Configuration Examples
This section shows an example of the tasks you can use to configure certificates and CRLs on the Cisco MDS 9000 Family switches using the Microsoft Windows Certificate server.This section includes the following topics:
To configure certificates on an MDS switch, follow these steps:
- Choose Switches and set the LogicalName field to configure the switch host name.
- Choose Switches > Interfaces > Management > DNS and set the DefaultDomainName field to configure.
- To create an RSA key-pair for the switch, follow these steps:
- To create a trust point and associate the RSA key-pairs with it, follow these steps:
- Choose Switches > Copy Configuration and click Apply Changes to copy the running to startup configuration and save the trustpoint and key pair.
- Download the CA certificate from the CA that you want to add as the trustpoint CA.
- To authenticate the CA that you want to enroll to the trust point, follow these steps:.
- Using Device Manager, choose Admin > Flash Files and select Copy and tftp copy the CA certificate to bootflash.
- Using DCNM-SAN, choose Switches > Security > PKI and select the TrustPoint Actions tab.
- Select cauth from the Command drop-down menu.
- Click ... in the URL field and select the CA certificate from bootflash.
- Click Apply Changes to authenticate the CA that you want to enroll to the trust point.
- Click the Trust Point Actions tab in the Information Pane.
- Make a note of the CA certificate fingerprint displayed in the IssuerCert FingerPrint column for the trust point row in question. Compare the CA certificate fingerprint with the fingerprint already communicated by the CA (obtained from the CA web site). If the fingerprints match exactly, accept the CA by performing the certconfirm trust point action. Otherwise, reject the CA by performing the certnoconfirm trust point action.
- If you select certconfirm in step g, click the Trust Point Actions tab, select certconfirm from the command drop-down menu, and then click Apply Changes.
- If you select certnoconfirm in step g, click the Trust Point Actions tab, select the certnoconfirm from the command drop-down menu and then click Apply Changes.
- To generate a certificate request for enrolling with that trust point, follow these steps:
- Click the Trust Point Actions tab in the Information pane.
- Select certreq from the Command drop-down menu. This generates a PKCS#10 certificate signing request (CSR) needed for an identity certificate from the CA corresponding to this trust point entry.
- Enter the output file name for storing the generated certificate request. It should be specified in the bootflash:filename format and will be used to store the CSR generated in PEM format.
- Enter the challenge password to be included in the CSR. The challenge password is not saved with the configuration. This password is required in the event that your certificate needs to be revoked, so you must remember this password.
- Click Apply Changes to save the changes.
- Request an identity certificate from the CA.
Note The CA may require manual verification before issuing the identity certificate.
- To import the identity certificate, follow these steps:
- Using Device Manager, choose Admin > Flash Files and select Copy and use TFTP to copy the CA certificate to bootflash.
- Using DCNM-SAN, choose Switches > Security > PKI and click the TrustPoint Actions tab.
- Select the certimport option from the Command drop-down menu to import an identity certificate in this trust point.
Note The identity certificate should be available in PEM format in a file in bootflash.
- Enter the name of the certificate file which was copied to bootflash, in the URL field in the bootflash:filename format.
- Click Apply Changes to save your changes.
If successful, the values of the identity certificate and its related objects, like the certificate file name, are automatically updated with the appropriate values as per the corresponding attributes in the identity certificate.
Copyright 2010-2013, Cisco Systems, Inc. All rights reserved.