To start or stop benchmarking data for Public Key Infrastructure
(PKI) performance monitoring and optimization, use thecryptopkibenchmarkcommand in privileged EXEC mode.
cryptopkibenchmark
{ startlimit [wrap] | stop }
Syntax Description
startlimit
Enables PKI benchmarking.
The
limit argument states the number of
records from 0 to 9990 that can be stored for the benchmarking session. A limit
of 0 indicates an unlimited number of records can be stored.
wrap
(Optional) Specifies a continuous flow of records. Once the
maximum number of records is gathered, they are released and a new set of
records is generated. If the
wrap keyword is not specified, then
benchmarking stops once the limit for the maximum number of records has been
reached.
stop
Terminates PKI benchmarking data collection.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.1(3)T
This command was introduced.
Usage Guidelines
Use thecryptopkibenchmarkstartcommand to start the collection of PKI benchmarking performance
monitoring and optimization data. Use thecryptopkibenchmarkstopcommand to stop the collection of the PKI benchmarking
performance monitoring and optimization data.
Use the
showcryptopkibenchmarkscommandtoviewthecollectiondata.
Use the
clearcryptopkibenchmarkscommandtoclearthePKI benchmarking performance monitoring and optimization data
and release all memory associated with this data.
The IOS PKI Performance Monitoring and Optimization feature enables
you to collect the following types of PKI performance data:
Time to validate entire certificate chain.
Time to verify each certificate.
Time to check revocation status for each certificate.
Time to fetch certificate revocation list (CRL) database for each
fetch location.
Time to fetch Simple Certificate Enrollment Protocol (SCEP) method
capabilities to retrieve the CRL.
Time to process each CRL.
Time to process the Online Certificate Status Protocol (OCSP)
response. OCSP is a certificate revocation mechanism.
Time to fetch Authentication, Authorization, and Accounting (AAA).
CRL size.
Validation result.
Validation Bypass (pubkey cached).
Method used to fetch a CRL.
PKI session identifier.
Crypto engine used (hardware, software, etoken).
Examples
The following example starts PKI benchmarking data and collects 20
records. Once 20 records are collected, they are released and a new set of 20
records is generated.
Router# crypto pki benchmark start 20 wrap
Related Commands
Command
Description
clearcryptopkibenchmarks
Clears PKI benchmarking performance monitoring and
optimization data and releases all memory associated with this data.
showcryptopkibenchmarks
Displays benchmarking data for PKI performance monitoring
and optimization that was collected.
crypto pki cert validate
To determine if a trustpoint has been successfully authenticated, a certificate has been requested and granted, and if the certificate is currently valid, use the cryptopkicertvalidate command in global configuration mode.
cryptopkicertvalidatetrustpoint
Syntax Description
trustpoint
The trustpoint to be validated.
Command Default
No default behavior or values.
Command Modes
Global configuration
Command History
Release
Modification
12.3(8)T
This command was introduced. Also, effective with Cisco IOS Release 12.3(8)T, this command replaced the cryptocacertvalidate command.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines
The cryptopkicertvalidate command validates the router's own certificate for a given trustpoint. Use this command as a sanity check after enrollment to verify that the trustpoint is properly authenticated, a certificate has been requested and granted for the trustpoint, and that the certificate is currently valid. A certificate is valid if it is signed by the trustpoint certification authority (CA), not expired, and so on.
Examples
The following examples show the possible output from the cryptopkicertvalidate command:
Router(config)# crypto pki cert validate ka
Validation Failed: trustpoint not found for ka
Router(config)# crypto pki cert validate ka
Validation Failed: can't get local certificate chain
Router(config)# crypto pki cert validate ka
Certificate chain has 2 certificates.
Certificate chain for ka is valid
Router(config)# crypto pki cert validate ka
Certificate chain has 2 certificates.
Validation Error: no certs on chain
Router(config)# crypto pki cert validate ka
Certificate chain has 2 certificates.
