Restrictions for Certification Authority
When configuring your CA, the following restrictions apply:
•
This feature should be configured only when you also configure both IPsec and Internet Key Exchange
(IKE) in your network.
•
The Cisco IOS software does not support CA server public keys greater than 2048 bits.
Information About Certification Authority
CA Supported Standards
Without certification authority (CA) interoperability, Cisco IOS devices could not use CAs when deploying
IPSec. CAs provide a manageable, scalable solution for IPSec networks.
Cisco supports the following standards with this feature:
•
IPSec
—
IPSec is a framework of open standards that provides data confidentiality, data integrity, and
data authentication between participating peers. IPSec provides these security services at the IP layer;
it uses Internet Key Exchange to handle negotiation of protocols and algorithms based on local policy,
and to generate the encryption and authentication keys to be used by IPSec. IPSec can be used to protect
one or more data flows between a pair of hosts, between a pair of security gateways, or between a security
gateway and a host.
•
Internet Key Exchange (IKE)
—
A hybrid protocol that implements Oakley and Skeme key exchanges
inside the Internet Security Association Key Management Protocol (ISAKMP) framework. Although
IKE can be used with other protocols, its initial implementation is with the IPSec protocol. IKE provides
authentication of the IPSec peers, negotiates IPSec keys, and negotiates IPSec security associations.
•
Public-Key Cryptography Standard #7 (PKCS #7)
—
A standard from RSA Data Security, Inc., used to
encrypt and sign certificate enrollment messages.
•
Public-Key Cryptography Standard #10 (PKCS #10)
—
A standard syntax from RSA Data Security, Inc.
for certificate requests.
•
RSA Keys
—
RSA is the public key cryptographic system developed by Ron Rivest, Adi Shamir, and
Leonard Adleman. RSA keys come in pairs: one public key and one private key.
•
X.509v3 certificates
—
Certificate support that allows the IPSec-protected network to scale by providing
the equivalent of a digital ID card to each device. When two devices wish to communicate, they exchange
digital certificates to prove their identity (thus removing the need to manually exchange public keys
with each peer or to manually specify a shared key at each peer). These certificates are obtained from a
CA. X.509 is part of the X.500 standard of the ITU.
Purpose of CAs
Certificate authorities (CAs) are responsible for managing certificate requests and issuing certificates to
participating IPSec network devices. These services provide centralized key management for the participating
devices.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1142
Restrictions for Certification Authority
Summary of Contents for Catalyst 2960 Series
Page 96: ......
Page 196: ......
Page 250: ......
Page 292: ......
Page 488: ......
Page 589: ...P A R T VI Cisco Flexible NetFlow Configuring NetFlow Lite page 509 ...
Page 590: ......
Page 619: ...P A R T VII QoS Configuring QoS page 539 Configuring Auto QoS page 645 ...
Page 620: ......
Page 750: ......
Page 1604: ......
Page 1740: ......
Page 2105: ...P A R T XII Configuring Cisco IOS IP SLAs Configuring Cisco IP SLAs page 2025 ...
Page 2106: ......
Page 2118: ......
Page 2164: ......