SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Cisco ISO based CA (Certificate Authority)
IOS CA is short for Certificate Authority on IOS. It's a simple, yet very powerful tool to deploy certificates
in environments where PKI is needed for security reasons.
In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital
certificates. A digital certificate certifies the ownership of a public key by the named subject of the
certificate. This allows others (relying parties) to rely upon signatures or on assertions made by the
private key that corresponds to the certified public key. In this model of trust relationships, a CA is a
trusted third party - trusted both by the subject (owner) of the certificate and by the party relying upon
the certificate.
Supported Standards
Cisco supports the following standards with this feature:
• IPSec- IP Security Protocol. IPSec is a framework of open standards that provides data
confidentiality, data integrity, and data authentication between participating peers. IPSec
provides these security services at the IP layer; it uses Internet Key Exchange to handle
negotiation of protocols and algorithms based on local policy, and to generate the encryption
and authentication keys to be used by IPSec. IPSec can be used to protect one or more data
flows between a pair of hosts, between a pair of security gateways, or between a security
gateway and a host.
• Internet Key Exchange (IKE)- A hybrid protocol that implements Oakley and Skeme key
exchanges inside the Internet Security Association Key Management Protocol (ISAKMP)
framework. Although IKE can be used with other protocols, its initial implementation is with the
Figure 1 Certificate Authority
Cisco ISO based CA (Certificate Authority)
IPSec protocol. IKE provides authentication of the IPSec peers, negotiates IPSec keys, and
negotiates IPSec security associations.
• Public-Key Cryptography Standard #7 (PKCS #7)- A standard from RSA Data Security, Inc., used
to encrypt and sign certificate enrollment messages.
• Public-Key Cryptography Standard #10 (PKCS #10)- A standard syntax from RSA Data Security,
Inc. for certificate requests.
• RSA Keys- RSA is the public key cryptographic system developed by Ron Rivest, Adi Shamir, and
Leonard Adleman. RSA keys come in pairs: one public key and one private key.
• X.509v3 certificates- Certificate support that allows the IPSec-protected network to scale by
providing the equivalent of a digital ID card to each device. When two devices wish to
communicate, they exchange digital certificates to prove their identity (thus removing the need
to manually exchange public keys with each peer or to manually specify a shared key at each
peer). These certificates are obtained from a certification authority (CA). X.509 is part of the
X.500 standard of the ITU.
Open source implementations
There exist several open source implementations of certificate authority software. Common to all is that
they provide the necessary services to issue, revoke and manage digital certificates.
Some open source implementations are:
• DogTag
• EJBCA
• gnoMint
• OpenCA
• OpenSSL, an SSL/TLS library that comes with tools allowing its use as a simple certificate
authority
• EasyRSA, OpenVPN's command line CA utilities using OpenSSL.
• r509
• TinyCA, which is a perl gui on top of some CPAN modules.
• XCA
• Automated Certificate Management Environment (ACME), Let's Encrypt's protocol for
communications between its certificate authority and servers. Let's Encrypt also provides node-
acme, a Node.js implementation of ACME, and lets-encrypt-preview, a Python-based test
implementation of server certificate management software using the ACME protocol.
Use the Third-Party SSL Certificate?
To assist in understanding the process of installing a third-party SSL certificate, we have outlined the
steps to be taken by yourself, HostGator and the certificate issuer. If you are a more visual person, then
the flow chart below See Below may help your understanding.
Cisco ISO based CA (Certificate Authority)
1. Fill out the Certificate Signing Request Form (CSR).
(Note: Please note that all information on the CSR page MUST match the WHOIS information for
that domain; otherwise the SSL will not be issued.)
