388
C
HAPTER
26: W
EB
S
ERVER
C
OMMANDS
crypto certificate
request
The
crypto certificate request
Privileged EXEC mode command
generates and displays certificate requests for HTTPS.
Syntax
crypto certificate
number
request
[
cn
common- name
][
ou
organization-unit
] [
or
organization
] [
loc
location
] [
st
state
] [
cu
country
]
Parameters
■
number
— Specifies the certificate number. (Range: 1-2)
■
common- name
— Specifies the fully qualified URL or IP address of the
device. (Range: 1- 64)
■
organization-unit
— Specifies the organization-unit or department
name. (Range: 1-64)
■
organization
— Specifies the organization name. (Range: 1-64)
■
location
— Specifies the location or city name. (Range: 1-64)
■
state
— Specifies the state or province name. (Range: 1-64)
■
country
— Specifies the country name. (Range: 2-2)
Default Configuration
There is no default configuration for this command.
Command Mode
Privileged EXEC mode
User Guidelines
Use this command to export a certificate request to a Certification
Authority. The certificate request is generated in Base64-encoded X.509
format.
Before generating a certificate request you must first generate a
self-signed certificate using the
crypto certificate generate
Global
Configuration mode command. Be aware that you have to reenter the
certificate fields.
After receiving the certificate from the Certification Authority, use the
crypto certificate import
Global Configuration mode command to
import the certificate into the device. This certificate replaces the
self-signed certificate.
Summary of Contents for 3CRUS2475 24
Page 18: ......
Page 40: ...40 CHAPTER 2 AAA COMMANDS ...
Page 54: ...54 CHAPTER 3 ACL COMMANDS ...
Page 76: ...76 CHAPTER 4 ADDRESS TABLE COMMANDS ...
Page 166: ...166 CHAPTER 10 CLOCK COMMANDS ...
Page 200: ...200 CHAPTER 13 LACP COMMANDS ...
Page 208: ...208 CHAPTER 14 POWER OVER ETHERNET COMMANDS ...
Page 262: ...262 CHAPTER 15 SPANNING TREE COMMANDS ...
Page 278: ...278 CHAPTER 17 RADIUS COMMAND ...
Page 281: ...show ports monitor 281 g1 8 RX TX Active g2 8 RX TX Active g18 8 RX Active ...
Page 282: ...282 CHAPTER 18 PORT MONITOR COMMANDS ...
Page 306: ...306 CHAPTER 19 SNMP COMMANDS ...
Page 316: ...316 CHAPTER 20 IP ADDRESS COMMANDS ...
Page 330: ...330 CHAPTER 22 WIRELESS ROGUE AP COMMANDS ...
Page 350: ...350 CHAPTER 23 WIRELESS ESS COMMANDS ...
Page 382: ...382 CHAPTER 25 SSH COMMANDS ...
Page 400: ...400 CHAPTER 27 TACACS COMMANDS Global values TimeOut 3 ...
Page 444: ...444 CHAPTER 31 USER INTERFACE COMMANDS ...
Page 454: ...454 CHAPTER 32 GVRP COMMANDS ...
Page 492: ...492 CHAPTER 34 802 1X COMMANDS ...
Page 521: ...Troubleshooting Solutions 521 ...
Page 522: ...522 CHAPTER 37 TROUBLESHOOTING ...