crypto ca authenticate
To associate and authenticate a certificate of the certificate authority (CA) and configure its CA certificate
(or certificate chain), use the
crypto ca authenticate
command. To remove the association and authentication,
use the
no
form of this command.
crypto ca authenticate trustpoint-label
no crypto ca authenticate trustpoint-label
Syntax Description
Name of the trustpoint. The name The name is
alphanumeric, case sensitive, and has a maximum
length of 64 characters.
trustpoint-label
Command Default
None
Command Modes
Global configuration
Command History
Modification
Release
This command was introduced.
4.1(2)
Usage Guidelines
You can use this command to authenticate the CA to the Cisco NX-OS device by obtaining the self-signed
certificate of the CA that contains the public key of the CA. Because the CA signs its own certificate, you
should manually authenticate the public key of the CA by contacting the CA administrator when you execute
this command. The CA certificate or certificate chain must be available in Privacy Enhanced Mail (PEM)
(base-64) encoded format.
Use this command when you initially configure certificate authority support for the device. First create the
trustpoint using the
crypto ca trustpoint
command using the CA certificate fingerprint published by the CA.
You must compare the certificate fingerprint displayed during authentication with the one published by the
CA and accept the CA certificate only if it matches.
If the CA to authenticate is a subordinate CA (it is not self-signed), then another CA certifies it, which in turn
may be certified by yet another CA, and so on, until there is a self-signed CA. In this case, the subordinate
CA has a CA certificate chain. You must enter the entire chain during CA authentication. The maximum
length that the CA certificate chain supports is ten.
The trustpoint CA is the certificate authority that you configure on the device as the trusted CA. The device
accepts any peer certificate if it is signed by a locally trusted CA or its subordinates.
The trustpoint configuration that you create with the
crypto ca trustpoint
command persists across device
reboots only if you save it explicitly using the
copy running-config startup-config
command. The certificates
and CRL associated to a trustpoint are automatically persistent when you save the trustpoint configuration in
Cisco Nexus 7000 Series Security Command Reference
108
C Commands
crypto ca authenticate
Summary of Contents for Nexus 7000 Series
Page 2: ... Cisco Systems Inc All rights reserved ...
Page 20: ...Cisco Nexus 7000 Series Security Command Reference xx Contents ...
Page 62: ...Cisco Nexus 7000 Series Security Command Reference 36 A Commands aaa authentication rejected ...
Page 78: ...Cisco Nexus 7000 Series Security Command Reference 52 A Commands aaa user default role ...
Page 157: ...Cisco Nexus 7000 Series Security Command Reference 131 C Commands crypto ca import ...
Page 172: ...Cisco Nexus 7000 Series Security Command Reference 146 C Commands cts role based sgt map ...
Page 186: ...Cisco Nexus 7000 Series Security Command Reference 160 C Commands cts role based access list ...
Page 256: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 230 D Commands deny IPv4 ...
Page 271: ...protocol Cisco Nexus 7000 Series Security Command Reference 245 D Commands deny IPv6 ...
Page 274: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 248 D Commands deny IPv6 ...
Page 291: ...Cisco Nexus 7000 Series Security Command Reference 265 D Commands description identity policy ...
Page 293: ...Cisco Nexus 7000 Series Security Command Reference 267 D Commands description user role ...
Page 299: ...Cisco Nexus 7000 Series Security Command Reference 273 D Commands device role ...
Page 313: ...Cisco Nexus 7000 Series Security Command Reference 287 E Commands enable Cert DN match ...
Page 340: ...Cisco Nexus 7000 Series Security Command Reference 314 E Commands eq ...
Page 344: ...Cisco Nexus 7000 Series Security Command Reference 318 F Commands feature cts ...
Page 350: ...Cisco Nexus 7000 Series Security Command Reference 324 F Commands feature ldap ...
Page 369: ...G Commands gt page 344 Cisco Nexus 7000 Series Security Command Reference 343 ...
Page 372: ...Cisco Nexus 7000 Series Security Command Reference 346 G Commands gt ...
Page 398: ...Cisco Nexus 7000 Series Security Command Reference 372 I Commands interface policy deny ...
Page 497: ...Cisco Nexus 7000 Series Security Command Reference 471 K Commands key config key ...
Page 504: ...Cisco Nexus 7000 Series Security Command Reference 478 K Commands key string ...
Page 518: ...Cisco Nexus 7000 Series Security Command Reference 492 L Commands It ...
Page 536: ...Cisco Nexus 7000 Series Security Command Reference 510 M Commands monitor session ...
Page 552: ...Cisco Nexus 7000 Series Security Command Reference 526 O Commands other config flag ...
Page 569: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 543 P Commands permit IPv4 ...
Page 584: ...protocol Cisco Nexus 7000 Series Security Command Reference 558 P Commands permit IPv6 ...
Page 587: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 561 P Commands permit IPv6 ...
Page 622: ...Cisco Nexus 7000 Series Security Command Reference 596 P Commands propagate sgt ...
Page 664: ...Cisco Nexus 7000 Series Security Command Reference 638 R Commands rule ...
Page 737: ...Cisco Nexus 7000 Series Security Command Reference 711 Show Commands show arp access lists ...
Page 841: ...Cisco Nexus 7000 Series Security Command Reference 815 Show Commands show ipv6 dhcp ldra ...
Page 992: ...Cisco Nexus 7000 Series Security Command Reference 966 T Commands trustedCert ...
Page 1015: ...Cisco Nexus 7000 Series Security Command Reference 989 V Commands vlan policy deny ...
Page 1017: ...Cisco Nexus 7000 Series Security Command Reference 991 V Commands vrf policy deny ...
Page 1018: ...Cisco Nexus 7000 Series Security Command Reference 992 V Commands vrf policy deny ...