2. HostGator will email you the CSR and RSA Key that you will need for the following steps. Please
keep this e-mail; without the information contained within, the following steps cannot be
completed.
3. Purchase your SSL certificate (if you haven't already) and send the certificate issuer the CSR we
sent you in step 2. (The certificate issuer does not need nor want the RSA Key.)
4. The certificate issuer will generate and return an SSL Certificate as well as an SSL CA Certificate
(Trusted Authority) (sometimes called a "CA Bundle"). These two pieces of information will be
Figure 2 Flow Chart
Cisco ISO based CA (Certificate Authority)
encrypted text documents. Typically, they will be provided via email as compressed (zipped)
attachments.
5. Now that you have the SSL certificate and the SSL CA certificate, you are ready to fill out the SSL
installation form. When you received the results for your CSR form, we provided you with the
RSA Private Key to submit on the installation form. Once you complete this form, click Submit to
complete your request.
6. Pay the HostGator invoice for installing the SSL Certificate. (Installation is free if you have a
managed Dedicated Server; $10 otherwise.)
Cisco ISO based CA (Certificate Authority)
CA Configuration
(Note: 1. R2 should reachable to R3.
2. NTP running between R1, R2, and R3.
3. R1 assume as ISP.)
R1
crypto key generate rsa label cisco general-keys exportable modulus 1024
crypto key export rsa cisco pem url nvram: 3des Cisco123
crypto pki server ciscopki
grant auto
issuer-name CN=cisco.com DN=.com L=GR C=IN
lifetime certificate 90
lifetime ca-certificate 365
Figure 3 Topology
Cisco ISO based CA (Certificate Authority)
lifetime crl 24
database level minimum
database url nvram:
no shut
exit
ip http server
R2
crypto pki trustpoint ciscopki
enrollment url http://101.1.1.1:80
revocation-check none
revocation-check crl none
exit
crypto pki authenticate ciscopki
crypto pki enroll ciscopki
crypto isakmp policy 10
authentication rsa-sig
encryption aes
hash sha
group 5
lifetime 1800
exit
crypto ipsec transform-set tset esp-sha-hmac esp-aes
exit
ip access-list extended VPN
permit ip host 192.168.1.100 host 192.168.2.100
exit
crypto map CMAP 10 ipsec-isakmp
set transform-set tset
set peer 102.1.1.100
match address VPN
exit
int f0/0
Cisco ISO based CA (Certificate Authority)
crypto map CMAP
exit
R3
crypto pki trustpoint ciscopki
enrollment url http://101.1.1.1:80
revocation-check none
revocation-check crl none
exit
crypto pki authenticate ciscopki
crypto pki enroll ciscopki
crypto isakmp policy 10
authentication rsa-sig
encryption aes
hash sha
group 5
lifetime 1800
exit
crypto ipsec transform-set tset esp-sha-hmac esp-aes
exit
ip access-list extended VPN
permit ip host 192.168.2.100 host 192.168.1.100
exit
crypto map CMAP 10 ipsec-isakmp
set transform-set tset
set peer 101.1.1.100
match address VPN
exit
int f0/0
crypto map CMAP
exit
Cisco ISO based CA (Certificate Authority)
Deleting RSA Keys from Your Router
Router(config)# crypto key zeroize rsa
Deletes all of your router's RSA keys.
Deleting Certificates from the Configuration
R1# show crypto ca certificates
R1(config)# crypto ca certificate chain name
R1(config-cert-cha)# no certificate certificate-serial-number
To delete the CA's certificate, you must remove the entire CA identity, which also removes all
certificates associated with the CA—your router's certificate, the CA certificate, and any RA certificates.
To remove a CA identity, use the following command in global configuration mode:
R1(config)# no crypto ca identity name
Viewing Keys and Certificates
Displays your router's RSA public keys.
R1# show crypto key mypubkey rsa
Displays a list of all the RSA public keys stored on your router. These include the public keys of peers
who have sent your router their certificates during peer authentication for IPSec.
R1# show crypto key pubkey-chain rsa
Displays details of a particular RSA public key stored on your router.
R1# show crypto key pubkey-chain rsa [name key-name | address key-address]
Displays information about your certificate, the CA's certificate, and any RA certificates.
R1# show crypto ca certificates
Displays the CA roots configured in the router.
R1# show crypto ca roots
(Note: This command can be implemented only when multiple CAs are configured in the router.)