Validation Error: unspecified error
Related Commands
Command
Description
cryptopkitrustpoint
Declares the certification authority that the router should use.
showcryptopkitrustpoints
Displays the trustpoints that are configured in the router.
crypto pki certificate chain
To enter the certificate chain configuration mode, use the cryptopkicertificatechaincommand in global configuration mode.
cryptopkicertificatechainname
Syntax Description
name
Specifies the name of the certificate authority (CA). The name must match that which was declared for the CA using the cryptopkitrustpointcommand.
Command Default
No default behavior or values.
Command Modes
Global configuration
Command History
Release
Modification
11.3 T
The cryptocacertificatechain command was introduced.
12.3(7)T
This command replaced the cryptocacertificatechain command.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.4(2)T
The command output was modified to distinguish the current active certificate and the rollover certificate in the certificate chain.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines
This command puts you into certificate chain configuration mode. When you are in certificate chain configuration mode, you can delete certificates using the certificate command.
You need to be in certificate chain configuration mode to delete certificates.
Examples
The following example deletes the router’s certificate. In this example, the router had a general-purpose RSA key pair with one corresponding certificate. The
show
command is used to determine the serial number of the certificate to be deleted.
Router# show crypto pki certificates
Certificate
Subject Name
Name: myrouter.example.com
IP Address: 10.0.0.1
Status: Available
Certificate Serial Number: 0123456789ABCDEF0123456789ABCDEF
Key Usage: General Purpose
CA Certificate
Status: Available
Certificate Serial Number: 3051DF7123BEE31B8341DFE4B3A338E5F
Key Usage: Not Set
Router# configure terminal
Router(config)# crypto pki certificate chain myca
Router(config-cert-chain)# no certificate 0123456789ABCDEF0123456789ABCDEF
% Are you sure you want to remove the certificate [yes/no]? yes
% Be sure to ask the CA administrator to revoke this certificate.
Router(config-cert-chain)# exit
The following example shows a certificate chain with an active CA certificate and a shadow, or rollover, certificate:
Router# configure terminal
Router(config)# crypto pki certificate chain myca
certificate 06
certificate ca 01
certificate rollover 0B
! This is the peer’s shadow PKI certificate.
certificate rollover ca 0A
! This is the CA shadow PKI certificate
This example shows how the certificate chain is rewritten when rollover actually happens:
To define certificate-based access control lists (ACLs), use the cryptopkicertificatemap command in ca-certificate-map configuration mode. To remove the certificate-based ACLs, use the no form of this command.
cryptopkicertificatemaplabelsequence-number
nocryptopkicertificatemaplabelsequence-number
Syntax Description
label
A user-specified label that is referenced within the cryptopkitrustpoint command.
sequence-number
A number that orders the ACLs with the same label. ACLs with the same label are processed from lowest to highest sequence number. When an ACL is matched, processing stops with a successful result.
The cryptocacertificatemap command was introduced.
12.3(7)T
This command replaced the cryptocacertificatemap command.
12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.4(9)T
The serial-number field name was introduced.
Cisco IOS XE Release 2.4
This command was implemented on the Cisco ASR 1000 series routers.
Usage Guidelines
Issuing this command places the router in ca-certificate-map configuration mode where you can specify several certificate fields together with their matching criteria. The general form of these fields is as follows:
field-name match-criteria match-value
Thefield-name field in the above example is one of the certificate fields. Field names are similar to the names used in the ITU-T X.509 standard. The field-name is a special field that matches any subject name or related name field in the certificate, such as the alt-subject-name,subject-name, and unstructured-subject-name fields.
alt-subject-name--
Case-insensitive string.
expires-on--Date field in the format
dd mm yyyy hh:mm:ss or mmm dd yyyy hh:mm:ss.
valid-start--Date field in the format
dd MM. yyy hh:mm:ss or mmm dd yyyy hh:mm:ss.
