring Specific Storage and Publication Locations
- Example: Removing Enrollment Requests from the Enrollment Request Database
- Example: Autoarchiving the Certificate Server Root Keys
- Example: Restoring a Certificate Server from Certificate Server Backup Files
- Example: Subordinate Certificate Server
- Example: RA Mode Certificate Server
- Example: Enabling CA Certificate Rollover to Start Immediately
Configuring and Managing a
Cisco IOS
XE Certificate Server for PKI Deployment
This module describes how to set up and manage a Cisco IOS certificate server for public key infrastructure (PKI) deployment. A certificate server embeds a simple certificate server, with limited certification authority (CA) functionality, into the Cisco software. Thus, the following benefits are provided to the user:
-
Easier PKI deployment by defining default behavior. The user interface is simpler because default behaviors are predefined. That is, you can leverage the scaling advantages of PKI without all of the certificate extensions that a CA provides, thereby allowing you to easily enable a basic PKI-secured network.
-
Direct integration with Cisco software.
Note | Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. |
- Finding Feature Information
- Prerequisites for Configuring a Cisco IOS XE Certificate Server
- Restrictions for Configuring a Cisco IOS XE Certificate Server
- Information About Cisco IOS XE Certificate Servers
- How to Set Up and Deploy a Cisco IOS XE Certificate Server
- Configuration Examples for Using a Certificate Server
- Where to Go Next
- Additional References for Configuring and Managing a Cisco IOS XE Certificate Server for PKI Deployment
- Feature Information for Configuring and Managing a Cisco IOS XE Certificate Server for PKI Deployment
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring a Cisco IOS XE Certificate Server
Planning Your PKI Before Configuring the Certificate Server
Before configuring a Cisco IOS XE certificate server, it is important that you have planned for and chosen appropriate values for the settings you intend to use within your PKI (such as certificate lifetimes and certificate revocation list (CRL) lifetimes). After the settings have been configured in the certificate server and certificates have been granted, settings cannot be changed without having to reconfigure the certificate server and reenrolling the peers. For information on certificate server default settings and recommended settings, see section “Certificate Server Default Values and Recommended Values.”
Enabling an HTTP Server
The certificate server supports Simple Certificate Enrollment Protocol (SCEP) over HTTP. The HTTP server must be enabled on the router for the certificate server to use SCEP. (To enable the HTTP server, use the ip http server command.) The certificate server automatically enables or disables SCEP services after the HTTP server is enabled or disabled. If the HTTP server is not enabled, only manual PKCS10 enrollment is supported.
Note | To take advantage of automatic CA certificate and key pair rollover functionality for all types of certificate servers, SCEP must be used as the enrollment method. |
Configuring Reliable Time Services
Time services must be running on the router because the certificate server must have reliable time knowledge. If a hardware clock is unavailable, the certificate server depends on manually configured clock settings, such as Network Time Protocol (NTP). If there is not a hardware clock or the clock is invalid, the following message is displayed at bootup:
% Time has not been set. Cannot start the Certificate server.
After the clock has been set, the certificate server automatically switches to running status.
For information on manually configuring clock settings, see the module Setting Time and Calendar Services in theBasic System Management Configuration Guide, Cisco IOS XE Release 3S .
Restrictions for Configuring a Cisco IOS XE Certificate Server
The certificate server does not provide a mechanism for modifying the certificate request that is received from the client; that is, the certificate that is issued from the certificate server matches the requested certificate without modifications. If a specific certificate policy, such as name constraints, must be issued, the policy must be reflected in the certificate request.
Information About Cisco IOS XE Certificate Servers
- RSA Key Pair and Certificate of the Certificate Server
- Certificate Server Database
- Trustpoint of the Certificate Server
- Certificate Revocation Lists (CRLs)
- Certificate Server Error Conditions
- Certificate Enrollment Using a Certificate Server
- Types of CA Servers Subordinate and Registration Authorities (RAs)
- Automatic CA Certificate and Key Rollover
- Support for Specifying a Cryptographic Hash Function
RSA Key Pair and Certificate of the Certificate Server
The certificate server automatically generates a 1024-bit Rivest, Shamir, and Adelman (RSA) key pair. You must manually generate an RSA key pair if you prefer a different key pair modulus. For information on completing this task, see the section “Generating a Certificate Server RSA Key Pair .”
Note | The recommended modulus for a certificate server RSA key pair is 2048 bits. |
The certificate server uses a regular Cisco IOS XE RSA key pair as its CA key. This key pair must have the same name as the certificate server. If you do not generate the key pair before the certificate server is created on the router, a general-purpose key pair is automatically generated during the configuration of the certificate server.
The CA certificate and CA key can be backed up automatically one time after they are generated by the certificate server. As a result, it is not necessary to generate an exportable CA key for backup purposes.
What to Do with Automatically Generated Key Pairs
If the key pair is automatically generated, it is not marked as exportable. Thus, you must manually generate the key pair as exportable if you want to back up the CA key. For information on how to complete this task, see the section “Generating a Certificate Server RSA Key Pair .”
How the CA Certificate and CA Key Are Automatically Archived
At initial certificate server setup, you can enable the CA certificate and the CA key to be automatically archived so that they may be restored later if either the original copy or the original configuration is lost.
When the certificate server is turned on the first time, the CA certificate and CA key is generated. If automatic archive is also enabled, the CA certificate and the CA key is exported (archived) to the server database. The archive can be in PKCS12 or privacy-enhanced mail (PEM) format.
Note | This CA key backup file is extremely important and should be moved immediately to another secured place. |
This archiving action occurs only one time. Only the CA key that is (1) manually generated and marked exportable or (2) automatically generated by the certificate server is archived (this key is marked nonexportable).
Autoarchiving does not occur if you generate the CA key manually and mark it “nonexportable.”
In addition to the CA certificate and CA key archive file, you should also regularly back up the serial number file (.ser) and the CRL file (.crl). The serial file and the CRL file are both critical for CA operation if you need to restore your certificate server.
It is not possible to manually back up a server that uses nonexportable RSA keys or manually generated, nonexportable RSA keys. Although automatically generated RSA keys are marked as nonexportable, they are automatically archived once.
Certificate Server Database
The Cisco IOS XE certificate server stores files for its own use and may publish files for other processes to use. Critical files generated by the certificate server that are needed for its ongoing operation are stored to only one location per file type for its exclusive use. The certificate server reads from and writes to these files. The critical certificate server files are the serial number file (.ser) and the CRL storage location file (.crl). Files that the certificate server writes to, but does not read from again, may be published and available for use by other processes. An example of a file that may be published is the issued certificates file (.crt).
Performance of your certificate server may be affected by the following factors, which should be considered when you choose storage options and publication options for your certificate server files.
-
The storage or publish locations you choose may affect your certificate server performance. Reading from a network location takes more time than reading directly from a router’s local storage device.
-
The number of files you choose to store or publish to a specific location may affect your certificate server performance. The local Cisco IOS XE file system may not always be suitable for a large number of files.
-
The file types you choose to store or publish may affect your certificate server performance. Certain files, such as the .crl files, can become very large.
Note | It is recommended that you store .ser and .crl files to your local Cisco IOS XE file system and publish your .crt files to a remote file system. |
Certificate Server Database File Storage
The certificate server allows the flexibility to store different critical file types to different storage locations depending on the database level set (see the database level command for more information). When choosing storage locations, consider the file security needed and server performance. For instance, serial number files and archive files (.p12 or .pem) might have greater security restrictions than the issued certificates file storage location (.crt) or the name file storage location (.cnm).
The table below shows the critical certificate server file types by file extension that may be stored to a specific location.
File Extension |
File Type |
---|---|
.ser |
The main certificate server database file. |
.crl |
The CRL storage location. |
.crt |
The issued certificates storage location. |
.cnm |
The certificate name and expiration file storage location. |
.p12 |
The certificate server certificate archive file location in PKCS12 format. |
.pem |
The certificate server certificate archive file location in PEM format. |
Cisco IOS XE certificate server files may be stored to three levels of specificity:
-
Default location, NVRAM
-
Specified primary storage location for all critical files
-
Specified storage location for specific critical file(s).
A more specific storage location setting overrides a more general storage location setting. For instance, if you have not specified any certificate server file storage locations, all certificate server files are stored to NVRAM. If you specify a storage location for the name file, only the name file is stored there; all other files continue to be stored to NVRAM. If you then specify a primary location, all files except the name file is now stored to this location, instead of NVRAM.
Note | You may specify either .p12 or .pem; you cannot specify both types of archive files. |
Certificate Server Database File Publication
A publish file is a copy of the original file and is available for other processes to use or for your use. If the certificate server fails to publish a file, it does cause the server to shut down. You may specify one publish location for the issued certificates file and name file and multiple publish locations for the CRL file. See the table below for files types available for publication. You may publish files regardless of the database level that is set.
File Extension |
File Type |
---|---|
.crl |
The CRL publish location. |
.crt |
The issued certificates publish location. |
.cnm |
The certificate name and expiration file publish location. |
Trustpoint of the Certificate Server
If the certificate server also has an automatically generated trustpoint of the same name, then the trustpoint stores the certificate of the certificate server. After the router detects that a trustpoint is being used to store the certificate of the certificate server, the trustpoint is locked so that it cannot be modified.
Before configuring the certificate server you can perform the following:
Manually create and set up this trustpoint (using the crypto pki trustpointcommand), which allows you to specify an alternative RSA key pair (using the rsakeypair command).
Specify that the initial autoenrollment key pair is generated on a specific device, such as a configured and available USB token, using the on command.
Note | The automatically generated trustpoint and the certificate server certificate are not available for the certificate server device identity. Thus, any command-line interface (CLI) (such as the ip http secure-trustpoint command) that is used to specify the CA trustpoint to obtain certificates and authenticate the connecting client’s certificate must point to an additional trustpoint configured on the certificate server device. |
If the server is a root certificate server, it uses the RSA key pairs and several other attributes to generate a self-signed certificate. The associated CA certificate has the following key usage extensions--Digital Signature, Certificate Sign, and CRL Sign.
After the CA certificate is generated, attributes can be changed only if the certificate server is destroyed.
Note | A certificate server trustpoint must not be automatically enrolled using the auto-enroll command. Initial enrollment of the certificate server must be initiated manually and ongoing automatic rollover functionality may be configured with the auto-rollover command. For more information on automatic rollover functionality, see the section “Automatic CA Certificate and Key Rollover.” |
Certificate Revocation Lists (CRLs)
By default, CRLs are issued once every 168 hours (1 calendar week). To specify a value other than the default value for issuing the CRL, execute the lifetime crl command. After the CRL is issued, it is written to the specified database location as ca-label.crl, where ca-label is the name of the certificate server.
CRLs can be distributed through SCEP, which is the default method, or a CRL distribution point (CDP), if configured and available. If you set up a CDP, use the cdp-url command to specify the CDP location. If the cdp-url command is not specified, the CDP certificate extension is not included in the certificates that are issued by the certificate server. If the CDP location is not specified, Cisco IOS PKI clients automatically request a CRL from the certificate server with a SCEP GetCRL message. The CA then returns the CRL in a SCEP CertRep message to the client. Because all SCEP messages are enveloped and signed PKCS#7 data, the SCEP retrieval of the CRL from the certificate server is costly and not highly scalable. In very large networks, an HTTP CDP provides better scalability and is recommended if you have many peer devices that check CRLs. You may specify the CDP location by a simple HTTP URL string for example,
cdp-url http://my-cdp.company.com/filename.crl
The certificate server supports only one CDP; thus, all certificates that are issued include the same CDP.
If you have PKI clients that are not running Cisco IOS software and that do not support a SCEP GetCRL request and wish to use a CDP you may set up an external server to distribute CRLs and configure the CDP to point to that server. Or, you can specify a non-SCEP request for the retrieval of the CRL from the certificate server by specifying the cdp-url command with the URL in the following format where cs-addr is the location of the certificate server:
cdp-url http://cs-addr/cgi-bin/pkiclient.exe?operation=GetCRL
Note | If your Cisco IOS XE CA is also configured as your HTTP CDP server, specify your CDP with the cdp-url http://cs-addr/cgi-bin/pkiclient.exe?operation=GetCRL command syntax. |
It is the responsibility of the network administrator to ensure that the CRL is available from the location that is specified through the cdp-url command.
