Step 1
|
enable
|
Enables
privileged EXEC mode.
|
Step 2
|
configure terminal
Router# configure terminal
|
Enters global
configuration mode.
|
Step 3
|
ip http server
Router(config)# ip http server
|
Enables the
HTTP server on the Cisco Unified CME router.
|
Step 4
|
crypto pki server
cs-label
Router(config)# crypto pki server IOS-CA
|
Enables a
Cisco IOS certificate server and enters certificate server configuration mode.
Note
|
The
certificate server name should not exceed 13 characters.
|
|
Step 5
|
database level
{ minimum
|
names
| complete}
Router(cs-server)# database level complete
|
Controls what
type of data is stored in the certificate enrollment database.
|
Step 6
|
database url
root
url
Router(cs-server)# database url flash:
|
Specifies the
location where database entries for the certificate server will be stored or
published.
|
Step 7
|
grant auto
Router(cs-server)# grant auto
|
(Optional)
Allows an automatic certificate to be issued to any requester. The recommended
method and default if this command is not used is manual enrollment.
|
Step 8
|
exit
|
Exits
certificate server configuration mode.
|
Step 9
|
crypto pki trustpoint
name
Router(config)# crypto pki trustpoint IOS-CA
|
Declares a
trustpoint and enters ca-trustpoint configuration mode.
|
Step 10
|
enrollment url
url
Router(ca-trustpoint)# enrollment url http://10.1.1.1:80
|
Specifies
the enrollment parameters of a certification authority.
|
Step 11
|
exit
Router(ca-trustpoint)# exit
|
Exits
ca-trustpoint configuration mode.
|
Step 12
|
crypto pki server
cs-label
Router(config)# crypto pki server IOS-CA
|
Enables a
Cisco IOS certificate server and enters certificate server configuration mode.
Note
|
The
certificate server name should not exceed 13 characters.
|
|
Step 13
|
no shutdown
Router(cs-server)# no shutdown
|
Enables the
Cisco IOS Certification Authority.
|
Step 14
|
exit
|
Exits
certificate server configuration mode.
|
Step 15
|
crypto pki
trustpoint
name
Router(config)# crypto pki trustpoint primary-cme
|
Declares a
trustpoint and enters ca-trustpoint configuration mode.
|
Step 16
|
enrollment url
url
Router(ca-trustpoint)# enrollment url http://10.1.1.1:80
|
Specifies
the enrollment parameters of the certification authority.
|
Step 17
|
revocation-check
method1
[ method2[ method3] ]
Router(ca-trustpoint)# revocation-check none
|
Checks the
revocation status of a certificate.
|
Step 18
|
rsakeypair
key-label
Router(ca-trustpoint)# rsakeypair primary-cme
|
Specifies
which RSA key pair to associate with the certificate.
|
Step 19
|
exit
Router(ca-trustpoint)# exit
|
Exits
ca-trustpoint configuration mode.
|
Step 20
|
crypto pki
authenticate
name
Router(config)# crypto pki authenticate primary-cme
|
Authenticates the certification authority by getting the
authority's certificate.
|
Step 21
|
crypto pki enroll
name
Router(config)# crypto pki enroll primary-cme
|
Obtains the
certificates for the router from the certificate authority.
|
Step 22
|
crypto pki
trustpoint
name
Router(config)# crypto pki trustpoint sast-secondary
|
Declares a
trustpoint and enters ca-trustpoint configuration mode.
|
Step 23
|
enrollment url
url
Router(ca-trustpoint)# enrollment url http://10.1.1.1:80
|
Specifies
the enrollment parameters of a certification authority.
|
Step 24
|
revocation-check
method1
[ method2[ method3] ]
Router(ca-trustpoint)# revocation-check none
|
Checks the
revocation status of a certificate.
|
Step 25
|
rsakeypair
key-label
Router(ca-trustpoint)# rsakeypair sast-secondary
|
Specifies
which RSA key pair to associate with the certificate.
|
Step 26
|
exit
Router(ca-trustpoint)# exit
|
Exits
ca-trustpoint configuration mode.
|
Step 27
|
crypto pki
authenticate
name
Router(config)# crypto pki authenticate sast-secondary
|
Authenticates the certification authority by getting the
authority's certificate.
|
Step 28
|
crypto pki enroll
name
Router(config)# crypto pki enroll sast-secondary
|
Obtains the
certificates for the router from the certificate authority.
|
Step 29
|
ctl-client
Router(config)# ctl-client
|
Enters
CTL-client configuration mode to set parameters for the CTL client.
|
Step 30
|
sastl trustpoint
label
Router(config-ctl-client)# sast1 trustpoint first-sast
|
Configures
the credentials for the primary SAST.
Note
|
SAST1 and
SAST2 certificates must be different from each other. The CTL file is always
signed by SAST1. The SAST2 credentials are included in the CTL file so that if
the SAST1 certificate is compromised, the file can be signed by SAST2 to
prevent phones from being reset to the factory default.
|
|
Step 31
|
sast2 trustpoint
label
Router(config-ctl-client)# sast2 trustpoint second-sast
|
Configures
the credentials for the secondary SAST.
Note
|
SAST1 and
SAST2 certificates must be different from each other. The CTL file is always
signed by SAST1. The SAST2 credentials are included in the CTL file so that if
the SAST1 certificate is compromised, the file can be signed by SAST2 to
prevent phones from being reset to the factory default.
|
|
Step 32
|
import certificate
tag description
flash:
cert_name
Router(config-ctl-client)# import certificate 5 FlashCert flash:flash_cert.cer
|
Imports a
trusted certificate in PEM format from flash memory to the CTL file of an IP
phone.
Note
|
This step
is required to provision HTTPS service running on external server.
|
-
tag —identifier for the trusted certificate.
-
description —Descriptive name of the trusted
certificate.
-
flash:cert_cert —Specifies the filename of the trusted
certificate stored in flash memory.
|
Step 33
|
server application server
address trustpoint label
Router(config-ctl-client)# server application 10.1.2.3 trustpoint first-sast
|
Configures
the server application and the credentials for the SAST.
|
Step 34
|
regenerate
Router(config-ctl-client)# regenerate
|
Creates a
new CTLFile.tlv after you make changes to the CTL client configuration.
|
Step 35
|
end
Router(config-ctl-client)# end
|
Exits to
privileged EXEC mode.
|