269
•
If the CA certificate is imported or obtained through manual certificate request, the device
automatically compares the configured fingerprint with the fingerprint in the CA certificate. If the
two fingerprints do not match, the device rejects the CA certificate, and the certificate import or
request fails. If no fingerprint is configured in the PKI domain, the device displays the fingerprint
contained in the CA certificate on the terminal and asks you to manually verify the fingerprint.
•
If the CA certificate is obtained through automatic certificate request, the device automatically
verifies the CA certificate's fingerprint by using the fingerprint configured in the PKI domain. If
no fingerprint is configured in the domain, the device rejects the certificate.
To configure a PKI domain:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create a PKI domain
and enter its view.
pki domain
domain-name
By default, no PKI domains exist.
3.
Specify the trusted
CA.
ca identifier name
By default, no trusted CA is
specified.
To obtain a CA certificate, the
trusted CA name must be
provided. The trusted CA name
uniquely identifies the CA to be
used if multiple CAs exist on the
same CA server. The CA server's
URL is specified by using the
certificate request url
command.
4.
Specify the PKI entity
name.
certificate request entity
entity-name
By default, no entity is specified.
5.
Specify the type of
certificate request
reception authority.
certificate request from
{
ca
|
ra
}
By default, no authority type is
specified.
6.
Specify the certificate
request URL.
certificate request url url-string
[
vpn-instance vpn-instance-name
]
By default, the certificate request
URL is not specified.
7.
(Optional.) Set the
SCEP polling interval
and maximum
number of polling
attempts.
certificate request polling
{
count
count
|
interval
interval
}
By default, the device polls the CA
server for the certificate request
status every 20 minutes. The
maximum number of polling
attempts is 50.
8.
(Optional.) Specify the
LDAP server.
ldap-server host hostname
[
port
port-number
] [
vpn-instance
vpn-instance-name
]
This task is required only when
the CRL repository is an LDAP
server and the URL of the CRL
repository does not contain the
host name of the LDAP server.
By default, no LDAP server is
specified.
9.
Configure the
fingerprint for verifying
the root CA certificate.
•
In non-FIPS mode:
root-certificate fingerprint
{
md5
|
sha1
}
string
•
In FIPS mode:
root-certificate fingerprint sha1
string
This task is required if the auto
certificate request mode is
configured in the PKI domain.
If the manual certificate request
mode is configured, you can skip
this task and manually verify the
fingerprint of the CA certificate.
By default, no fingerprint is
configured.
10.
Specify the key pair
for certificate request.
•
Specify an RSA key pair:
public-key rsa
{ {
encryption
name
encryption-key-name
By default, no key pair is
specified.
Summary of Contents for FlexFabric 5940 SERIES
Page 251: ...238 ...