In order to force the parser to retain the embedded question mark within the specified location, enter Ctrl-v prior to the question mark. If this action is not taken, CRL retrieval through HTTP returns an error message.
The CDP location may be changed after the certificate server is running through the cdp-url command. New certificates contain the updated CDP location, but existing certificates are not reissued with the newly specified CDP location. When a new CRL is issued, the certificate server uses its current cached CRL to generate a new CRL. (When the certificate server is rebooted, it reloads the current CRL from the database.) A new CRL cannot be issued unless the current CRL has expired. After the current CRL expires, a new CRL is issued only after a certificate is revoked from the CLI.
Certificate Server Error Conditions
At startup, the certificate server checks the current configuration before issuing any certificates. It reports the last known error conditions through theshow crypto pki server command output. Example errors can include any of the following conditions:
If the certificate server experiences a critical failure at any time, such as failing to publish a CRL, the certificate server automatically enters a disabled state. This state allows the network administrator to fix the condition; thereafter, the certificate server returns to the previous normal state.
Certificate Enrollment Using a Certificate Server
A certificate enrollment request functions as follows:
The certificate server receives the enrollment request from an end user, and the following actions occur: - A request entry is created in the enrollment request database with the initial state. (See the table below for a complete list of certificate enrollment request states.)
- The certificate server refers to the CLI configuration (or the default behavior any time a parameter is not specified) to determine the authorization of the request. Thereafter, the state of the enrollment request is updated in the enrollment request database.
At each SCEP query for a response, the certificate server examines the current request and performs one of the following actions:
If the connection of the client has closed, the certificate server waits for the client to request another certificate.
All enrollment requests transition through the certificate enrollment states that are defined in the table below. To see current enrollment requests, use the crypto pki server request pkcs10 command.
Certificate Enrollment State |
Description |
---|---|
authorized |
The certificate server has authorized the request. |
denied |
The certificate server has denied the request for policy reasons. |
granted |
The CA core has generated the appropriate certificate for the certificate request. |
initial |
The request has been created by the SCEP server. |
malformed |
The certificate server has determined that the request is invalid for cryptographic reasons. |
pending |
The enrollment request must be manually accepted by the network administrator. |
SCEP Enrollment
All SCEP requests are treated as new certificate enrollment requests, even if the request specifies a duplicate subject name or public key pair as a previous certificate request.
Types of CA Servers Subordinate and Registration Authorities (RAs)
CA servers have the flexibility to be configured as a subordinate certificate server or an RA-mode certificate server.
Why Configure a Subordinate CA?
A subordinate certificate server provides all the same features as a root certificate server. The root RSA key pairs are extremely important in a PKI hierarchy, and it is often advantageous to keep them offline or archived. To support this requirement, PKI hierarchies allow for subordinate CAs that have been signed by the root authority. In this way, the root authority can be kept offline (except to issue occasional CRL updates), and the subordinate CA can be used during normal operation.
Why Configure an RA-Mode Certificate Server?
A Cisco IOS XE certificate server can be configured to run in RA mode. An RA offloads authentication and authorization responsibilities from a CA. When the RA receives a SCEP or manual enrollment request, the administrator can either reject or grant it on the basis of local policy. If the request is granted, it is forwarded to the issuing CA, and the CA automatically generates the certificate and return it to the RA. The client can later retrieve the granted certificate from the RA.
An RA is the authority charged with recording or verifying some or all of the data required for the CA to issue certificates. In many cases the CA undertakes all of the RA functions itself, but where a CA operates over a wide geographical area or when there is security concern over exposing the CA to direct network access, it may be administratively advisable to delegate some of the tasks to an RA and leave the CA to concentrate on its primary tasks of signing certificates and CRLs.
CA Server Compatibility
The CA server compatibility allows the IOS CA server in RA mode to interoperate with more than one type of CA server. For more information, see “Configuring a Certificate Server to Run in RA Mode.”
Automatic CA Certificate and Key Rollover
CAs--root CAs, subordinate CAs, and RA-mode CAs--like their clients, have certificates and key pairs with expiration dates that need to be reissued when the current certificate and key pair are about to expire. When a root CA’s certificate and key pair are expiring it must generate a self-signed rollover certificate and key pair. If a subordinate CA or an RA-mode CA’s certificate and key pair are expiring, it requests a rollover certificate and key pair from its superior CA, obtaining the superior CA’s new self-signed rollover certificates at the same time. The CA must distribute the new CA rollover certificate and keys too all its peers. This process, called rollover, allows for continuous operation of the network while the CAs and their clients are switching from an expiring CA certificate and key pair to a new CA certificate and key pair.
Rollover relies on the PKI infrastructure requirements of trust relationships and synchronized clocks. The PKI trust relationships allow (1) the new CA certificate to be authenticated, and (2) the rollover to be accomplished automatically without the loss of security. Synchronized clocks allow the rollover to be coordinated throughout your network.
Automatic CA Certificate Rollover How It Works
The CA server must have rollover configured. All levels of CAs must be automatically enrolled and have auto-rollover enabled. CA clients support rollover automatically when automatically enrolled. For more information about clients and automatic rollover, see the section “ Automatic Certificate Enrollment ” in the chapter “Configuring Certificate Enrollment for a PKI”.
After CAs have rollover enabled and their clients are automatically enrolled, there are three stages to the automatic CA certificate rollover process.
Stage One: Active CA Certificate and Key Pair Only
In stage one, there is an active CA certificate and key pair only.
Stage Two: Rollover CA Certificate and Key Pair Generation and Distribution
In stage two, the rollover CA certificate and key pair are generated and distributed. The superior CA generates a rollover certificate and key pair. After the CA successfully saves its active configuration, the CA is ready to respond to client requests for the rollover certificate and key pair. When the superior CA receives a request for the new CA certificate and key pair from a client, the CA responds by sending the new rollover CA certificate and key pair to the requesting client. The clients store the rollover CA certificate and key pair.
Note | When a CA generates its rollover certificate and key pair, it must be able to save its active configuration. If the current configuration has been altered, saving of the rollover certificate and key pair does not happen automatically. In this case, the administrator must save the configuration manually or rollover information is lost. |
Stage Three: Rollover CA Certificate and Key Pair Become the Active CA Certificate and Key Pair
In stage three, the rollover CA certificate and key pair become the active CA certificate and key pair. All devices that have stored a valid rollover CA certificate rename the rollover certificate to the active certificate and the once-active certificate and key pair are deleted.
After the CA certificate rollover, you may observe the following deviation from usual certificate lifetime and renewal time:
The lifetime of the certificates issued during rollover is lower than the preconfigured value.
In specific conditions, the renew time may be inferior to the configured percentage of the actual lifetime. The difference observed can be of up to 20% in cases where the certificate lifetime is less than one hour.
These differences are normal, and result from jitter (random time fluctuation) introduced by the algorithm on the Certificate server. This task is performed to avoid the hosts participating to the PKI synchronize their enrollment timer, which could result in congestion on the Certificate Server.
Note | The lifetime fluctuations that occur do not affect proper functionning of the PKI, since the differences always result in a shorter lifetime, thus remaining within maximum configured lifetime for certificates. |
Support for Specifying a Cryptographic Hash Function
Secure Hash Algorithm (SHA) support allows a user to specify a cryptographic hash function for Cisco IOS XE certificate servers and clients. The cryptographic hash functions that can be specified are Message Digest algorithm 5 (MD5), SHA-1, SHA-256, SHA-384, or SHA-512.
Note | Cisco no longer recommends using MD5; instead, you should use SHA-256 where supported. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. |
See the “Configuring a Subordinate Certificate Server” task for more information on specifying the hash (ca-trustpoint) and hash (cs-server) commands that are used to implement this feature.
How to Set Up and Deploy a Cisco IOS XE Certificate Server
- Generating a Certificate Server RSA Key Pair
- Configuring Certificate Servers
- Configuring Certificate Server Functionality
- Working with Automatic CA Certificate Rollover
- Maintaining Verifying and Troubleshooting the Certificate Server Certificates and the CA
Generating a Certificate Server RSA Key Pair
Perform this task to manually generate an RSA key pair for the certificate server. Manually generating a certificate server RSA key pair allows you to specify the type of key pair you want to generate, to create an exportable key pair for backup purposes, to specify the key pair storage location, or to specify the key generation location.
Note | You may want to create an exportable certificate server key pair for backup, or archive purposes. If this task is not performed, the certificate server automatically generates a key pair, which is not marked as exportable. |
If your device has a USB token configured and available, the USB token can be used as cryptographic device in addition to a storage device. Using a USB token as a cryptographic device allows RSA operations such as key generation, signing, and authentication of credentials to be performed on a USB token. The private key never leaves the USB token and is not exportable. The public key is exportable. For titles of specific documents about configuring a USB token and making it available to use as a cryptographic device, see the “Related Documents” section.
Note | It is recommended that the private key be kept in a secure location and that you regularly archive the certificate server database. |
Note | Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. |
1.
enable
2.
configure
terminal
3.
crypto
key
generate
rsa
[general-keys |
usage-keys |
signature |
encryption]
[label
key-label]
[exportable]
[modulus
modulus-size]
[storage
devicename:]
[on
devicename:]
4.
crypto
key
export
rsa
key-label
pem
{terminal |
url
url} {3des |
des}
passphrase
5.
crypto
key
import
rsa
key-label
pem
[usage-keys |
signature |
encryption]
{terminal |
url
url} [exportable] [on
devicename:]
passphrase
6.
exit
7.
show
crypto
key
mypubkey
rsa
DETAILED STEPS
Example
The following example generates a general usage 1024-bit RSA key pair on a USB token with the label “ms2” with crypto engine debugging messages shown:
Device(config)# crypto key generate rsa on usbtoken0 label ms2 modulus 2048 The name for the keys will be: ms2 % The key modulus size is 2048 bits % Generating 2048 bit RSA keys, keys will be on-token, non-exportable... Jan 7 02:41:40.895: crypto_engine: Generate public/private keypair [OK] Jan 7 02:44:09.623: crypto_engine: Create signature Jan 7 02:44:10.467: crypto_engine: Verify signature Jan 7 02:44:10.467: CryptoEngine0: CRYPTO_ISA_RSA_CREATE_PUBKEY(hw)(ipsec) Jan 7 02:44:10.467: CryptoEngine0: CRYPTO_ISA_RSA_PUB_DECRYPT(hw)(ipsec)
Now, the on-token keys labeled “ms2” may be used for enrollment.
The following example shows the successful import of an encryption key to a configured and available USB tokens:
Device# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Device(config)# crypto key import rsa encryption on usbtoken0 url nvram:e password % Importing public Encryption key or certificate PEM file... filename [e-encr.pub]? Reading file from nvram:e-encr.pub % Importing private Encryption key PEM file... Source filename [e-encr.prv]? Reading file from nvram:e-encr.prv % Key pair import succeeded.
Configuring Certificate Servers
- Prerequisites for Automatic CA Certificate Rollover
- Restrictions for Automatic CA Certificate Rollover
- Configuring a Certificate Server
- Configuring a Subordinate Certificate Server
- Configuring a Certificate Server to Run in RA Mode
- Configuring the Root Certificate Server to Delegate Enrollment Tasks to the RA Mode Certificate Server
- What to Do Next
Prerequisites for Automatic CA Certificate Rollover
When configuring a certificate server, for automatic CA certificate rollover to run successfully, the following prerequisites are applicable for your CA servers:
-
Your CA server must be enabled and fully configured with a reliable time of day, an available key pair, a self-signed, valid CA certificate associated with the key pair, a CRL, an accessible storage device, and an active HTTP/SCEP server.
-
CA clients must have successfully completed automatic enrollment and have autoenrollment enabled with the same certificate server.
Restrictions for Automatic CA Certificate Rollover
When configuring a certificate server, in order for automatic CA certificate rollover to run successfully, the following restrictions are applicable:
SCEP must be used to support rollover. Any device that enrolls with the PKI using an alternative to SCEP as the certificate management protocol or mechanism (such as enrollment profiles, manual enrollment, or TFTP enrollment) is not be able to take advantage of the rollover functionality provided by SCEP.
If you have automatic archive configured on your network and the archive fails, rollover does not occur because the certificate server does not enter the rollover state, and the rollover certificate and key pair is not automatically saved.