Note
The time portion is optional in both the expires-on date and valid-start field and defaults to 00:00:00 if not specified. The time is interpreted according to the time zone offset configured for the router. The string utc can be appended to the date and time when they are configured as Universal Time, Coordinated (UTC) rather than local time.
The match-criteria
field in the example is one of the following logical operators:
eq--equal (valid for name and date fields)
ne--not equal
(valid for name and date fields)
co--contains (valid only for name fields)
nc--does not contain (valid only for name fields)
lt--less than (valid only for date fields)
ge--greater than or equal to (valid only for date fields)
The match-value
field is a case-insensitive string or a date.
Examples
The following example shows how to configure a certificate-based ACL that will allow any certificate issued by Company to an entity within the company.com domain. The label is Company, and the sequence is 10.
crypto pki certificate map Company 10
issuer-name co Company
unstructured-subject-name co company.com
The following example accepts any certificate issued by Company for an entity with DIAL or organizationUnit component ou=WAN. This certificate-based ACL consists of two separate ACLs tied together with the common label Group. Because the check for DIAL has a lower sequence number, it is performed first. Note that the string “DIAL” can occur anywhere in the subjectName field of the certificate, but the string WAN must be in the organizationUnit component.
crypto pki certificate map Group 10
issuer-name co Company
subject-name co DIAL
crypto pki certificate map Group 20
issuer-name co Company
subject-name co ou=WAN
Case is ignored in string comparisons; therefore, DIAL in the previous example will match dial, DIAL, Dial, and so on. Also note that the component identifiers (o=, ou=, cn=, and so on) are not required unless it is desirable that the string to be matched occurs in a specific component of the name. (Refer to the ITU-T security standards for more information about certificate fields and components such as ou=.)
If a component identifier is specified in the match string, the exact string, including the component identifier, must appear in the certificate. This requirement can present a problem if more than one component identifier is included in the match string. For example, “ou=WAN,o=Company” will not match a certificate with the string “ou=WAN,ou=Engineering,o=Company” because the “ou=Engineering” string separates the two desired component identifiers.
To match both “ou=WAN” and “o=Company” in a certificate while ignoring other component identifiers, you could use this certificate map:
crypto pki certificate map Group 10
subject-name co ou=WAN
subject-name co o=Company
Any space character proceeding or following the equal sign (=) character in component identifiers is ignored. Therefore “o=Company” in the proceeding example will match “o = Company,” “o =Company,” and so on.
The following example shows a CA map file used to certificate serial number session control:
To specify that certificates should not be stored locally but retrieved from a certification authority (CA) trustpoint, use the cryptopkicertificatequery command in ca-trustpoint configuration mode. To cause certificates to be stored locally per trustpoint, use the no form of this command.
cryptopkicertificatequery
nocryptopkicertificatequery
Syntax Description
This command has no arguments or keywords.
Command Default
CA trustpoints are stored locally in the router’s NVRAM.
Command Modes
Ca-trustpoint configuration
Command History
Release
Modification
12.2(8)T
The cryptocacertificatequery(ca-trustpoint) command was introduced.
12.3(7)T
This command replaced the cryptocacertificatequery(ca-trustpoint) command.
12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines
Normally, certain certificates are stored locally in the router’s NVRAM, and each certificate uses a moderate amount of memory. To save NVRAM space, you can use this command to put the router into query mode, preventing certificates from being stored locally; instead, they are retrieved from a specified CA trustpoint when needed. This will save NVRAM space but could result in a slight performance impact.
The cryptopkicertificatequery command is a subcommand for each trustpoint; thus, this command can be disabled on a per-trustpoint basis.
Before you can configure this command, you must enable the cryptopkitrustpointcommand
, which puts you in ca-trustpoint configuration mode.
Note
This command deprecates the cryptocacertificatequerycommand in global configuration mode. Although you can still enter the global configuration command, the configuration mode and command will be written back as ca-trustpoint.
Examples
The following example shows how to prevent certificates and certificate revocation lists (CRLs) from being stored locally on the router; instead, they are retrieved from the “ka” trustpoint when needed.