Weitere ähnliche Inhalte

Was ist angesagt?

Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudAmazon Web Services
 
Towards Secure and Dependable Authentication and Authorization Infrastructures
Towards Secure and Dependable Authentication and Authorization InfrastructuresTowards Secure and Dependable Authentication and Authorization Infrastructures
Towards Secure and Dependable Authentication and Authorization InfrastructuresDiego Kreutz
 
Poodle sha2 open mic
Poodle sha2 open micPoodle sha2 open mic
Poodle sha2 open micRahul Kumar
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladiumNed Hayes
 
A technical comparison of ip sec and ssl 2005
A technical comparison of ip sec and ssl  2005A technical comparison of ip sec and ssl  2005
A technical comparison of ip sec and ssl 2005Nadeer Abu Jraerr
 
MTLS in a Microservices World
MTLS in a Microservices WorldMTLS in a Microservices World
MTLS in a Microservices WorldDiogo Mónica
 
Addmi 14-discovery credentials
Addmi 14-discovery credentialsAddmi 14-discovery credentials
Addmi 14-discovery credentialsodanyboy
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overviewdavisli
 
Cisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliancesCisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliancesIT Tech
 
TechWiseTV Workshop: Programmable ASICs
TechWiseTV Workshop: Programmable ASICsTechWiseTV Workshop: Programmable ASICs
TechWiseTV Workshop: Programmable ASICsRobb Boyd
 
Developing an IoT System FIWARE Based from the Scratch
Developing an IoT System FIWARE Based from the ScratchDeveloping an IoT System FIWARE Based from the Scratch
Developing an IoT System FIWARE Based from the ScratchFIWARE
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkpromediakw
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshellFrank Kelly
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Canada
 

Was ist angesagt? (20)

Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Towards Secure and Dependable Authentication and Authorization Infrastructures
Towards Secure and Dependable Authentication and Authorization InfrastructuresTowards Secure and Dependable Authentication and Authorization Infrastructures
Towards Secure and Dependable Authentication and Authorization Infrastructures
 
Poodle sha2 open mic
Poodle sha2 open micPoodle sha2 open mic
Poodle sha2 open mic
 
PKI-In-A-Box
PKI-In-A-BoxPKI-In-A-Box
PKI-In-A-Box
 
lamacchia-palladium
lamacchia-palladiumlamacchia-palladium
lamacchia-palladium
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 
A technical comparison of ip sec and ssl 2005
A technical comparison of ip sec and ssl  2005A technical comparison of ip sec and ssl  2005
A technical comparison of ip sec and ssl 2005
 
MTLS in a Microservices World
MTLS in a Microservices WorldMTLS in a Microservices World
MTLS in a Microservices World
 
Addmi 14-discovery credentials
Addmi 14-discovery credentialsAddmi 14-discovery credentials
Addmi 14-discovery credentials
 
I psecurity
I psecurityI psecurity
I psecurity
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
Cisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliancesCisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliances
 
I psec
I psecI psec
I psec
 
TechWiseTV Workshop: Programmable ASICs
TechWiseTV Workshop: Programmable ASICsTechWiseTV Workshop: Programmable ASICs
TechWiseTV Workshop: Programmable ASICs
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 
Developing an IoT System FIWARE Based from the Scratch
Developing an IoT System FIWARE Based from the ScratchDeveloping an IoT System FIWARE Based from the Scratch
Developing an IoT System FIWARE Based from the Scratch
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
 
AndrianinaSystemNetworkAdmin
AndrianinaSystemNetworkAdminAndrianinaSystemNetworkAdmin
AndrianinaSystemNetworkAdmin
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 
Cisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven TelemetryCisco Connect Toronto 2017 - Model-driven Telemetry
Cisco Connect Toronto 2017 - Model-driven Telemetry
 

Andere mochten auch

Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)Apridila Anggita Suri
 
Certification authority
Certification   authorityCertification   authority
Certification authorityproser tech
 
El siglo de las luces1
El siglo de las luces1El siglo de las luces1
El siglo de las luces1Luz Hernandez
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authoritywebhostingguy
 
Part 35 certificate authority -www.key4_vip.info
Part 35   certificate authority -www.key4_vip.infoPart 35   certificate authority -www.key4_vip.info
Part 35 certificate authority -www.key4_vip.infolaonap166
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityT.Rob Wyatt
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows T.Rob Wyatt
 