Configuring a Certificate Server
Perform this task to configure a Cisco IOS XE certificate server and enable automatic rollover.
1.
enable
2.
configure
terminal
3.
ip
http
server
4.
crypto
pki
server
cs-label
5.
no
shutdown
6.
auto-rollover
[time-period]
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. | ||
Step 2 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. | ||
Step 3 |
ip
http
server
Example: Device(config)# ip http server |
Enables the HTTP server on your system. | ||
Step 4 |
crypto
pki
server
cs-label
Example: Device(config)# crypto pki server server-pki |
Defines a label for the certificate server and enters certificate server configuration mode.
| ||
Step 5 |
no
shutdown
Example: Device(cs-server)# no shutdown |
(Optional) Enables the certificate server.
| ||
Step 6 |
auto-rollover
[time-period]
Example: Device(cs-server)# auto-rollover 90 |
(Optional) Enables the automated CA certificate rollover functionality. |
Examples
The following example shows how to configure the certificate server “ms2” where ms2 is the label of a 2048-bit RSA key pair:
Device(config)# crypto pki server ms2 Device(cs-server)# no shutdown % Once you start the server, you can no longer change some of % the configuration. Are you sure you want to do this? [yes/no]: yes % Certificate Server enabled. Device(cs-server)# end ! Device# show crypto pki server ms2 Certificate Server ms2: Status: enabled, configured CA cert fingerprint: 5A856122 4051347F 55E8C246 866D0AC3 Granting mode is: manual Last certificate issued serial number: 0x1 CA certificate expiration timer: 19:44:57 GMT Oct 14 2006 CRL NextUpdate timer: 19:45:25 GMT Oct 22 2003 Current storage dir: nvram: Database Level: Complete - all issued certs written as <serialnum>.cer
The following example shows how to enable automated CA certificate rollover on the server ms2 with the auto-rollover command. The show crypto pki servercommand shows that the automatic rollover has been configured on the server mycs with an overlap period of 25 days.
Device(config)# crypto pki server ms2 Device(cs-server)# auto-rollover 25 Device(cs-server)# no shutdown %Some server settings cannot be changed after CA certificate generation. % Exporting Certificate Server signing certificate and keys... % Certificate Server enabled. Device(cs-server)# Device# show crypto pki server ms2 Certificate Server ms2: Status:enabled Server's configuration is locked (enter "shut" to unlock it) Issuer name:CN=mycs CA cert fingerprint:70AFECA9 211CDDCC 6AA9D7FF 3ADB03AE Granting mode is:manual Last certificate issued serial number:0x1 CA certificate expiration timer:00:49:26 PDT Jun 20 2008 CRL NextUpdate timer:00:49:29 PDT Jun 28 2005 Current storage dir:nvram: Database Level:Minimum - no cert data written to storage Auto-Rollover configured, overlap period 25 days Autorollover timer:00:49:26 PDT May 26 2008
Configuring a Subordinate Certificate Server
Perform this task to configure a subordinate certificate server to grant all or certain SCEP or manual certificate requests and to enable automatic rollover.
Note | Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. |
-
The root certificate server should be a Cisco IOS XE certificate server.
-
For a subordinate certificate authority (CA), enrollment to the root CA or upstream CA is possible only through SCEP. The upstream CA must be online for the enrollment to the upstream CA to complete. Manual enrollment of subordinate CA to the root CA or upstream CA is not possible.
1.
enable
2.
configure
terminal
3.
crypto
pki
trustpoint
name
4.
enrollment [mode] [retry period
minutes] [retry count
number]
url
url
[pem]
5.
hash
{md5 |
sha1 |
sha256 |
sha384 |
sha512}
6.
exit
7.
crypto
pki
server
cs-label
8.
issuer
name
DN-string
9.
mode sub-cs
10.
auto-rollover
[time-period]
11.
grant
auto
rollover
{ca-cert |
ra-cert}
12.
hash
{md5 |
sha1 |
sha256 |
sha384 |
sha512}
13.
no
shutdown
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. | ||
Step 2 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. | ||
Step 3 |
crypto
pki
trustpoint
name
Example: Device(config)# crypto pki trustpoint sub |
Declares the trustpoint that your subordinate certificate server should use and enters ca-trustpoint configuration mode. | ||
Step 4 |
enrollment [mode] [retry period
minutes] [retry count
number]
url
url
[pem]
Example: Device(ca-trustpoint)# enrollment url http://caserver.myexample.com- or- Device(ca-trustpoint)# enrollment url http://[2001:DB8:1:1::1]:80 |
Specifies the following enrollment parameters of the CA:
| ||
Step 5 |
hash
{md5 |
sha1 |
sha256 |
sha384 |
sha512}
Example: Device(ca-trustpoint)# hash sha384 |
(Optional) Specifies the hash function for the signature that the Cisco IOS XE client uses to sign its self-signed certificates. The Cisco IOS XE client uses the MD5 cryptographic hash function for self-signed certificates by default. Any of the following command algorithm keyword options can be specified to over-ride the default setting for the trustpoint. This setting then becomes the default cryptographic hash algorithm function for self-signed certificates by default.
| ||
Step 6 |
exit
Example: Device(ca-trustpoint)# exit |
Exits ca-trustpoint configuration mode. | ||
Step 7 |
crypto
pki
server
cs-label
Example: Device(config)# crypto pki server sub |
Enables a Cisco IOS XE certificate server and enters cs-server configuration mode.
| ||
Step 8 |
issuer
name
DN-string
Example: Device(cs-server)# issuer-name CN=sub CA, O=Cisco, C=us |
(Optional) Specifies the DN as the CA issuer name for the certificate server. | ||
Step 9 |
mode sub-cs
Example: Device(cs-server)# mode sub-cs |
Places the PKI server into sub-certificate server mode.
| ||
Step 10 |
auto-rollover
[time-period]
Example: Device(cs-server)# auto-rollover 90 |
(Optional) Enables the automated CA certificate rollover functionality. | ||
Step 11 |
grant
auto
rollover
{ca-cert |
ra-cert}
Example: Device(cs-server)# grant auto rollover ca-cert |
(Optional) Automatically grants reenrollment requests for subordinate CAs and RA-mode CAs without operator intervention.
| ||
Step 12 |
hash
{md5 |
sha1 |
sha256 |
sha384 |
sha512}
Example: Device(cs-server)# hash sha384 |
(Optional) Sets the hash function for the signature that the Cisco IOS XE certificate authority (CA) uses to sign all of the certificates issued by the server.
| ||
Step 13 |
no
shutdown
Example: Device(cs-server)# no shutdown |
Enables or reenables the certificate server. If this is the first time that a subordinate certificate server is enabled, the certificate server generates the key and obtain its signing certificate from the root certificate server. |
Examples
If the certificate server fails to enable or if the certificate server has trouble handling the request that has been configured, you can use the debug crypto pki server command to troubleshoot your configuration as shown in the following below (Clock Not Set and Trustpoint Not Configured). Here, "ms2" refers to the label of a 2048-bit RSA key pair.
Router# debug crypto pki server
Clock Not Set
Router(config)# crypto pki server ms2 Router(cs-server)# mode sub-cs Router(cs-server)# no shutdown %Some server settings cannot be changed after CA certificate generation. % Please enter a passphrase to protect the private key % or type Return to exit Password: *Jan 6 20:57:37.667: CRYPTO_CS: enter FSM: input state initial, input signal no shut Re-enter password: *Jan 6 20:57:45.303: CRYPTO_CS: starting enabling checks *Jan 6 20:57:45.303: CRYPTO_CS: key 'sub' does not exist; generated automatically[OK] % Time has not been set. Cannot start the Certificate server
Trustpoint Not Configured
Router(config)# crypto pki server ms2 Router(cs-server)# mode sub-cs Router(cs-server)# no shutdown %Some server settings cannot be changed after CA certificate generation. % Please enter a passphrase to protect the private key or type Return to exit Password: Jan 6 21:00:15.961: CRYPTO_CS: enter FSM: input state initial, input signal no shut. Jan 6 21:03:34.309: CRYPTO_CS: enter FSM: input state initial, input signal time set. Jan 6 21:03:34.313: CRYPTO_CS: exit FSM: new state initial. Jan 6 21:03:34.313: CRYPTO_CS: cs config has been unlocked Re-enter password: Jan 6 21:03:44.413: CRYPTO_CS: starting enabling checks Jan 6 21:03:44.413: CRYPTO_CS: associated trust point 'sub' does not exist; generated automatically Jan 6 21:03:44.417: CRYPTO_CS: key 'sub' does not exist; generated automatically[OK] Jan 6 21:04:03.993: CRYPTO_CS: nvram filesystem Jan 6 21:04:04.077: CRYPTO_CS: serial number 0x1 written. You must specify an enrollment URL for this CA before you can authenticate it. % Failed to authenticate the Certificate Authority
If the certificate server fails to obtain its signing certificate from the root certificate server, you can use the debug crypto pki transactionscommand to troubleshoot your configuration as shown in the following example:
Router# debug crypto pki transactions Jan 6 21:07:00.311: CRYPTO_CS: enter FSM: input state initial, input signal time set Jan 6 21:07:00.311: CRYPTO_CS: exit FSM: new state initial Jan 6 21:07:00.311: CRYPTO_CS: cs config has been unlocked no sh %Some server settings cannot be changed after CA certificate generation. % Please enter a passphrase to protect the private key % or type Return to exit Password: Jan 6 21:07:03.535: CRYPTO_CS: enter FSM: input state initial, input signal no shut Re-enter password: Jan 6 21:07:10.619: CRYPTO_CS: starting enabling checks Jan 6 21:07:10.619: CRYPTO_CS: key 'sub' does not exist; generated automatically[OK] Jan 6 21:07:20.535: %SSH-5-ENABLED: SSH 1.99 has been enabled Jan 6 21:07:25.883: CRYPTO_CS: nvram filesystem Jan 6 21:07:25.991: CRYPTO_CS: serial number 0x1 written. Jan 6 21:07:27.863: CRYPTO_CS: created a new serial file. Jan 6 21:07:27.863: CRYPTO_CS: authenticating the CA 'sub' Jan 6 21:07:27.867: CRYPTO_PKI: Sending CA Certificate Request: GET /cgi-bin/pkiclient.exe?operation=GetCACert&message=sub HTTP/1.0 User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Cisco PKI) Jan 6 21:07:27.867: CRYPTO_PKI: can not resolve server name/IP address Jan 6 21:07:27.871: CRYPTO_PKI: Using unresolved IP Address 192.0.2.6 Certificate has the following attributes: Fingerprint MD5: 328ACC02 52B25DB8 22F8F104 B6055B5B Fingerprint SHA1: 02FD799D DD40C7A8 61DC53AB 1E89A3EA 2A729EE2 % Do you accept this certificate? [yes/no]: Jan 6 21:07:30.879: CRYPTO_PKI: http connection opened Jan 6 21:07:30.903: CRYPTO_PKI: HTTP response header: HTTP/1.1 200 OK Date: Thu, 06 Jan 2005 21:07:30 GMT Server: server-IOS Content-Type: application/x-x509-ca-cert Expires: Thu, 06 Jan 2005 21:07:30 GMT Last-Modified: Thu, 06 Jan 2005 21:07:30 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Accept-Ranges: none Content-Type indicates we have received a CA certificate. Jan 6 21:07:30.903: Received 507 bytes from server as CA certificate: Jan 6 21:07:30.907: CRYPTO_PKI: transaction GetCACert completed Jan 6 21:07:30.907: CRYPTO_PKI: CA certificate received. Jan 6 21:07:30.907: CRYPTO_PKI: CA certificate received. Jan 6 21:07:30.927: CRYPTO_PKI: crypto_pki_authenticate_tp_cert() Jan 6 21:07:30.927: CRYPTO_PKI: trustpoint sub authentication status = 0 y Trustpoint CA certificate accepted.