To specify the local storage location for public key infrastructure (PKI) credentials, use the cryptopkicertificatestoragecommand in global configuration mode. To restore the default behavior, that is to store PKI credentials to NVRAM, use the no form of this command.
cryptopkicertificatestoragelocation-name
nocryptopkicertificatestorage
Syntax Description
location-name
Name of the local storage device.
Default is NVRAM.
Command Default
NVRAM is the default local storage location if this command is not issued.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(2)T
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2(33)SXH
This command was integrated into Cisco IOS Release 12.2(33)SXH.
Usage Guidelines
All Cisco platforms support NVRAM and flash local storage. Depending on your platform, you may have other supported local storage options including bootflash, slot, disk, USB flash, or USB token.
During run time, you can specify what active local storage device you would like to use to store PKI credentials. You must have the following system requirements before you can specify PKI credentials local storage location:
A Cisco IOS Release 12.4(2)T PKI-enabled image or a later image
A platform that supports storing PKI credentials as separate files
A configuration that contains at least one certificate
An accessible local file system
When using a local storage device to store PKI data, the following restrictions are applicable:
Only local file systems may be used. An error message will be displayed if a remote file system is selected, and the command will not take effect.
A subdirectory may be specified if supported by the local file system. NVRAM does not support subdirectories.
Settings will take effect only when the running configuration is saved to the startup configuration.
If the keys are generated on the etoken, then the default storage loaction for the certificates is the etoken
for the device certificates. The CA certificates are stored in NVRAM. This allows for the credentials(keysa nd certificates) to be stored together on the removable media by default.
Examples
The following configuration example shows how to store certificates to the certs subdirectory. The certs subdirectory does not exist and is automatically created.
Router# dir nvram:
114 -rw- 4687 <no date> startup-config
115 ---- 5545 <no date> private-config
116 -rw- 4687 <no date> underlying-config
1 ---- 34 <no date> persistent-data
3 -rw- 707 <no date> ioscaroot#7401CA.cer
9 -rw- 863 <no date> msca-root#826E.cer
10 -rw- 759 <no date> msca-root#1BA8CA.cer
11 -rw- 863 <no date> msca-root#75B8.cer
24 -rw- 1149 <no date> storagename#6500CA.cer
26 -rw- 863 <no date> msca-root#83EE.cer
129016 bytes total (92108 bytes free)
Router# config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# crypto pki certificate storage disk0:/certs
Requested directory does not exist -- created
Certificates will be stored in disk0:/certs/
Router(config)# end
Router# write
*May 27 02:09:00:%SYS-5-CONFIG_I:Configured from console by consolemem
Building configuration...
[OK]
Router# directory disk0:/certs
Directory of disk0:/certs/
14 -rw- 707 May 27 2005 02:09:02 +00:00 ioscaroot#7401CA.cer
15 -rw- 863 May 27 2005 02:09:02 +00:00 msca-root#826E.cer
16 -rw- 759 May 27 2005 02:09:02 +00:00 msca-root#1BA8CA.cer
17 -rw- 863 May 27 2005 02:09:02 +00:00 msca-root#75B8.cer
18 -rw- 1149 May 27 2005 02:09:02 +00:00 storagename#6500CA.cer
19 -rw- 863 May 27 2005 02:09:02 +00:00 msca-root#83EE.cer
47894528 bytes total (20934656 bytes free)
! The certificate files are now on disk0/certs:
Related Commands
Command
Description
showcryptopkicertificatesstorage
Displays the current PKI certificate storage location.
crypto pki crl cache
To set the maximum amount of volatile memory used to cache certificate revocation lists (CRLs), use the cryptopkicrlcachecommand in privileged EXEC mode. To restore the default value, use the no form of this command.
cryptopkicrlcachecache-size
nocryptopkicrlcachecache-size
Syntax Description
cache-size
The maximum CRL cache size in kilobytes.
The default value is 512 kilobytes.
