255
Step Command
Remarks
4.
Set the CRL update period.
crl update-period
hours
Optional.
By default, the CRL update period
depends on the next update field in
the CRL file.
5.
Enable CRL checking.
crl check
enable
Optional.
Enabled by default.
6.
Return to system view.
quit
N/A
7.
Retrieve the CA certificate.
See "
N/A
8.
Retrieve CRLs.
pki retrieval-crl domain
domain-name
N/A
9.
Verify the validity of a
certificate.
pki validate-certificate
{
ca
|
local
}
domain
domain-name
N/A
Configuring CRL-checking-disabled PKI certificate verification
To configure CRL-checking-disabled PKI certificate verification:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter PKI domain view.
pki domain
domain-name
N/A
3.
Disable CRL checking.
crl check
disable
Enabled by default
4.
Return to system view.
quit
N/A
5.
Retrieve the CA certificate.
See "
N/A
6.
Verify the validity of the
certificate.
pki validate-certificate
{
ca
|
local
}
domain
domain-name
N/A
Destroying a local RSA key pair
A certificate has a lifetime, which is determined by the CA. When the private key leaks or the certificate
is about to expire, you can destroy the old RSA key pair and then create a pair to request a new
certificate.
To destroy a local RSA key pair:
Step Command
1.
Enter system view.
system-view
2.
Destroy a local RSA key pair.
public-key local destroy rsa