% % Certificate request sent to Certificate Authority % Enrollment in progress... Router (cs-server)# Jan 6 21:07:51.772: CRYPTO_CA: certificate not found Jan 6 21:07:51.772: CRYPTO_CA: certificate not found Jan 6 21:07:52.460: CRYPTO_CS: Publishing 213 bytes to crl file nvram:sub.crl Jan 6 21:07:54.348: CRYPTO_CS: enrolling the server's trustpoint 'sub' Jan 6 21:07:54.352: CRYPTO_CS: exit FSM: new state check failed Jan 6 21:07:54.352: CRYPTO_CS: cs config has been locked Jan 6 21:07:54.356: CRYPTO_PKI: transaction PKCSReq completed Jan 6 21:07:54.356: CRYPTO_PKI: status: Jan 6 21:07:55.016: CRYPTO_PKI: Certificate Request Fingerprint MD5: 1BA027DB 1C7860C7 EC188F65 64356C80 Jan 6 21:07:55.016: CRYPTO_PKI: Certificate Request Fingerprint SHA1: 840DB52C E17614CB 0C7BE187 0DFC884D D32CAA75 Jan 6 21:07:56.508: CRYPTO_PKI: can not resolve server name/IP address Jan 6 21:07:56.508: CRYPTO_PKI: Using unresolved IP Address 192.0.2.6 Jan 6 21:07:56.516: CRYPTO_PKI: http connection opened Jan 6 21:07:59.136: CRYPTO_PKI: received msg of 776 bytes Jan 6 21:07:59.136: CRYPTO_PKI: HTTP response header: HTTP/1.1 200 OK Date: Thu, 06 Jan 2005 21:07:57 GMT Server: server-IOS Content-Type: application/x-pki-message Expires: Thu, 06 Jan 2005 21:07:57 GMT Last-Modified: Thu, 06 Jan 2005 21:07:57 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Accept-Ranges: none Jan 6 21:07:59.324: The PKCS #7 message has 1 verified signers. Jan 6 21:07:59.324: signing cert: issuer=cn=root1 Jan 6 21:07:59.324: Signed Attributes: Jan 6 21:07:59.328: CRYPTO_PKI: status = 102: certificate request pending Jan 6 21:08:00.788: CRYPTO_PKI: can not resolve server name/IP address Jan 6 21:08:00.788: CRYPTO_PKI: Using unresolved IP Address 192.0.2.6 Jan 6 21:08:00.796: CRYPTO_PKI: http connection opened Jan 6 21:08:11.804: CRYPTO_PKI: received msg of 776 bytes Jan 6 21:08:11.804: CRYPTO_PKI: HTTP response header: HTTP/1.1 200 OK Date: Thu, 06 Jan 2005 21:08:01 GMT Server: server-IOS Content-Type: application/x-pki-message Expires: Thu, 06 Jan 2005 21:08:01 GMT Last-Modified: Thu, 06 Jan 2005 21:08:01 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Accept-Ranges: none Jan 6 21:08:11.992: The PKCS #7 message has 1 verified signers. Jan 6 21:08:11.992: signing cert: issuer=cn=root1 Jan 6 21:08:11.996: Signed Attributes: Jan 6 21:08:11.996: CRYPTO_PKI: status = 102: certificate request pending Jan 6 21:08:21.996: CRYPTO_PKI: All sockets are closed for trustpoint sub. Jan 6 21:08:31.996: CRYPTO_PKI: All sockets are closed for trustpoint sub. Jan 6 21:08:41.996: CRYPTO_PKI: All sockets are closed for trustpoint sub. Jan 6 21:08:51.996: CRYPTO_PKI: All sockets are closed for trustpoint sub. Jan 6 21:09:01.996: CRYPTO_PKI: All sockets are closed for trustpoint sub. Jan 6 21:09:11.996: CRYPTO_PKI: resend GetCertInitial, 1 Jan 6 21:09:11.996: CRYPTO_PKI: All sockets are closed for trustpoint sub. Jan 6 21:09:11.996: CRYPTO_PKI: resend GetCertInitial for session: 0 Jan 6 21:09:11.996: CRYPTO_PKI: can not resolve server name/IP address Jan 6 21:09:11.996: CRYPTO_PKI: Using unresolved IP Address 192.0.2.6 Jan 6 21:09:12.024: CRYPTO_PKI: http connection opened% Exporting Certificate Server signing certificate and keys... Jan 6 21:09:14.784: CRYPTO_PKI: received msg of 1611 bytes Jan 6 21:09:14.784: CRYPTO_PKI: HTTP response header: HTTP/1.1 200 OK Date: Thu, 06 Jan 2005 21:09:13 GMT Server: server-IOS Content-Type: application/x-pki-message Expires: Thu, 06 Jan 2005 21:09:13 GMT Last-Modified: Thu, 06 Jan 2005 21:09:13 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Accept-Ranges: none Jan 6 21:09:14.972: The PKCS #7 message has 1 verified signers. Jan 6 21:09:14.972: signing cert: issuer=cn=root1 Jan 6 21:09:14.972: Signed Attributes: Jan 6 21:09:14.976: CRYPTO_PKI: status = 100: certificate is granted Jan 6 21:09:15.668: The PKCS #7 message contains 1 certs and 0 crls. Jan 6 21:09:15.688: Newly-issued Router Cert: issuer=cn=root serial=2 Jan 6 21:09:15.688: start date: 21:08:03 GMT Jan 6 2005 Jan 6 21:09:15.688: end date: 21:08:03 GMT Jan 6 2006 Jan 6 21:09:15.688: Router date: 21:09:15 GMT Jan 6 2005 Jan 6 21:09:15.692: Received router cert from CA Jan 6 21:09:15.740: CRYPTO_CA: certificate not found Jan 6 21:09:15.744: CRYPTO_PKI: All enrollment requests completed for trustpoint sub. Jan 6 21:09:15.744: %PKI-6-CERTRET: Certificate received from Certificate Authority Jan 6 21:09:15.744: CRYPTO_PKI: All enrollment requests completed for trustpoint sub. Jan 6 21:09:15.744: CRYPTO_PKI: All enrollment requests completed for trustpoint sub. Jan 6 21:09:15.748: CRYPTO_CS: enter FSM: input state check failed, input signal cert configured Jan 6 21:09:15.748: CRYPTO_CS: starting enabling checks Jan 6 21:09:15.748: CRYPTO_CS: nvram filesystem Jan 6 21:09:15.796: CRYPTO_CS: found existing serial file. Jan 6 21:09:15.820: CRYPTO_CS: old router cert flag 0x4 Jan 6 21:09:15.820: CRYPTO_CS: new router cert flag 0x44 Jan 6 21:09:18.432: CRYPTO_CS: DB version 1 Jan 6 21:09:18.432: CRYPTO_CS: last issued serial number is 0x1 Jan 6 21:09:18.480: CRYPTO_CS: CRL file sub.crl exists. Jan 6 21:09:18.480: CRYPTO_CS: Read 213 bytes from crl file sub.crl. Jan 6 21:09:18.532: CRYPTO_CS: SCEP server started Jan 6 21:09:18.532: CRYPTO_CS: exit FSM: new state enabled Jan 6 21:09:18.536: CRYPTO_CS: cs config has been locked Jan 6 21:09:18.536: CRYPTO_PKI: All enrollment requests completed for trustpoint sub.
If the certificate server fails to enable or if the certificate server has trouble handling the request that has been configured, you can use the debug crypto pki server command to troubleshoot the progress of an enrollment. This command can also be used to debug the root CA (turn it on at the root CA).
Configuring a Certificate Server to Run in RA Mode
The Cisco IOS XE certificate server can act as an RA for a Cisco IOS XE CA or another third party CA. Read the details in Step 8 for more information about the transparent keyword option if a third-party CA is used.
1.
enable
2.
configure
terminal
3.
crypto
pki
trustpoint
name
4.
enrollment
url
url
5.
subject-name
x.500-name
6.
exit
7.
crypto
pki
server
cs-label
8.
mode
ra
[transparent]
9.
auto-rollover
[time-period]
10.
grant
auto
rollover
{ca-cert |
ra-cert}
11.
no
shutdown
12.
no
shutdown
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. | ||
Step 2 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. | ||
Step 3 |
crypto
pki
trustpoint
name
Example: Device(config)# crypto pki trustpoint ra-server |
Declares the trustpoint that your RA mode certificate server should use and enters ca-trustpoint configuration mode. | ||
Step 4 |
enrollment
url
url
Example: Device(ca-trustpoint)# enrollment url http://ca-server.company.com |
Specifies the enrollment URL of the issuing CA certificate server (root certificate server). | ||
Step 5 |
subject-name
x.500-name
Example: Device(ca-trustpoint)# subject-name cn=ioscs RA |
Specifies the subject name the RA uses.
| ||
Step 6 |
exit
Example: Device(ca-trustpoint)# exit |
Exits ca-trustpoint configuration mode. | ||
Step 7 |
crypto
pki
server
cs-label
Example: Device(config)# crypto pki server ra-server |
Enables a Cisco IOS XE certificate server and enters cs-server configuration mode.
| ||
Step 8 |
mode
ra
[transparent]
Example: Device(cs-server)# mode ra |
Places the PKI server into RA certificate server mode. Use the transparent keyword to allow the CA server in RA mode to interoperate with more than one type of CA server. When the transparent keyword is used, the original PKCS#10 enrollment message is not re-signed and is forwarded unchanged. This enrollment message makes the IOS RA certificate server work with CA servers like the Microsoft CA server. | ||
Step 9 |
auto-rollover
[time-period]
Example: Device(cs-server)# auto-rollover 90 |
(Optional) Enables the automatic CA certificate rollover functionality.
| ||
Step 10 |
grant
auto
rollover
{ca-cert |
ra-cert}
Example: Device(cs-server)# grant auto rollover ra-cert |
(Optional) Automatically grants reenrollment requests for subordinate CAs and RA-mode CAs without operator intervention.
If this is the first time that a subordinate certificate server is enabled and enrolled, the certificate request must be manually granted. | ||
Step 11 |
no
shutdown
Example: Device(cs-server)# no shutdown |
Enables the certificate server.
| ||
Step 12 |
no
shutdown
Example: Device(cs-server)# no shutdown |
Reenables the certificate server. |
Configuring the Root Certificate Server to Delegate Enrollment Tasks to the RA Mode Certificate Server
Perform the following steps on the router that is running the issuing certificate server; that is, configure the root certificate server that is delegating enrollment tasks to the RA mode certificate server.
Note | Granting enrollment requests for an RA is essentially the same process as granting enrollment requests for client devices--except that enrollment requests for an RA are displayed in the section “RA certificate requests” of the command output for the crypto pki server info-requests command. |
1.
enable
2.
crypto
pki
server
cs-label
info
requests
3.
crypto
pki
server
cs-label
grant
req-id
4.
configure
terminal
5.
crypto
pki
server
cs-label
6.
grant
ra-auto
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. | ||
Step 2 |
crypto
pki
server
cs-label
info
requests
Example: Device# crypto pki server root-server info requests |
Displays the outstanding RA certificate request.
| ||
Step 3 |
crypto
pki
server
cs-label
grant
req-id
Example: Device# crypto pki server root-server grant 9 |
Grants the pending RA certificate request.
| ||
Step 4 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. | ||
Step 5 |
crypto
pki
server
cs-label
Example: Device(config)# crypto pki server root-server |
Enables a Cisco IOS XE certificate server and enters cs-server configuration mode. | ||
Step 6 |
grant
ra-auto
Example: Device(cs-server)# grant ra-auto |
(Optional) Specifies that all enrollment requests from an RA are to be granted automatically.
|
What to Do Next
After you have configured a certificate server, you can use the preconfigured default values or specify values through the CLI for the functionality of the certificate server. If you choose to specify values other than the defaults, see the following section, “Configuring Certificate Server Functionality .”
Configuring Certificate Server Functionality
After you have enabled a certificate server and are in certificate server configuration mode, use any of the steps in this task to configure basic certificate server functionality values other than the default values.
- Certificate Server Default Values and Recommended Values
- Certificate Server File Storage and Publication Locations
Certificate Server Default Values and Recommended Values
The default values for a certificate server are intended to address a relatively small network (of about ten devices). For example, the database settings are minimal (through the database level minimalcommand) and the certificate server handles all CRL requests through SCEP. For larger networks, it is recommended that you use either the database setting “names” or “complete” (as described in the database level command) for possible audit and revocation purposes. Depending on the CRL checking policy, you should also use an external CDP in a larger network.
Certificate Server File Storage and Publication Locations
You have the flexibility to store file types to different storage and publication locations.