The value specified must be an integer. Specifying a cache size of zero disables CRL caching.
Command Default
The default CRL cache size is set to 512 kilobytes.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.4(20)T
This command was introduced.
Cisco IOS XE Release 2.4
This command was implemented on the Cisco ASR 1000 series routers.
Usage Guidelines
The CRL cache is a global cache that holds all CRLs downloaded by the router regardless of the trustpoint configuration. The impact on router memory depends upon the CRL cache size configured by the administrator. Configuring the CRL cache size allows the amount of memory used for the CRL cache to be reduced (for instance, if low memory conditions exist) or to be increased for better performance (for instance, when a large number of CRLs are being processed).
If the cryptopkicrlcachecommand is issued, regardless of the CRL cache size value set, the CRL cache size will be included in the configuration. Issuing the nocryptopkicrlcachecommandwill remove the CRL cache size from the configuration.
When a CRL is stored in the CRL cache, it is condensed at least one-fifth of its original size. Therefore, more CRLs can be stored in the CRL cache than would be expected based on the CRL size before being cached.
Note
To configure CRL caching for a given trustpoint, you may issue either the crl-cachenone or crlcachedelete-after command. To disable caching of CRLs for a given trustpoint, use the crl-cachenone command. To set a maximum age for CRLs in the cache for a given trustpoint, use the crlcachedelete-after command.
Examples
The following example sets the maximum CRL cache size to 2048 kilobytes and then shows sample output of the showcryptopkicrlscommand:
Router# crypto pki crl cache 2048
Router# show crypto pki crls
CRL Issuer Name:
cn=ioscs,l=Anytown,c=US
LastUpdate: 02:53:41 GMT Mar 6 2007
NextUpdate: 02:53:41 GMT Mar 13 2007
Retrieved from CRL Distribution Point:
** CDP Not Published - Retrieved via SCEP
CRL DER is 475 bytes
CRL is stored in parsed CRL cache
Parsed CRL cache current size is 1705 bytes
Parsed CRL cache maximum size is 2048 bytes
Related Commands
Command
Description
crlcachedelete-after
Deletes a CRL from the cache after the specified number of minutes.
crlcachenone
Disables caching of all CRLs.
cryptopkicrlrequest
Requests that a new CRL be obtained immediately from the CA.
showcryptopkicrls
Displays the current CRL on the router.
crypto pki crl request
To request that a new certificate revocation list (CRL) be obtained immediately from the certification authority, use the cryptopkicrlrequestcommand in global configuration mode.
cryptopkicrlrequestname
Syntax Description
name
Specifies the name of the CA. This is the same name used when the CA was declared with the cryptopkitrustpoint command.
Command Default
Normally, the router requests a new CRL when it is verifying a certificate and there is no CRL cached.
Command Modes
Global configuration
Command History
Release
Modification
11.3 T
The cryptocacrlrequestcommand was introduced.
12.3(7)T
This command replaced the cryptocacrlrequest command.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines
A CRL lists all the certificates of the network device that have been revoked. Revoked certificates will not be honored by your router; therefore, any IPSec device with a revoked certificate cannot exchange IP Security traffic with your router.
The first time your router receives a certificate from a peer, it will download a CRL from the CA. Your router then checks the CRL to make sure the certificate of the peer has not been revoked. (If the certificate appears on the CRL, it will not accept the certificate and will not authenticate the peer.)
A CRL can be reused with subsequent certificates until the CRL expires. If your router receives the certificate of a peer after the applicable CRL has expired, it will download the new CRL.
If your router has a CRL which has not yet expired, but you suspect that the contents of the CRL are out of date, use the cryptopkicrlrequest command to request that the latest CRL be immediately downloaded to replace the old CRL.
This command is not saved to the configuration.
Note
This command should be used only after the trustpoint is enrolled.
