|
This appendix provides additional information on requesting digital certification from the VeriSign CA server and configuring ca-identity configuration commands on your gateway. Use this appendix with "Configuring Digital Certification," and the enrollment guide on the VeriSign web site.
This CA provides certificate processing, backup, key recovery, and customer support. The gateway administrator handles approval, enrollment, validation, issuance, and renewal of digital certificates.
This section includes the following topics:
Note While Cisco Secure VPN Client supports VeriSign, the VeriSign enrollment method is subject to change over time. Please see the Verisign web site at http://www.verisign.com for the current enrollment method. |
This step corresponds to "Sending the Certification Request to the CA Server" in "Configuring Digital Certification." For details on submitting a VeriSign certificate request to the Verisign CA, see the following URL: http://www.verisign.com/onsite/ipsec/ciscoIntro.html
This step corresponds to "Declaring the CA" in "Configuring Digital Certification."
To enroll your certificate with a VeriSign CA, perform the following tasks as described in Table C-1:
Command | Purpose |
---|---|
hq_sanjose(config)# crypto ca identity example.com
| To declare the CA your router should use, enter the crypto ca identity global configuration command. This command invokes the ca-identity (cfg-ca-id) configuration mode. In this example, example.com is defined as the domain name for which this certificate is requested. |
hq_sanjose(cfg-ca-id)# enrollment mode ra
| To indicate compatibility with the CA's Registration Authority (RA) system, enter the enrollment mode ra ca-identity configuration command. |
hq_sanjose(cfg-ca-id)# enrollment url http://onsiteipsec.VeriSign.com
| To specify the CA's location where your router should send certificate requests by indicating the CA's enrollment URL, enter the enrollment url ca-identity configuration command. In this example, http://onsiteipsec.VeriSign.com is specified as the CA server. |
hq_sanjose(cfg-ca-id)# query url http://onsiteipsec.VeriSign.com
| To specify Lightweight Directory Access Protocol (LDAP) support, enter the query url ca-identity configuration command. This command is required if your CA supports both RA and LDAP. LDAP is a query protocol used when the router retrieves certificates and CRLs. The default query protocol is Certificate Enrollment Protocol (CEP). In this example, http://onsiteipsec.VeriSign.com is specified as the LDAP server. |
hq_sanjose(cfg-ca-id)# crl optional
| To allow other peers' certificates to still be accepted by your router even if the appropriate Certificate Revocation List (CRL) is not accessible to your router, use the crl optional ca-identity configuration command. |
hq_sanjose(cfg-ca-id)# exit
| To exit ca-identity (cfg-ca-id) configuration mode, enter the exit ca-identity configuration command. |
Posted: Thu Jul 27 18:07:54 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.