Purpose
Command or Action
Accesses the certification authority (CA) by HTTP
through the proxy server.
enrollment http-proxy hostname port-number
Example:
Device(ca-trustpoint)# enrollment http-proxy
host2 8080
Step 6
Exits CA trustpoint configuration mode and returns to
privileged EXEC mode.
end
Example:
Device(ca-trustpoint)# end
Step 7
Authenticating the CA
The device must authenticate the certification authority (CA). It does this by obtaining the self-signed certificate
of the CA, which contains the public key of the CA. Because the certificate of the CA is self-signed (the CA
signs its own certificate) the public key of the CA should be manually authenticated by contacting the CA
administrator to compare the fingerprint of the CA certificate when you perform this step.
Perform the following task to get the public key of the CA:
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
crypto pki authenticatename
4.
end
DETAILED STEPS
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Example:
Device> enable
Step 1
•
Enter your password if prompted.
Enters global configuration mode.
configure terminal
Example:
Device# configure terminal
Step 2
Authenticates the CA by getting the certificate of the CA.
crypto pki authenticatename
Example:
Device(config)# crypto pki authenticate myca
Step 3
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1151
How to Configure Certification Authority
Summary of Contents for Catalyst 2960 Series
Page 96: ......
Page 196: ......
Page 250: ......
Page 292: ......
Page 488: ......
Page 589: ...P A R T VI Cisco Flexible NetFlow Configuring NetFlow Lite page 509 ...
Page 590: ......
Page 619: ...P A R T VII QoS Configuring QoS page 539 Configuring Auto QoS page 645 ...
Page 620: ......
Page 750: ......
Page 1604: ......
Page 1740: ......
Page 2105: ...P A R T XII Configuring Cisco IOS IP SLAs Configuring Cisco IP SLAs page 2025 ...
Page 2106: ......
Page 2118: ......
Page 2164: ......