Examples
The following example immediately downloads the latest CRL to your router:
crypto pki crl request
crypto pki enroll
To obtain the certificates for your router from the certificate authority (CA), use the cryptopkienroll command in global configuration mode. To delete a current enrollment request, use the no form of this command.
cryptopkienrollname
nocryptopkienrollname
Syntax Description
name
The name of the CA. Use the same name as when you declared the CA using the cryptopkitrustpointcommand.
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
Release
Modification
11.3T
The cryptocaenrollcommand was introduced.
12.3(7)T
This command replaced the cryptocaenroll command.
12.3(14)T
The command was modified to include self-signed certificate information.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.4(24)T
Support for IPv6 Secure Neighbor Discovery (SeND) was added.
Usage Guidelines
This command requests certificates from the CA for all of your router’s Rivest, Shamir, and Adelmen (RSA) key pairs. This task is also known as enrolling with the CA. (Technically, enrolling and obtaining certificates are two separate events, but they both occur when this command is issued.)
Your router needs a signed certificate from the CA for each RSA key pairs of your router; if you previously generated general-purpose keys, this command obtains the one certificate corresponding to the one general-purpose RSA key pair. If you previously generated special-usage keys, this command obtains two certificates corresponding to each of the special-usage RSA key pairs.
If you already have a certificate for your keys you are prompted to remove the existing certificate first. (You can remove existing certificates with the nocertificatecommand.)
The cryptopkienroll command is not saved in the router configuration.
Note
If your router reboots after you issue the cryptopkienroll command but before you receive the certificates, you must reissue the command.
Note
If you are using a Secure Shell (SSH) service, you should set up specific RSA key pairs (different private keys) for the trustpoint and the SSH service. (If the Public Key Infrastructure [PKI] and the SSH infrastructure share the same default RSA key pair, a temporary disruption of SSH service could occur. The RSA key pair could become invalid or change because of the CA system, in which case you would not be able to log in using SSH. You could receive the following error message: “key changed, possible security problem.”)
Responding to Prompts
When you issue the cryptopkienroll command, you are prompted a number of times.
You are prompted to create a challenge password. This password can be up to 80 characters in length. This password is necessary in the event that you ever need to revoke your router’s certificates. When you ask the CA administrator to revoke your certificate, you must supply this challenge password as a protection against fraudulent or mistaken revocation requests.
Note
This password is not stored anywhere, so you need to remember this password.
If you lose the password, the CA administrator may still be able to revoke the router’s certificate but will require further manual authentication of the router administrator identity.
You are also prompted to indicate whether your router’s serial number should be included in the obtained certificate. The serial number is not used by IP Security (IPsec) or Internet Key Exchange, but may be used by the CA to either authenticate certificates or to later associate a certificate with a particular router. (Note that the serial number stored is the serial number of the internal board, not the one on the enclosure.) Ask your CA administrator if serial numbers should be included. If you are in doubt, include the serial number.
Normally, you would not include the IP address because the IP address binds the certificate more tightly to a specific entity. Also, if the router is moved, you would need to issue a new certificate. A router has multiple IP addresses, any of which might be used with IPsec.
If you indicate that the IP address should be included, you will then be prompted to specify the interface of the IP address. This interface should correspond to the interface that you apply your crypto map set to. If you apply crypto map sets to more than one interface, specify the interface that you name in the cryptomaplocal-address command.
Examples
In the following example, a router with a general-purpose RSA key pair requests a certificate from the CA. When the router displays the certificate fingerprint, the administrator verifies this number by calling the CA administrator, which checks the number. The fingerprint is correct, so the router administrator accepts the certificate.
There can be a delay between when the router administrator sends the request and when the certificate is actually received by the router. The amount of delay depends on the CA method of operation.
Router(config)# crypto pki enroll myca
%
% Start certificate enrollment ..
% Create a challenge password. You will need to verbally provide this
password to the CA Administrator in order to revoke your certificate.
For security reasons your password will not be saved in the configuration.
Please make a note of it.