1.
database
url
root-url
2.
database
url
{cnm |
crl |
crt |
p12 |
pem |
ser}
root-url
3.
database
url
{cnm |
crl |
crt}
publish
root-url
4.
database
level
{minimal |
names |
complete}
5.
database
username
username
[password
[encr-type]
password]
6.
database
archive
{pkcs12 |
pem}[password
encr-type]
password ]
7.
issuer-name
DN-string
8.
lifetime
{ca-certificate |
certificate}
time
9.
lifetime
crl
time
10.
lifetime
enrollment-request
time
11.
cdp-url
url
12.
no
shutdown
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
database
url
root-url
Example: Device(cs-server)# database url tftp://cert-svr-db.company.com |
Specifies the primary location where database entries for the certificate server are written. If this command is not specified, all database entries are written to NVRAM. | ||
Step 2 |
database
url
{cnm |
crl |
crt |
p12 |
pem |
ser}
root-url
Example: Device(cs-server)# database url ser nvram: |
Specifies certificate server critical file storage location by file type.
| ||
Step 3 |
database
url
{cnm |
crl |
crt}
publish
root-url
Example: Device(cs-server)# database url crl publish tftp://csdb_specific_crl_files.company.com |
Specifies certificate server publish location by file type.
| ||
Step 4 |
database
level
{minimal |
names |
complete}
Example: Device(cs-server)# database level complete |
Controls what type of data is stored in the certificate enrollment database.
| ||
Step 5 |
database
username
username
[password
[encr-type]
password]
Example: Device(cs-server)# database username user password PASSWORD |
(Optional) Sets a username and password when a user is required to access a primary certificate enrollment database storage location. | ||
Step 6 |
database
archive
{pkcs12 |
pem}[password
encr-type]
password ]
Example: Device(cs-server)# database archive pem |
(Optional) Sets the CA key and CA certificate archive format and password to encrypt the file. The default value is pkcs12, so if this subcommand is not configured, autoarchiving continues, and the PKCS12 format is used.
| ||
Step 7 |
issuer-name
DN-string
Example: Device(cs-server)# issuer-name my-server |
(Optional) Sets the CA issuer name to the specified distinguished name (DN-string). The default value is as follows: issuer-name cn={cs-label }. | ||
Step 8 |
lifetime
{ca-certificate |
certificate}
time
Example: Device(cs-server)# lifetime certificate 888 |
(Optional) Specifies the lifetime, in days, of a CA certificate or a certificate. Valid values range from 1 day to 1825 days. The default CA certificate lifetime is 3 years; the default certificate lifetime is 1 year. The maximum certificate lifetime is 1 month less than the lifetime of the CA certificate. | ||
Step 9 |
lifetime
crl
time
Example: Device(cs-server)# lifetime crl 333 |
(Optional) Defines the lifetime, in hours, of the CRL that is used by the certificate server. Maximum lifetime value is 336 hours (2 weeks). The default value is 168 hours (1 week). | ||
Step 10 |
lifetime
enrollment-request
time
Example: Device(cs-server)# lifetime enrollment-request 888 |
(Optional) Specifies how long an enrollment request should stay in the enrollment database before being removed. Maximum lifetime is 1000 hours. | ||
Step 11 |
cdp-url
url
Example: Device(cs-server)# cdp-url http://my-cdp.company.com |
(Optional) Defines the CDP location to be used in the certificates that are issued by the certificate server.
If you have PKI clients that are not running Cisco IOS software and that do not support a SCEP GetCRL request, use the following URL format: http://server.company.com/certEnroll/filename.crl Or, if your Cisco IOS certificate server is also configured as your CDP, use the following URL format http://cs-addr/cgi-bin/pkiclient.exe?operation=GetCRL where cs-addr is the location of the certificate server. In order to force the parser to retain the embedded question mark within the specified location, enter Ctrl-v prior to the question mark. If this action is not taken, CRL retrieval through HTTP returns an error message.
| ||
Step 12 |
no
shutdown
Example: Device(cs-server)# no shutdown |
Enables the certificate server. You should issue this command only after you have completely configured your certificate server. |
Examples
The following example shows how to configure a CDP location where the PKI clients do not support SCEP GetCRL requests:
Device(config)# crypto pki server aaa Device(cs-server)# database level minimum Device(cs-server)# database url tftp://10.1.1.1/username1/ Device(cs-server)# issuer-name CN=aaa Device(cs-server)# cdp-url http://server.company.com/certEnroll/aaa.crl
After a certificate server has been enabled on a router, the show crypto pki servercommand displays the following output:
Device# show crypto pki server Certificate Server status:enabled, configured Granting mode is:manual Last certificate issued serial number:0x1 CA certificate expiration timer:19:31:15 PST Nov 17 2006 CRL NextUpdate timer:19:31:15 PST Nov 25 2003 Current storage dir:nvram: Database Level:Minimum - no cert data written to storage
Working with Automatic CA Certificate Rollover
- Starting Automated CA Certificate Rollover Immediately
- Requesting a Certificate Server Client Rollover Certificate
- Exporting a CA Rollover Certificate
Starting Automated CA Certificate Rollover Immediately
Use this task to initiate the automated CA certificate rollover process immediately on your root CA server.
1.
enable
2.
configure
terminal
3.
crypto
pki
server
cs-label
rollover [cancel]
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. |
Step 2 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. |
Step 3 |
crypto
pki
server
cs-label
rollover [cancel]
Example: Device(config)# crypto pki server mycs rollover |
Immediately starts the CA certificate rollover process by generating a shadow CA certificate. To delete the CA certificate rollover certificate and keys, use the cancel keyword. |
Requesting a Certificate Server Client Rollover Certificate
Use this task to request a certificate server client’s rollover certificate.
1.
enable
2.
configure
terminal
3.
crypto
pki
server
cs-label
rollover
request
pkcs10
terminal
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. |
Step 2 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. |
Step 3 |
crypto
pki
server
cs-label
rollover
request
pkcs10
terminal
Example: Device(config)# crypto pki server mycs rollover request pkcs10 terminal |
Requests a client rollover certificate from the server. |
Example
The following example shows a rollover certificate request being inputted into the server:
Device# crypto pki server mycs rollover request pkcs10 terminal % Enter Base64 encoded or PEM formatted PKCS10 enrollment request. % End with a blank line or "quit" on a line by itself. -----BEGIN CERTIFICATE REQUEST----- MIIBUTCBuwIBADASMRAwDgYDVQQDEwdOZXdSb290MIGfMA0GCSqGSIb3DQEBAQUA A4GNADCBiQKBgQDMHeev1ERSs320zbLQQk+3lhV/R2HpYQ/iM6uT1jkJf5iy0UPR wF/X16yUNmG+ObiGiW9fsASF0nxZw+fO7d2X2yh1PakfvF2wbP27C/sgJNOw9uPf sBxEc40Xe0d5FMh0YKOSAShfZYKOflnyQR2Drmm2x/33QGol5QyRvjkeWQIDAQAB oAAwDQYJKoZIhvcNAQEEBQADgYEALM90r4d79X6vxhD0qjuYJXfBCOvv4FNyFsjr aBS/y6CnNVYySF8UBUohXYIGTWf4I4+sj6i8gYfoFUW1/L82djS18TLrUr6wpCOs RqfAfps7HW1e4cizOfjAUU+C7lNcobCAhwF1o6q2nIEjpQ/2yfK9O7sb3SCJZBfe eW3tyCo= -----END CERTIFICATE REQUEST-----
Exporting a CA Rollover Certificate
Use this task to export a CA rollover certificate.
1.
enable
2.
configure
terminal
3.
crypto
pki
export
trustpoint
pem
{terminal |
url
url} [rollover]
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. |
Step 2 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. |
Step 3 |
crypto
pki
export
trustpoint
pem
{terminal |
url
url} [rollover]
Example: Device(config)# crypto pki export mycs pem terminal rollover |
Exports a CA shadow certificate. |
Maintaining Verifying and Troubleshooting the Certificate Server Certificates and the CA
- Managing the Enrollment Request Database
- Removing Requests from the Enrollment Request Database
- Deleting a Certificate Server
- Verifying and Troubleshooting Certificate Server and CA Status
- Verifying CA Certificate Information
Managing the Enrollment Request Database
SCEP supports two client authentication mechanisms--manual and preshared key. Manual enrollment requires the administrator at the CA server to specifically authorize the enrollment requests; enrollment using preshared keys allows the administrator to preauthorize enrollment requests by generating a one-time password (OTP).
Use any of the optional steps within this task to help manage the enrollment request database by performing functions such as specifying enrollment processing parameters that are to be used by SCEP and by controlling the run-time behavior or the certificate server.
1.
enable
2.
crypto
pki
server
cs-label
grant
{all |
req-id}
3.
crypto
pki
server
cs-label
reject
{all |
req-id}
4.
crypto
pki
server
cs-label
password
generate
minutes
5.
crypto
pki
server
cs-label
revoke
certificate-serial-number
6.
crypto
pki
server
cs-label
request
pkcs10
{url |
terminal}
[base64|
pem
7.
show
crypto
pki
server
cs-label
crl
8.
show
crypto
pki
server
cs-label
requests
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. | ||
Step 2 |
crypto
pki
server
cs-label
grant
{all |
req-id}
Example: Device# crypto pki server mycs grant all |
Grants all or specific SCEP requests. | ||
Step 3 |
crypto
pki
server
cs-label
reject
{all |
req-id}
Example: Device# crypto pki server mycs reject all |
Rejects all or specific SCEP requests. | ||
Step 4 |
crypto
pki
server
cs-label
password
generate
minutes
Example: Device# crypto pki server mycs password generate 75 |
Generates a OTP for SCEP requests.
| ||
Step 5 |
crypto
pki
server
cs-label
revoke
certificate-serial-number
Example: Device# crypto pki server mycs revoke 3 |
Revokes a certificate on the basis of its serial number. | ||
Step 6 |
crypto
pki
server
cs-label
request
pkcs10
{url |
terminal}
[base64|
pem
Example: Device# crypto pki server mycs request pkcs10 terminal pem |
Manually adds either a base64-encoded or PEM-formatted PKCS10 certificate enrollment request to the request database. After the certificate is granted, it is displayed on the console terminal using base64 encoding.
| ||
Step 7 |
show
crypto
pki
server
cs-label
crl
Example: Device# show crypto pki server mycs crl |
Displays information regarding the status of the current CRL. | ||
Step 8 |
show
crypto
pki
server
cs-label
requests
Example: Device# show crypto pki server mycs requests |
Displays all outstanding certificate enrollment requests. |
Removing Requests from the Enrollment Request Database
After the certificate server receives an enrollment request, the server can leave the request in a pending state, reject it, or grant it. The request stays in the enrollment request database for 1 week until the client polls the certificate server for the result of the request. If the client exits and never polls the certificate server, you can remove either individual requests or all requests from the database.
Use this task to remove requests from the database and allow the server to be returned to a clean slate with respect to the keys and transaction IDs. Also, you can use this task to help troubleshoot a SCEP client that may not be behaving properly.
1.
enable
2.
crypto
pki
server
cs-label
remove
{all |
req-id}
DETAILED STEPS
Command or Action | Purpose |
---|
Deleting a Certificate Server
Users can delete a certificate server from the PKI configuration if they no longer want it on the configuration. Typically, a subordinate certificate server or an RA is being deleted. However, users may delete a root certificate server if they are moving it to another device through the archived RSA keys.
Perform this task to delete a certificate server from your PKI configuration.
Note | When a certificate server is deleted, the associated trustpoint and key are also deleted. |
1.
enable
2.
configure
terminal
3.
no
crypto
pki
server
cs-label
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. |
Step 2 |
configure
terminal
Example: Device# configure terminal |
Enters global configuration mode. |
Step 3 |
no
crypto
pki
server
cs-label
Example: Device(config)# no crypto pki server mycs |
Deletes a certificate server and associated trustpoint and key. |
Verifying and Troubleshooting Certificate Server and CA Status
Use any of the following optional steps to verify the status of the certificate server or the CA.
1.
enable
2.
debug
crypto
pki
server
3.
dir
filesystem
:
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable
Example: Device> enable |
Enables privileged EXEC mode. |
Step 2 |
debug
crypto
pki
server
Example: Device# debug crypto pki server |
Enables debugging for a crypto PKI certificate server.
|
Step 3 |
dir
filesystem
:
Example: Device# dir slot0: |
Displays a list of files on a file system.
|
Verifying CA Certificate Information
To obtain information relating to the CA certificates including the certificate server rollover process, rollover certificates, and timers, you may use any of the following commands.
