201
2B
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 CRL Distribution Points:
URI:http://4.4.4.133:447/myca.crl
Signature Algorithm: sha1WithRSAEncryption
836213A4 F2F74C1A 50F4100D B764D6CE
B30C0133 C4363F2F 73454D51 E9F95962
EDE9E590 E7458FA6 765A0D3F C4047BC2
9C391FF0 7383C4DF 9A0CCFA9 231428AF
987B029C C857AD96 E4C92441 9382E798
8FCC1E4A 3E598D81 96476875 E2F86C33
75B51661 B6556C5E 8F546E97 5197734B
C8C29AC7 E427C8E4 B9AAF5AA 80A75B3C
You can also use some other
display
commands—
display pki certificate ca
domain
and
display pki crl
domain
commands—to view detailed information about the CA certificate and CRLs. For more
information about the commands, see the
Security Command Reference
.
Requesting a certificate from a CA running Windows 2003
Server
NOTE:
The CA server runs the Windows 2003 server in this configuration example.
Network requirements
Configure PKI entity Switch to request a local certificate from the CA server.
Figure 56
Request a certificate from a CA running Windows 2003 server
CA server
Internet
Host
Switch
PKI entity
Configuration procedure
1.
Configure the CA server
Install the certificate service suites
From the start menu, select
Control Panel
>
Add or Remove Programs
, and then select
Add/Remove
Windows Components
>
Certificate Services
and click
Next
to begin the installation.
Install the SCEP add-on
Because a CA server running the Windows 2003 server does not support SCEP by default, you must
install the SCEP add-on so that the switch can register and obtain its certificate automatically. After the
SCEP add-on installation completes, a URL is displayed, which you must configure on the switch as the
URL of the server for certificate registration.