Password: <mypassword>
Re-enter password: <mypassword>
% The subject name in the certificate will be: myrouter.example.com
% Include the router serial number in the subject name? [yes/no]: yes
% The serial number in the certificate will be: 03433678
% Include an IP address in the subject name [yes/no]? yes
Interface: ethernet0/0
Request certificate from CA [yes/no]? yes
% Certificate request sent to Certificate Authority
% The certificate request fingerprint will be displayed.
% The ’show crypto pki certificates’ command will also show the fingerprint.
Some time later, the router receives the certificate from the CA and displays the following confirmation message:
Router(config)# Fingerprint: 01234567 89ABCDEF FEDCBA98 75543210
%CRYPTO-6-CERTRET: Certificate received from Certificate Authority
Router(config)#
If necessary, the router administrator can verify the displayed fingerprint with the CA administrator.
If there is a problem with the certificate request and the certificate is not granted, the following message is displayed on the console instead:
%CRYPTO-6-CERTREJ: Certificate enrollment request was rejected by Certificate Authority
The subject name in the certificate is automatically assigned to be the same as the RSA key pair’s name. In the example, the RSA key pair was named “myrouter.example.com.” (The router assigned this name.)
Requesting certificates for a router with special-usage keys would be the same as in the previous example, except that two certificates would have been returned by the CA. When the router received the two certificates, the router would have displayed the same confirmation message:
%CRYPTO-6-CERTRET: Certificate received from Certificate Authority
Related Commands
Command
Description
crypto map local address
Specifies and names an identifying interface to be used by the crypto map for IPsec traffic.
debugcryptopkimessages
Displays debug messages for the details of the interaction (message dump) between the CA and the router.
debugcryptopkitransactions
Displays debug messages for the trace of interaction (message type) between the CA and the router.
showcryptopkicertificates
Displays information about your certificate, the certificate of the CA, and any RA certificates.
crypto pki export pem
To export a certificate and Rivest, Shamir, and Adleman (RSA) key pair that is associated with a trustpoint in a privacy-enhanced mail (PEM)-formatted file, use the
cryptopkiexportpem command in global configuration mode. To remove any of the configured parameters, use the
no form of this command.
Name of the trustpoint that the associated certificate and RSA key pair exports.
The
trustpoint argument must match the name that was specified through the
cryptopkitrustpoint command.
terminal
Specifies the certificate and RSA key pair that is displayed in PEM format on the console terminal.
urldestination-url
Specifies the URL of the file system where your router should export the certificate and RSA key pairs.
3des
(Optional) Exports the trustpoint using the Triple Data Encryption Standard (3DES) encryption algorithm.
des
(Optional) Exports the trustpoint using the DES encryption algorithm.
password-phrase
Specifies the encrypted password phrase that is used to encrypt the PEM file for export.
Note
The password phrase can be any phrase that is at least eight characters in length; it can include spaces and punctuation, excluding the question mark (?), which has special meaning to the Cisco IOS parser.
rollover
(Optional) Exports certificate authority (CA) shadow, or rollover, certificate.
Command Default
Certificates and RSA keys are not exported.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.3(4)T
The
cryptocaexportpem command was introduced.
12.3(7)T
This command was introduced. This command replaced the
cryptocaexportpem command.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.4(2)T
This command was modified. The
rollover keyword was added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
15.2(1)T
This command was modified. Support was added in the CLI for hiding the password in an exported PEM-formatted file with the introduction of the
password keyword followed by the
password-phrase argument.
Usage Guidelines
Note
Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the
Next Generation Encryption (NGE) white paper.
The
cryptopkiexportpem command allows you to export certificate and RSA key pairs in PEM-formatted files. The PEM files can then be imported back into the Cisco IOS router (via the
cryptopkiimportpem command) or other public key infrastructure (PKI) applications.