Note | These commands are not exclusive to shadow certificate information. If no shadow certificate exists, the following commands display the active certificate information. |
1.
crypto
pki
certificate
chain
2.
crypto
pki
server
info
requests
3.
show
crypto
pki
certificates
4.
show
crypto
pki
server
5.
show
crypto
pki
trustpoints
DETAILED STEPS
Step 1 | crypto
pki
certificate
chain
Example: Device(config)# crypto pki certificate chain mica certificate 06 certificate ca 01 ! This is the peer’s shadow PKI certificate. certificate rollover 0B ! This is the CA shadow PKI certificate certificate rollover ca 0A Displays the certificate chain details and to distinguish the current active certificate from the rollover certificate in the certificate chain. The following example shows a certificate chain with an active CA certificate and a shadow, or rollover, certificate: |
Step 2 | crypto
pki
server
info
requests
Example: Device# crypto pki server myca info requests Enrollment Request Database: RA certificate requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- RA rollover certificate requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- Router certificates requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- 1 pending A426AF07FE3A4BB69062E0E47198E5BF hostname=client Router rollover certificates requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- 2 pending B69062E0E47198E5BFA426AF07FE3A4B hostname=client Displays all outstanding certificate enrollment requests. The following example shows the output for shadow PKI certificate information requests: |
Step 3 | show
crypto
pki
certificates
Example: Device# show crypto pki certificates Certificate Subject Name Name: myrouter.example.com IP Address: 192.0.2.1 Serial Number: 04806682 Status: Pending Key Usage: General Purpose Fingerprint: 428125BD A3419600 3F6C7831 6CD8FA95 00000000 CA Certificate Status: Available Certificate Serial Number: 3051DF7123BEE31B8341DFE4B3A338E5F Key Usage: Not Set Displays information about the certificate, the certification authority certificate, shadow certificates, and any registration authority certificates. The following example displays the certificate of the router and the certificate of the CA. There is no shadow certificate available. A single, general-purpose RSA key pair was previously generated, and a certificate was requested but not received for that key pair. Note that the certificate status of the router shows “Pending.” After the router receives its certificate from the CA, the Status field changes to “Available” in the show output. |
Step 4 | show
crypto
pki
server
Example: Device# show crypto pki server Certificate Server routercs: Status: enabled, configured Issuer name: CN=walnutcs CA cert fingerprint: 800F5944 74337E5B C2DF6C52 9A7B1BDB Granting mode is: auto Last certificate issued serial number: 0x7 CA certificate expiration timer: 22:10:29 GMT Jan 29 2007 CRL NextUpdate timer: 21:50:56 GMT Mar 5 2004 Current storage dir: nvram: Database Level: Minimum - no cert data written to storage Rollover status: available for rollover Rollover CA cert fingerprint: 6AAF5944 74227A5B 23DF3E52 9A7F1FEF Rollover CA certificate expiration timer: 22:10:29 GMT Jan 29 2017 Displays the current state and configuration of the certificate server. The following example shows that the certificate server “routercs” has rollover configured. The CA auto-rollover time has occurred and the rollover, or shadow, PKI certificate is available. The status shows the rollover certificate fingerprint and rollover CA certificate expiration timer information. |
Step 5 |
show
crypto
pki
trustpoints
Example: Device# show crypto pki trustpoints Trustpoint vpn: Subject Name: cn=Cisco SSL CA o=Cisco Systems Serial Number: 0FFEBBDC1B6F6D9D0EA7875875E4C695 Certificate configured. Rollover certificate configured. Enrollment Protocol: SCEPv1, PKI Rollover Displays the trustpoints that are configured in the device. The following output shows that a shadow CA certificate is available and shows the SCEP capabilities reported during the last enrollment operation: |
Configuration Examples for Using a Certificate Server
- Example: Configuring Specific Storage and Publication Locations
- Example: Removing Enrollment Requests from the Enrollment Request Database
- Example: Autoarchiving the Certificate Server Root Keys
- Example: Restoring a Certificate Server from Certificate Server Backup Files
- Example: Subordinate Certificate Server
- Example: RA Mode Certificate Server
- Example: Enabling CA Certificate Rollover to Start Immediately
Example: Configuring Specific Storage and Publication Locations
The following example shows the configuration of a minimal local file system, so that the certificate server can respond quickly to certificate requests. The .ser and .crl files are stored on the local Cisco IOS XE system for fast access, and a copy of all of the .crt files are published to a remote location for long-term logging.
crypto pki server myserver !Pick your database level. database level minimum !Specify a location for the .crt files that is different than the default local !Cisco IOS file system. database url crt publish http://url username user1 password secret
Note | Free space on the local file system should be monitored, in case the .crl file becomes too large. |
The following example shows the configuration of a primary storage location for critical files, a specific storage location for the critical file serial number file, the main certificate server database file, and a password protected file publication location for the CRL file:
Device(config)# crypto pki server mycs Device(cs-server)# database url ftp://cs-db.company.com ! % Server database url was changed. You need to move the % existing database to the new location. ! Device(cs-server)# database url ser nvram: Device(cs-server)# database url crl publish ftp://crl.company.com username myname password mypassword Device(cs-server)# end
The following output displays the specified primary storage location and critical file storage locations specified:
Device# show Sep 3 20:19:34.216: %SYS-5-CONFIG_I: Configured from console by user on console Device# show crypto pki server Certificate Server mycs: Status: disabled Server's configuration is unlocked (enter "no shut" to lock it) Issuer name: CN=mycs CA cert fingerprint: -Not found- Granting mode is: manual Last certificate issued serial number: 0x0 CA certificate expiration timer: 00:00:00 GMT Jan 1 1970 CRL not present. Current primary storage dir: ftp://cs-db.company.com Current storage dir for .ser files: nvram: Database Level: Minimum - no cert data written to storage The following output displays all storage and publication locations. The serial number file (.ser) is stored in NVRAM. The CRL file will be published to ftp://crl.company.com with a username and password. All other critical files will be stored to the primary location, ftp://cs-db.company.com. Device# show running-config section crypto pki server crypto pki server mycs shutdown database url ftp://cs-db.company.com database url crl publish ftp://crl.company.com username myname password 7 12141C0713181F13253920 database url ser nvram: Device#
Example: Removing Enrollment Requests from the Enrollment Request Database
The following examples show both the enrollment requests that are currently in the enrollment request database and the result after one of the enrollment requests has been removed from the database.
Example: Enrollment Request Currently in the Enrollment Request Database
The following example shows that the crypto pki server info requests command has been used to display the enrollment requests that are currently in the Enrollment Request Database:
Device# crypto pki server myserver info requests Enrollment Request Database: RA certificate requests: ReqID State Fingerprint SubjectName ------------------------------------------------------------------------ Router certificates requests: ReqID State Fingerprint SubjectName ------------------------------------------------------------------------ 2 pending 1B07F3021DAAB0F19F35DA25D01D8567 hostname=host1.company.com 1 denied 5322459D2DC70B3F8EF3D03A795CF636 hostname=host2.company.com
Example: crypto pki server remove Command Used to Remove One Enrollment Request
The following example shows that the crypto pki server remove command has been used to remove Enrollment Request 1:
Device# crypto pki server myserver remove 1
Example: Enrollment Request Database After the Removal of One Enrollment Request
The following example shows the result of the removal of Enrollment Request 1 from the Enrollment Request Database:
Device# crypto pki server mycs info requests Enrollment Request Database: RA certificate requests: ReqID State Fingerprint SubjectName ----------------------------------------------------------------- Router certificates requests: ReqID State Fingerprint SubjectName ----------------------------------------------------------------- 2 pending 1B07F3021DAAB0F19F35DA25D01D8567 hostname=host1.company.com
Example: Autoarchiving the Certificate Server Root Keys
The following output configurations and examples show what you might see if the database archive command has not been configured (that is, configured using the default value); if the database archive command has been configured to set the CA certificate and CA key archive format as PEM, without configuring a password; and if the database archive command has been configured to set the CA certificate and CA key archive format as PKCS12, with a password configured. The last example is sample content of a PEM-formatted archive file. The following example, “ms2” refers to the label of a 2048-bit key pair.
Example: database archive Command Not Configured
Note | The default is PKCS12, and the prompt for the password appears after the no shutdown command has been issued. |
Device(config)# crypto pki server ms2 Device(cs-server)# no shutdown % Ready to generate the CA certificate. %Some server settings cannot be changed after CA certificate generation. Are you sure you want to do this? [yes/no]: y % Exporting Certificate Server signing certificate and keys... ! Note the next two lines, which are asking for a password. % Please enter a passphrase to protect the private key. Password: % Certificate Server enabled. Device(cs-server)# end Device# dir nvram: Directory of nvram:/ 125 -rw- 1693 <no date> startup-config 126 ---- 5 <no date> private-config 1 -rw- 32 <no date> myserver.ser 2 -rw- 214 <no date> myserver.crl ! Note the next line, which indicates PKCS12 format. 3 -rw- 1499 <no date> myserver.p12
Example" database archive Command and pem Keyword Configured
Note | The prompt for the password appears after the no shutdown command has been issued. |
Device(config)# crypto pki server ms2 Device(cs-server)# database archive pem Device(cs-server)# no shutdown % Ready to generate the CA certificate. %Some server settings cannot be changed after CA certificate generation. Are you sure you want to do this? [yes/no]: y % Exporting Certificate Server signing certificate and keys... !Note the next two lines, which are asking for a password. % Please enter a passphrase to protect the private key. Password: % Certificate Server enabled. Device(cs-server)# end Device# dir nvram Directory of nvram:/ 125 -rw- 1693 <no date> startup-config 126 ---- 5 <no date> private-config 1 -rw- 32 <no date> myserver.ser 2 -rw- 214 <no date> myserver.crl ! Note the next line showing that the format is PEM. 3 -rw- 1705 <no date> myserver.pem
Example: database archive Command and pkcs12 Keyword (and Password) Configured
Note | When the password is entered, it is encrypted. However, it is recommended that you remove the password from the configuration after the archive has finished. |
Device(config)# crypto pki server ms2 Device(cs-server)# database archive pkcs12 password cisco123 Device(cs-server)# no shutdown % Ready to generate the CA certificate. % Some server settings cannot be changed after CA certificate generation. Are you sure you want to do this? [yes/no]: y % Exporting Certificate Server signing certificate and keys... ! Note that you are not being prompted for a password. % Certificate Server enabled. Device(cs-server)# end Device# dir nvram: Directory of nvram:/ 125 -rw- 1693 <no date> startup-config 126 ---- 5 <no date> private-config 1 -rw- 32 <no date> myserver.ser 2 -rw- 214 <no date> myserver.crl ! Note that the next line indicates that the format is PKCS12. 3 -rw- 1499 <no date> myserver.p12
Example: PEM-Formatted Archive
The following sample output shows that autoarchiving has been configured in PEM file format. The archive consists of the CA certificate and the CA private key. To restore the certificate server using the backup, you would have to import the PEM-formatted CA certificate and CA key individually.