Tutorial Instalasi Debian 7 wheezy DNS,DHCP,Webmail dan Webserver
Tutorial Instalasi Debian 7 wheezy DNS,DHCP,Webmail dan WebserverTutorial Instalasi Debian 7 wheezy DNS,DHCP,Webmail dan Webserver
Tutorial Instalasi Debian 7 wheezy DNS,DHCP,Webmail dan WebserverSulthan Adam
 
konfigurasi web server, dns server , dhcp server, ftp server , mail server da...
konfigurasi web server, dns server , dhcp server, ftp server , mail server da...konfigurasi web server, dns server , dhcp server, ftp server , mail server da...
konfigurasi web server, dns server , dhcp server, ftp server , mail server da...Mas Tobel
 
Debian Server Tutorial Komplit
Debian Server Tutorial KomplitDebian Server Tutorial Komplit
Debian Server Tutorial KomplitRahmad Kurniawan
 
Debian 8 server_full
Debian 8 server_fullDebian 8 server_full
Debian 8 server_fullronijagarino
 

Andere mochten auch (12)

Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
 
Certification authority
Certification   authorityCertification   authority
Certification authority
 
El siglo de las luces1
El siglo de las luces1El siglo de las luces1
El siglo de las luces1
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authority
 
Part 35 certificate authority -www.key4_vip.info
Part 35   certificate authority -www.key4_vip.infoPart 35   certificate authority -www.key4_vip.info
Part 35 certificate authority -www.key4_vip.info
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of Mediocrity
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
 
Tutorial Instalasi Debian 7 wheezy DNS,DHCP,Webmail dan Webserver
Tutorial Instalasi Debian 7 wheezy DNS,DHCP,Webmail dan WebserverTutorial Instalasi Debian 7 wheezy DNS,DHCP,Webmail dan Webserver
Tutorial Instalasi Debian 7 wheezy DNS,DHCP,Webmail dan Webserver
 
konfigurasi web server, dns server , dhcp server, ftp server , mail server da...
konfigurasi web server, dns server , dhcp server, ftp server , mail server da...konfigurasi web server, dns server , dhcp server, ftp server , mail server da...
konfigurasi web server, dns server , dhcp server, ftp server , mail server da...
 
Tutorial membangun server jaringan
Tutorial  membangun  server  jaringanTutorial  membangun  server  jaringan
Tutorial membangun server jaringan
 
Debian Server Tutorial Komplit
Debian Server Tutorial KomplitDebian Server Tutorial Komplit
Debian Server Tutorial Komplit
 
Debian 8 server_full
Debian 8 server_fullDebian 8 server_full
Debian 8 server_full
 

Ähnlich wie Cisco iso based CA (certificate authority)

SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications nishchal29
 
The new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiThe new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiNathan Winters
 
Issue certificates with PyOpenSSL
Issue certificates with PyOpenSSLIssue certificates with PyOpenSSL
Issue certificates with PyOpenSSLPau Freixes
 
How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?mirmaisam
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLSOlle E Johansson
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxssuser865ecd
 
Cloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFECloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFEPrabath Siriwardena
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerBU
 
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...IT Tech
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1milkux
 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...Cisco Canada
 
Microservices Security landscape
Microservices Security landscapeMicroservices Security landscape
Microservices Security landscapeSagara Gunathunga
 
Seattle C* Meetup: Hardening cassandra for compliance or paranoia
Seattle C* Meetup: Hardening cassandra for compliance or paranoiaSeattle C* Meetup: Hardening cassandra for compliance or paranoia
Seattle C* Meetup: Hardening cassandra for compliance or paranoiazznate
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
February 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the CloudFebruary 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the CloudAmazon Web Services
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Serviceskieranjacobsen
 

Ähnlich wie Cisco iso based CA (certificate authority) (20)

SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications
 
The new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiThe new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pki
 
IoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideasIoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideas
 
Issue certificates with PyOpenSSL
Issue certificates with PyOpenSSLIssue certificates with PyOpenSSL
Issue certificates with PyOpenSSL
 
How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?How EverTrust Horizon PKI Automation can help your business?
How EverTrust Horizon PKI Automation can help your business?
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptxOralce SSL walelt -TCPS_Troubleshooting_PB.pptx
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
 
Cloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFECloud Native Identity with SPIFFE
Cloud Native Identity with SPIFFE
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
Ccie notes configuring cisco ios ca server and enrolling cisco asa to a ca se...
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
 
