Configuring a CA Trustpoint
For secure HTTP connections, we recommend that you configure an official CA trustpoint. A CA trustpoint
is more secure than a self-signed certificate.
Beginning in privileged EXEC mode, follow these steps to configure a CA Trustpoint:
SUMMARY STEPS
1.
configure terminal
2.
hostname hostname
3.
ip domain-name domain-name
4.
crypto key generate rsa
5.
crypto ca trustpoint name
6.
enrollment url url
7.
enrollment http-proxy host-name port-number
8.
crl query url
9.
primary name
10.
exit
11.
crypto ca authentication name
12.
crypto ca enroll name
13.
end
DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
Specifies the hostname of the switch (required only if you have
not previously configured a hostname). The hostname is required
for security keys and certificates.
hostname hostname
Example:
Switch(config)#
hostname your_hostname
Step 2
Specifies the IP domain name of the switch (required only if you
have not previously configured an IP domain name). The domain
name is required for security keys and certificates.
ip domain-name domain-name
Example:
Switch(config)#
ip domain-name your_domain
Step 3
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1135
Information About Secure Socket Layer HTTP
Summary of Contents for Catalyst 2960 Series
Page 96: ......
Page 196: ......
Page 250: ......
Page 292: ......
Page 488: ......
Page 589: ...P A R T VI Cisco Flexible NetFlow Configuring NetFlow Lite page 509 ...
Page 590: ......
Page 619: ...P A R T VII QoS Configuring QoS page 539 Configuring Auto QoS page 645 ...
Page 620: ......
Page 750: ......
Page 1604: ......
Page 1740: ......
Page 2105: ...P A R T XII Configuring Cisco IOS IP SLAs Configuring Cisco IP SLAs page 2025 ...
Page 2106: ......
Page 2118: ......
Page 2164: ......