Note | In addition to the CA certificate and CA key archive files, you should also back up the serial file (.ser) and the CRL file (.crl) regularly. The serial file and the CRL file are both critical for CA operation if you need to restore your certificate server. |
Device# more nvram:mycs.pem -----BEGIN CERTIFICATE----- MIIB9zCCAWCgAwIBAgIBATANBgkqhkiG9w0BAQQFADAPMQ0wCwYDVQQDEwRteWNz MB4XDTA0MDgyNzAyMzI0NloXDTA3MDgyNzAyMzI0NlowDzENMAsGA1UEAxMEbXlj czCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA1lZpKP4nGDJHgPkpYSkix7lD nr23aMlZ9Kz5oo/qTBxeZ8mujpjYcZ0T8AZvoOiCuDnYMl796ZwpkMgjz1aZZbL+ BtuVvllsEOfhC+u/Ol/vxfGG5xpshoz/F5J3xdg5ZZuWWuIDAUYu9+QbI5feuG04 Z/BiPIb4AmGTP4B2MM0CAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAYYwHwYDVR0jBBgwFoAUKi/cuK6wkz+ZswVtb06vUJboEeEwHQYDVR0O BBYEFCov3LiusJM/mbMFbW9Or1CW6BHhMA0GCSqGSIb3DQEBBAUAA4GBAKLOmoE2 4+NeOKEXMCXG1jcohK7O2HrkFfl/vpK0+q92PTnMUFhxLOqI8pWIq5CCgC7heace OrTv2zcUAoH4rzx3Rc2USIxkDokWWQMLujsMm/SLIeHit0G5uj//GCcbgK20MAW6 ymf7+TmblSFljWzstoUXC2hLnsJIMq/KffaD -----END CERTIFICATE----- !The private key is protected by the password that is configured in “database archive pem password pwd” or that is entered when you are prompted for the password. -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,106CE91FFD0A075E zyiFC8rKv8Cs+IKsQG2QpsVpvDBHqZqBSM4D528bvZv7jzr6WuHj8E6zO+6G8R/A zjsfTALo+e+ZDg7KMzbryHARvjskbqFdOMLlVIYBhCeSElKsskWB6chOuyPHJInW JwC5YzZdZwOqcyLBP/xOYXcvjzzNfPAXZzN12VR8vWDNq/kHT+3Lplc8hY++ABMI M+C9FB3dpNZzu5O1BZCJg46bqbkulaCCmScIDaVt0zDFZwWTSufiemmNxZBG4xS8 t5t+FEhmSfv8DAmwg4f/KVRFTm10phUArcLxQO38Al0W5YHHORdACnuzVUvHgco7 VT4XUTjO7qMhmJgFNWy1pu49fbdS2NnOn5IoiyAq5lk1KUPrz/WABWiCvLMylGnZ kyMCWoaMtgS/vdx74BBCj09yRZJnLMlIi6SDofjCNTDHfmFEVg4LsSWCd4lP9OP8 0MqhP1D5VIx6PbMNwkWW12lpBbCCdesFRGHjZD2dOu96kHD7ItErx34CC8W04aG4 b7DLktUu6WNV6M8g3CAqJiC0V8ATlp+kvdHZVkXovgND5IU0OJpsj0HhGzKAGpOY KTGTUekUboISjVVkI6efp1vO6temVL3Txg3KGhzWMJGrq1snghE0KnV8tkddv/9N d/t1l+we9mrccTq50WNDnkEi/cwHI/0PKXg+NDNH3k3QGpAprsqGQmMPdqc5ut0P 86i4cF9078QwWg4Tpay3uqNH1Zz6UN0tcarVVNmDupFESUxYw10qJrrEYVRadu74 rKAU4Ey4xkAftB2kuqvr21Av/L+jne4kkGIoZYdB+p/M98pQRgkYyg== -----END RSA PRIVATE KEY-----
Example: Restoring a Certificate Server from Certificate Server Backup Files
The following example shows that restoration is from a PKCS12 archive and that the database URL is NVRAM (the default).
Device# copy tftp://192.0.2.71/backup.ser nvram:mycs.ser Destination filename [mycs.ser]? 32 bytes copied in 1.320 secs (24 bytes/sec) Device# copy tftp://192.0.2.71/backup.crl nvram:mycs.crl Destination filename [mycs.crl]? 214 bytes copied in 1.324 secs (162 bytes/sec) Device# configure terminal Device(config)# crypto pki import mycs pkcs12 tftp://192.0.2.71/backup.p12 cisco123 Source filename [backup.p12]? CRYPTO_PKI: Imported PKCS12 file successfully. Device(config)# crypto pki server mycs ! fill in any certificate server configuration here Device(cs-server)# no shutdown % Certificate Server enabled. Device(cs-server)# end Device# show crypto pki server Certificate Server mycs: Status: enabled Server's current state: enabled Issuer name: CN=mycs CA cert fingerprint: 34885330 B13EAD45 196DA461 B43E813F Granting mode is: manual Last certificate issued serial number: 0x1 CA certificate expiration timer: 01:49:13 GMT Aug 28 2007 CRL NextUpdate timer: 01:49:16 GMT Sep 4 2004 Current storage dir: nvram: Database Level: Minimum - no cert data written to storage
The following example shows that restoration is from a PEM archive and that the database URL is flash:
Device# copy tftp://192.0.2.71/backup.ser flash:mycs.ser Destination filename [mycs.ser]? 32 bytes copied in 1.320 secs (24 bytes/sec) Router# copy tftp://192.0.2.71/backup.crl flash:mycs.crl Destination filename [mycs.crl]? 214 bytes copied in 1.324 secs (162 bytes/sec) Device# configure terminal ! Because CA cert has Digital Signature usage, you need to import using the "usage-keys" keyword Device(config)# crypto ca import mycs pem usage-keys terminal cisco123 % Enter PEM-formatted CA certificate. % End with a blank line or "quit" on a line by itself. ! Paste the CA cert from .pem archive. -----BEGIN CERTIFICATE----- MIIB9zCCAWCgAwIBAgIBATANBgkqhkiG9w0BAQQFADAPMQ0wCwYDVQQDEwRteWNz MB4XDTA0MDkwMjIxMDI1NloXDTA3MDkwMjIxMDI1NlowDzENMAsGA1UEAxMEbXlj czCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuGnnDXJbpDDQwCuKGs5Zg2rc K7ZJauSUotTmWYQvNx+ZmWrUs5/j9Ee5FV2YonirGBQ9mc6u163kNlrIPFck062L GpahBhNmKDgod1o2PHTnRlZpEZNDIqU2D3hACgByxPjrY4vUnccV36ewLnQnYpp8 szEu7PYTJr5dU5ltAekCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAYYwHwYDVR0jBBgwFoAUaEEQwYKCQ1dm9+wLYBKRTlzxaDIwHQYDVR0O BBYEFGhBEMGCgkNXZvfsC2ASkU5c8WgyMA0GCSqGSIb3DQEBBAUAA4GBAHyhiv2C mH+vswkBjRA1Fzzk8ttu9s5kwqG0dXp25QRUWsGlr9nsKPNdVKt3P7p0A/KochHe eNiygiv+hDQ3FVnzsNv983le6O5jvAPxc17RO1BbfNhqvEWMsXdnjHOcUy7XerCo +bdPcUf/eCiZueH/BEy/SZhD7yovzn2cdzBN -----END CERTIFICATE----- % Enter PEM-formatted encrypted private SIGNATURE key. % End with "quit" on a line by itself. ! Paste the CA private key from .pem archive. -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,5053DC842B04612A 1CnlF5Pqvd0zp2NLZ7iosxzTy6nDeXPpNyJpxB5q+V29IuY8Apb6TlJCU7YrsEB/ nBTK7K76DCeGPlLpcuyEI171QmkQJ2gA0QhC0LrRo09WrINVH+b4So/y7nffZkVb p2yDpZwqoJ8cmRH94Tie0YmzBtEh6ayOud11z53qbrsCnfSEwszt1xrW1MKrFZrk /fTy6loHzGFzl3BDj4r5gBecExwcPp74ldHO+Ld4Nc9egG8BYkeBCsZZOQNVhXLN I0tODOs6hP915zb6OrZFYv0NK6grTBO9D8hjNZ3U79jJzsSP7UNzIYHNTzRJiAyu i56Oy/iHvkCSNUIK6zeIJQnW4bSoM1BqrbVPwHU6QaXUqlNzZ8SDtw7ZRZ/rHuiD RTJMPbKquAzeuBss1132OaAUJRStjPXgyZTUbc+cWb6zATNws2yijPDTR6sRHoQL 47wHMr2Yj80VZGgkCSLAkL88ACz9TfUiVFhtfl6xMC2yuFl+WRk1XfF5VtWe5Zer 3Fn1DcBmlF7O86XUkiSHP4EV0cI6n5ZMzVLx0XAUtdAl1gD94y1V+6p9PcQHLyQA pGRmj5IlSFw90aLafgCTbRbmC0ChIqHy91UFa1ub0130+yu7LsLGRlPmJ9NE61JR bjRhlUXItRYWY7C4M3m/0wz6fmVQNSumJM08RHq6lUB3olzIgGIZlZkoaESrLG0p qq2AENFemCPF0uhyVS2humMHjWuRr+jedfc/IMl7sLEgAdqCVCfV3RZVEaNXBud1 4QjkuTrwaTcRXVFbtrVioT/puyVUlpA7+k7w+F5TZwUV08mwvUEqDw== -----END RSA PRIVATE KEY----- quit % Enter PEM-formatted SIGNATURE certificate. % End with a blank line or "quit" on a line by itself. ! Paste the CA cert from .pem archive again. -----BEGIN CERTIFICATE----- MIIB9zCCAWCgAwIBAgIBATANBgkqhkiG9w0BAQQFADAPMQ0wCwYDVQQDEwRteWNz MB4XDTA0MDkwMjIxMDI1NloXDTA3MDkwMjIxMDI1NlowDzENMAsGA1UEAxMEbXlj czCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuGnnDXJbpDDQwCuKGs5Zg2rc K7ZJauSUotTmWYQvNx+ZmWrUs5/j9Ee5FV2YonirGBQ9mc6u163kNlrIPFck062L GpahBhNmKDgod1o2PHTnRlZpEZNDIqU2D3hACgByxPjrY4vUnccV36ewLnQnYpp8 szEu7PYTJr5dU5ltAekCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8B Af8EBAMCAYYwHwYDVR0jBBgwFoAUaEEQwYKCQ1dm9+wLYBKRTlzxaDIwHQYDVR0O BBYEFGhBEMGCgkNXZvfsC2ASkU5c8WgyMA0GCSqGSIb3DQEBBAUAA4GBAHyhiv2C mH+vswkBjRA1Fzzk8ttu9s5kwqG0dXp25QRUWsGlr9nsKPNdVKt3P7p0A/KochHe eNiygiv+hDQ3FVnzsNv983le6O5jvAPxc17RO1BbfNhqvEWMsXdnjHOcUy7XerCo +bdPcUf/eCiZueH/BEy/SZhD7yovzn2cdzBN -----END CERTIFICATE----- % Enter PEM-formatted encrypted private ENCRYPTION key. % End with "quit" on a line by itself. ! Because the CA cert only has Digital Signature usage, skip the encryption part. quit % PEM files import succeeded. Device(config)# crypto pki server mycs Device(cs-server)# database url flash: ! Fill in any certificate server configuration here. Device(cs-server)# no shutdown % Certificate Server enabled. Device(cs-server)# end Device# show crypto pki server Certificate Server mycs: Status: enabled Server's current state: enabled Issuer name: CN=mycs CA cert fingerprint: F04C2B75 E0243FBC 19806219 B1D77412 Granting mode is: manual Last certificate issued serial number: 0x2 CA certificate expiration timer: 21:02:55 GMT Sep 2 2007 CRL NextUpdate timer: 21:02:58 GMT Sep 9 2004 Current storage dir: flash: Database Level: Minimum - no cert data written to storage
Example: Subordinate Certificate Server
The following configuration and output is typical of what you might see after configuring a subordinate certificate server. Please be aware that “ms2” refers to a 2048-bit RSA key that was generated in an earlier step.