Microservices Security landscape
Microservices Security landscapeMicroservices Security landscape
Microservices Security landscape
 
Seattle C* Meetup: Hardening cassandra for compliance or paranoia
Seattle C* Meetup: Hardening cassandra for compliance or paranoiaSeattle C* Meetup: Hardening cassandra for compliance or paranoia
Seattle C* Meetup: Hardening cassandra for compliance or paranoia
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
February 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the CloudFebruary 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the Cloud
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
 

Mehr von Netwax Lab

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeNetwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Netwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionNetwax Lab
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionNetwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewallNetwax Lab
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access listNetwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNetwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunkingNetwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Netwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting Netwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNetwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNetwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Netwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cliNetwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failoverNetwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iiiNetwax Lab
 

Mehr von Netwax Lab (20)

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 

Kürzlich hochgeladen

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Kürzlich hochgeladen (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Cisco iso based CA (certificate authority)

  • 1. Cisco ISO based CA (Certificate Authority) IOS CA is short for Certificate Authority on IOS. It's a simple, yet very powerful tool to deploy certificates in environments where PKI is needed for security reasons. In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made by the private key that corresponds to the certified public key. In this model of trust relationships, a CA is a trusted third party - trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. Supported Standards Cisco supports the following standards with this feature: • IPSec- IP Security Protocol. IPSec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers. IPSec provides these security services at the IP layer; it uses Internet Key Exchange to handle negotiation of protocols and algorithms based on local policy, and to generate the encryption and authentication keys to be used by IPSec. IPSec can be used to protect one or more data flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a host. • Internet Key Exchange (IKE)- A hybrid protocol that implements Oakley and Skeme key exchanges inside the Internet Security Association Key Management Protocol (ISAKMP) framework. Although IKE can be used with other protocols, its initial implementation is with the Figure 1 Certificate Authority
  • 2. Cisco ISO based CA (Certificate Authority) IPSec protocol. IKE provides authentication of the IPSec peers, negotiates IPSec keys, and negotiates IPSec security associations. • Public-Key Cryptography Standard #7 (PKCS #7)- A standard from RSA Data Security, Inc., used to encrypt and sign certificate enrollment messages. • Public-Key Cryptography Standard #10 (PKCS #10)- A standard syntax from RSA Data Security, Inc. for certificate requests. • RSA Keys- RSA is the public key cryptographic system developed by Ron Rivest, Adi Shamir, and Leonard Adleman. RSA keys come in pairs: one public key and one private key. • X.509v3 certificates- Certificate support that allows the IPSec-protected network to scale by providing the equivalent of a digital ID card to each device. When two devices wish to communicate, they exchange digital certificates to prove their identity (thus removing the need to manually exchange public keys with each peer or to manually specify a shared key at each peer). These certificates are obtained from a certification authority (CA). X.509 is part of the X.500 standard of the ITU. Open source implementations There exist several open source implementations of certificate authority software. Common to all is that they provide the necessary services to issue, revoke and manage digital certificates. Some open source implementations are: • DogTag • EJBCA • gnoMint • OpenCA • OpenSSL, an SSL/TLS library that comes with tools allowing its use as a simple certificate authority • EasyRSA, OpenVPN's command line CA utilities using OpenSSL. • r509 • TinyCA, which is a perl gui on top of some CPAN modules. • XCA • Automated Certificate Management Environment (ACME), Let's Encrypt's protocol for communications between its certificate authority and servers. Let's Encrypt also provides node- acme, a Node.js implementation of ACME, and lets-encrypt-preview, a Python-based test implementation of server certificate management software using the ACME protocol. Use the Third-Party SSL Certificate? To assist in understanding the process of installing a third-party SSL certificate, we have outlined the steps to be taken by yourself, HostGator and the certificate issuer. If you are a more visual person, then the flow chart below See Below may help your understanding.