Device(config)# crypto pki trustpoint sub Device(ca-trustpoint)# enrollment url http://192.0.2.6 Device(ca-trustpoint)# rsa keypair ms2 2048 Device(ca-trustpoint)# exit Device(config)# crypto pki server sub Device(cs-server)# mode sub-cs Device(ca-server)# no shutdown %Some server settings cannot be changed after CA certificate generation. % Please enter a passphrase to protect the private key % or type Return to exit Password: Jan 6 22:32:22.698: CRYPTO_CS: enter FSM: input state initial, input signal no shut Re-enter password: Jan 6 22:32:30.302: CRYPTO_CS: starting enabling checks Jan 6 22:32:30.306: CRYPTO_CS: key 'sub' does not exist; generated automatically [OK] Jan 6 22:32:39.810: %SSH-5-ENABLED: SSH 1.99 has been enabled Certificate has the following attributes: Fingerprint MD5: 328ACC02 52B25DB8 22F8F104 B6055B5B Fingerprint SHA1: 02FD799D DD40C7A8 61DC53AB 1E89A3EA 2A729EE2 % Do you accept this certificate? [yes/no]: Jan 6 22:32:44.830: CRYPTO_CS: nvram filesystem Jan 6 22:32:44.922: CRYPTO_CS: serial number 0x1 written. Jan 6 22:32:46.798: CRYPTO_CS: created a new serial file. Jan 6 22:32:46.798: CRYPTO_CS: authenticating the CA 'sub'y Trustpoint CA certificate accepted.% % Certificate request sent to Certificate Authority % Enrollment in progress... Router (cs-server)# Jan 6 22:33:30.562: CRYPTO_CS: Publishing 213 bytes to crl file nvram:sub.crl Jan 6 22:33:32.450: CRYPTO_CS: enrolling the server's trustpoint 'sub' Jan 6 22:33:32.454: CRYPTO_CS: exit FSM: new state check failed Jan 6 22:33:32.454: CRYPTO_CS: cs config has been locked Jan 6 22:33:33.118: CRYPTO_PKI: Certificate Request Fingerprint MD5: CED89E5F 53B9C60E > AA123413 CDDAD964 Jan 6 22:33:33.118: CRYPTO_PKI: Certificate Request Fingerprint SHA1: 70787C76 ACD7E67F 7D2C8B23 98CB10E7 718E84B1 % Exporting Certificate Server signing certificate and keys... Jan 6 22:34:53.839: %PKI-6-CERTRET: Certificate received from Certificate Authority Jan 6 22:34:53.843: CRYPTO_CS: enter FSM: input state check failed, input signal cert configured Jan 6 22:34:53.843: CRYPTO_CS: starting enabling checks Jan 6 22:34:53.843: CRYPTO_CS: nvram filesystem Jan 6 22:34:53.883: CRYPTO_CS: found existing serial file. Jan 6 22:34:53.907: CRYPTO_CS: old router cert flag 0x4 Jan 6 22:34:53.907: CRYPTO_CS: new router cert flag 0x44 Jan 6 22:34:56.511: CRYPTO_CS: DB version Jan 6 22:34:56.511: CRYPTO_CS: last issued serial number is 0x1 Jan 6 22:34:56.551: CRYPTO_CS: CRL file sub.crl exists. Jan 6 22:34:56.551: CRYPTO_CS: Read 213 bytes from crl file sub.crl. Jan 6 22:34:56.603: CRYPTO_CS: SCEP server started Jan 6 22:34:56.603: CRYPTO_CS: exit FSM: new state enabled Jan 6 22:34:56.603: CRYPTO_CS: cs config has been locked Jan 6 22:35:02.359: CRYPTO_CS: enter FSM: input state enabled, input signal time set Jan 6 22:35:02.359: CRYPTO_CS: exit FSM: new state enabled Jan 6 22:35:02.359: CRYPTO_CS: cs config has been locked
- Example: Root Certificate Server Differentiation
- Example: Show Output for a Subordinate Certificate Server
Example: Root Certificate Server Differentiation
When issuing certificates, the root certificate server (or parent subordinate certificate server) differentiates the certificate request from “Sub CA,” “RA,” and peer requests, as shown in the following sample output:
Device# crypto pki server server1 info req Enrollment Request Database: RA certificate requests: ReqID State Fingerprint SubjectName ---------------------------------------------------------------------------- Subordinate CS certificate requests: ReqID State Fingerprint SubjectName ---------------------------------------------------------------------------- 1 pending CB9977AD8A73B146D3221749999B0F66 hostname=host-subcs.company.com RA certificate requests: ReqID State Fingerprint SubjectName ----------------------------------------------------------------------------- Router certificate requests: ReqID State Fingerprint SubjectName -----------------------------------------------------------------------------
Example: Show Output for a Subordinate Certificate Server
The following show crypto pki server commandoutput indicates that a subordinate certificate server has been configured:
Device# show crypto pki server Certificate Server sub: Status: enabled Server's configuration is locked (enter "shut" to unlock it) Issuer name: CN=sub CA cert fingerprint: 11B586EE 3B354F33 14A25DDD 7BD39187 Server configured in subordinate server mode Upper CA cert fingerprint: 328ACC02 52B25DB8 22F8F104 B6055B5B Granting mode is: manual Last certificate issued serial number: 0x1 CA certificate expiration timer: 22:33:44 GMT Jan 6 2006 CRL NextUpdate timer: 22:33:29 GMT Jan 13 2005 Current storage dir: nvram: Database Level: Minimum - no cert data written to storage
Example: RA Mode Certificate Server
The following output is typical of what you might see after having configured an RA mode certificate server:
Device-ra(config)# crypto pki trustpoint myra Device-ra(ca-trustpoint)# enrollment url http://192.0.2.17 ! Include "cn=ioscs RA" or "ou=ioscs RA" in the subject-name. Device-ra(ca-trustpoint)# subject-name cn=myra, ou=ioscs RA, o=company, c=us Device-ra(ca-trustpoint)# exit Device-ra(config)# crypto pki server myra Device-ra(cs-server)# mode ra Device-ra(cs-server)# no shutdown % Generating 1024 bit RSA keys ...[OK] Certificate has the following attributes: Fingerprint MD5: 32661452 0DDA3CE5 8723B469 09AB9E85 Fingerprint SHA1: 9785BBCD 6C67D27C C950E8D0 718C7A14 C0FE9C38 % Do you accept this certificate? [yes/no]: yes Trustpoint CA certificate accepted. % Ready to request the CA certificate. %Some server settings cannot be changed after the CA certificate has been requested. Are you sure you want to do this? [yes/no]: yes % % Start certificate enrollment .. % Create a challenge password. You will need to verbally provide this password to the CA administrator in order to revoke your certificate. For security reasons your password will not be saved in the configuration. Please make a note of it. Password: Re-enter password: % The subject name in the certificate will include: cn=myra, ou=ioscs RA, o=company, c=us % The subject name in the certificate will include: Router-ra.company.com % Include the router serial number in the subject name? [yes/no]: no % Include an IP address in the subject name? [no]: no Request certificate from CA? [yes/no]: yes % Certificate request sent to Certificate Authority % The certificate request fingerprint will be displayed. % The 'show crypto pki certificate' command will also show the fingerprint. % Enrollment in progress... Device-ra (cs-server)# Sep 15 22:32:40.197: CRYPTO_PKI: Certificate Request Fingerprint MD5: 82B41A76 AF4EC87D AAF093CD 07747D3A Sep 15 22:32:40.201: CRYPTO_PKI: Certificate Request Fingerprint SHA1: 897CDF40 C6563EAA 0FED05F7 0115FD3A 4FFC5231 Sep 15 22:34:00.366: %PKI-6-CERTRET: Certificate received from Certificate Authority Device-ra(cs-server)# end Device-ra# show crypto pki server Certificate Server myra: Status: enabled Issuer name: CN=myra CA cert fingerprint: 32661452 0DDA3CE5 8723B469 09AB9E85 ! Note that the certificate server is running in RA mode Server configured in RA mode RA cert fingerprint: C65F5724 0E63B3CC BE7AE016 BE0D34FE Granting mode is: manual Current storage dir: nvram: Database Level: Minimum - no cert data written to storage
The following output shows the enrollment request database of the issuing certificate server after the RA has been enabled:
Note | The RA certificate request is recognized by the issuing certificate server because "ou=ioscs RA" is listed in the subject name. |
Device-ca# crypto pki server mycs info request Enrollment Request Database: Subordinate CA certificate requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- ! The request is identified as RA certificate request. RA certificate requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- 12 pending 88F547A407FA0C90F97CDE8900A30CB0 hostname=Router-ra.company.com,cn=myra,ou=ioscs RA,o=company,c=us Router certificates requests: ReqID State Fingerprint SubjectName -------------------------------------------------------------- ! Issue the RA certificate. Device-ca# crypto pki server mycs grant 12
The following output shows that the issuing certificate server is configured to issue a certificate automatically if the request comes from an RA:
Device-ca(config)# crypto pki server mycs Device-ca(cs-server)# grant ra-auto % This will cause all certificate requests already authorized by known RAs to be automatically granted. Are you sure you want to do this? [yes/no]: yes Router-ca (cs-server)# end Device-ca# show crypto pki server Certificate Server mycs: Status: enabled Server's current state: enabled Issuer name: CN=mycs CA cert fingerprint: 32661452 0DDA3CE5 8723B469 09AB9E85 ! Note that the certificate server will issue certificate for requests from the RA. Granting mode is: auto for RA-authorized requests, manual otherwise Last certificate issued serial number: 0x2 CA certificate expiration timer: 22:29:37 GMT Sep 15 2007 CRL NextUpdate timer: 22:29:39 GMT Sep 22 2004 Current storage dir: nvram: Database Level: Minimum - no cert data written to storage
The following example shows the configuration of “myra”, an RA server, configured to support automatic rollover from “myca”, the CA. After the RA server is configured, automatic granting of certificate reenrollment requests is enabled:
crypto pki trustpoint myra enrollment url http://myca subject-name ou=iosca RA rsakeypair myra crypto pki server myra mode ra auto-rollover crypto pki server mycs grant auto rollover ra-cert auto-rollover 25
Example: Enabling CA Certificate Rollover to Start Immediately
The following example shows how to enable automated CA certificate rollover on the server mycs with the crypto pki servercommand. The show crypto pki server command then shows the current state of the mycs server and that the rollover certificate is currently available for rollover.
Device(config)# crypto pki server mycs rollover Jun 20 23:51:21.211:%PKI-4-NOSHADOWAUTOSAVE:Configuration was modified. Issue "write memory" to save new IOS CA certificate ! The config has not been automatically saved because the config has been changed. Device# show crypto pki server Certificate Server mycs: Status:enabled Server's configuration is locked (enter "shut" to unlock it) Issuer name:CN=mycs CA cert fingerprint:E7A5FABA 5D7AA26C F2A9F7B3 03CE229A Granting mode is:manual Last certificate issued serial number:0x2 CA certificate expiration timer:00:49:26 PDT Jun 20 2008 CRL NextUpdate timer:00:49:29 PDT Jun 28 2005 Current storage dir:nvram: Database Level:Minimum - no cert data written to storage Rollover status:available for rollover ! Rollover certificate is available for rollover. Rollover CA certificate fingerprint:9BD7A443 00A6DD74 E4D9ED5F B7931BE0 Rollover CA certificate expiration time:00:49:26 PDT Jun 20 2011 Auto-Rollover configured, overlap period 25 days
Where to Go Next
After the certificate server is successfully running, you can either begin enrolling clients through manual mechanisms (as explained in the module “Configuring Certificate Enrollment for a PKI”) or begin configuring SDP, which is a web-based enrollment interface, (as explained in the module “Setting Up Secure Device Provisioning (SDP) for Enrollment in a PKI.”)
Additional References for Configuring and Managing a Cisco IOS XE Certificate Server for PKI Deployment
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
PKI and security commands |
|
USB Token RSA Operations: Using the RSA keys on a USB token for initial autoenrollment |
Configuring Certificate Enrollment for a PKI |
USB Token RSA Operations: Benefits of using USB tokens |
Storing PKI Credentials |
Certificate server client certificate enrollment, autoenrollment, and automatic rollover |
Configuring Certificate Enrollment for a PKI |
Setting up and logging into a USB token |
Storing PKI Credentials |
Web-based certificate enrollment |
Setting Up Secure Device Provisioning (SDP) for Enrollment in a PKI |
RSA keys in PEM formatted files |
Deploying RSA Keys Within a PKI |
Choosing a certificate revocation mechanism |
Configuring Authorization and Revocation of Certificates in a PKI |
Recommended cryptographic algorithms |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for Configuring and Managing a Cisco IOS XE Certificate Server for PKI Deployment
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Information |
---|---|---|
PKI IOS XE Certificate Server |
Cisco IOS XE Release 3.15S |
This feature introduces support for the Cisco IOS certificate server, which offers users a CA that is directly integrated with Cisco software to more easily deploy basic PKI networks. The following commands were introduced or modified: auto-rollover, crypto key generate rsa, crypto pki certificate chain,, crypto pki export pem, crypto pki server info request, crypto pki server, database archive, database url , enrollment url (ca-trustpoint), grant auto rollover, grant ra-auto, lifetime enrollment-requests, mode ra, show crypto pki certificates, show crypto pki server, and show crypto pki trustpoint |