  • 3. Cisco ISO based CA (Certificate Authority) 1. Fill out the Certificate Signing Request Form (CSR). (Note: Please note that all information on the CSR page MUST match the WHOIS information for that domain; otherwise the SSL will not be issued.) 2. HostGator will email you the CSR and RSA Key that you will need for the following steps. Please keep this e-mail; without the information contained within, the following steps cannot be completed. 3. Purchase your SSL certificate (if you haven't already) and send the certificate issuer the CSR we sent you in step 2. (The certificate issuer does not need nor want the RSA Key.) 4. The certificate issuer will generate and return an SSL Certificate as well as an SSL CA Certificate (Trusted Authority) (sometimes called a "CA Bundle"). These two pieces of information will be Figure 2 Flow Chart
  • 4. Cisco ISO based CA (Certificate Authority) encrypted text documents. Typically, they will be provided via email as compressed (zipped) attachments. 5. Now that you have the SSL certificate and the SSL CA certificate, you are ready to fill out the SSL installation form. When you received the results for your CSR form, we provided you with the RSA Private Key to submit on the installation form. Once you complete this form, click Submit to complete your request. 6. Pay the HostGator invoice for installing the SSL Certificate. (Installation is free if you have a managed Dedicated Server; $10 otherwise.)
  • 5. Cisco ISO based CA (Certificate Authority) CA Configuration (Note: 1. R2 should reachable to R3. 2. NTP running between R1, R2, and R3. 3. R1 assume as ISP.) R1 crypto key generate rsa label cisco general-keys exportable modulus 1024 crypto key export rsa cisco pem url nvram: 3des Cisco123 crypto pki server ciscopki grant auto issuer-name CN=cisco.com DN=.com L=GR C=IN lifetime certificate 90 lifetime ca-certificate 365 Figure 3 Topology
  • 6. Cisco ISO based CA (Certificate Authority) lifetime crl 24 database level minimum database url nvram: no shut exit ip http server R2 crypto pki trustpoint ciscopki enrollment url http://101.1.1.1:80 revocation-check none revocation-check crl none exit crypto pki authenticate ciscopki crypto pki enroll ciscopki crypto isakmp policy 10 authentication rsa-sig encryption aes hash sha group 5 lifetime 1800 exit crypto ipsec transform-set tset esp-sha-hmac esp-aes exit ip access-list extended VPN permit ip host 192.168.1.100 host 192.168.2.100 exit crypto map CMAP 10 ipsec-isakmp set transform-set tset set peer 102.1.1.100 match address VPN exit int f0/0
  • 7. Cisco ISO based CA (Certificate Authority) crypto map CMAP exit R3 crypto pki trustpoint ciscopki enrollment url http://101.1.1.1:80 revocation-check none revocation-check crl none exit crypto pki authenticate ciscopki crypto pki enroll ciscopki crypto isakmp policy 10 authentication rsa-sig encryption aes hash sha group 5 lifetime 1800 exit crypto ipsec transform-set tset esp-sha-hmac esp-aes exit ip access-list extended VPN permit ip host 192.168.2.100 host 192.168.1.100 exit crypto map CMAP 10 ipsec-isakmp set transform-set tset set peer 101.1.1.100 match address VPN exit int f0/0 crypto map CMAP exit
  • 8. Cisco ISO based CA (Certificate Authority) Deleting RSA Keys from Your Router Router(config)# crypto key zeroize rsa Deletes all of your router's RSA keys. Deleting Certificates from the Configuration R1# show crypto ca certificates R1(config)# crypto ca certificate chain name R1(config-cert-cha)# no certificate certificate-serial-number To delete the CA's certificate, you must remove the entire CA identity, which also removes all certificates associated with the CA—your router's certificate, the CA certificate, and any RA certificates. To remove a CA identity, use the following command in global configuration mode: R1(config)# no crypto ca identity name Viewing Keys and Certificates Displays your router's RSA public keys. R1# show crypto key mypubkey rsa Displays a list of all the RSA public keys stored on your router. These include the public keys of peers who have sent your router their certificates during peer authentication for IPSec. R1# show crypto key pubkey-chain rsa Displays details of a particular RSA public key stored on your router. R1# show crypto key pubkey-chain rsa [name key-name | address key-address] Displays information about your certificate, the CA's certificate, and any RA certificates. R1# show crypto ca certificates Displays the CA roots configured in the router. R1# show crypto ca roots (Note: This command can be implemented only when multiple CAs are configured in the router.)