The RSA keys in PEM-formatted files can be exported from the following source URL file systems:
Table 1 Destination URL File Systems from Which RSA Keys in PEM-formatted Files Are Exported
File System
Description
archive:
Exports from the archive file system.
disk0:
Exports from the disc0 file system.
disk1:
Exports from the disc1 file system.
ftp:
Exports from the FTP file system.
http:
Exports from the HTTP file system. The URL must be in the following formats:
http://pem_location:80, where
pem_location is the Domain Name System (DNS)
http://ipv4-address:80. For example: http://10.10.10.1:80
http://[ipv6-address]:80. For example: http://[2001:DB8:1:1::1]:80. The IPv6 address is in hexadecimal notation and must be encased in brackets in the URL.
https:
Exports from the HTTPS file system. The URL must use the same formats as the HTTP: file system formats.
null:
Exports from the null file system.
nvram:
Exports from the non-volatile random-access memory (NVRAM) file system.
pram:
Exports from the parameter random-access memory (PRAM) file system.
rcp:
Exports from the remote copy protocol (rcp) file system
scp:
Exports from the secure copy protocol (scp) file system.
snmp:
Exports from the Simple Network Management Protocol (SNMP).
system:
Exports from the system file system.
tftp:
Exports from the Trivial File Transfer Protocol (TFTP) file system.
Note
The URL must be in the form: tftp://pem_location/file_specification
tmpsys:
Exports from the Cisco IOS tmpsys file system.
unix:
Exports from the UNIX file system.
Examples
The following example shows how to generate and export the RSA key pair “aaa” and certificates of the router in PEM files that are associated with the trustpoint named “mycs”:
Router(config)# crypto key generate rsa general-keys label aaa exportable
The name for the keys will be:aaa
Choose the size of the key modulus in the range of 360 to 2048 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few minutes.
!
How many bits in the modulus [512]:
% Generating 512 bit RSA keys ...[OK]
!
Router(config)# crypto pki trustpoint mycs
Router(ca-trustpoint)# enrollment url http://mycs
Router(ca-trustpoint)# rsakeypair aaa
Router(ca-trustpoint)# exit
Router(config)# crypto pki authenticate mycs
Certificate has the following attributes:
Fingerprint:C21514AC 12815946 09F635ED FBB6CF31
% Do you accept this certificate? [yes/no]:y
Trustpoint CA certificate accepted.
!
Router(config)# crypto pki enroll mycs
%
% Start certificate enrollment ..
% Create a challenge password. You will need to verbally provide this password to the CA Administrator in order to revoke your certificate.
For security reasons your password will not be saved in the configuration.
Please make a note of it.
Password:
Re-enter password:
% The fully-qualified domain name in the certificate will be:Router
% The subject name in the certificate will be:bizarro.cisco.com
% Include the router serial number in the subject name? [yes/no]:n
% Include an IP address in the subject name? [no]:n
Request certificate from CA? [yes/no]:y
% Certificate request sent to Certificate Authority
% The certificate request fingerprint will be displayed.
% The 'show crypto ca certificate' command will also show the fingerprint.
Router(config)# Fingerprint: 8DA777BC 08477073 A5BE2403 812DD157
00:29:11:%CRYPTO-6-CERTRET:Certificate received from Certificate Authority
Router(config)# crypto pki export aaa pem terminal 3des password cisco123
% CA certificate:
-----BEGIN CERTIFICATE-----
MIICAzCCAa2gAwIBAgIBATANBgkqhkiG9w0BAQUFADBOMQswCQYDVQQGEwJVUzES
<snip>
waDeNOSI3WlDa0AWq5DkVBkxwgn0TqIJXJOCttjHnWHK1LMcMVGn
-----END CERTIFICATE-----
% Key name:aaa
Usage:General Purpose Key
-----BEGIN RSA PRIVATE KEY-----
Proc-Type:4,ENCRYPTED
DEK-Info:DES-EDE3-CBC,ED6B210B626BC81A
Urguv0jnjwOgowWVUQ2XR5nbzzYHI2vGLunpH/IxIsJuNjRVjbAAUpGk7VnPCT87
<snip>
kLCOtxzEv7JHc72gMku9uUlrLSnFH5slzAtoC0czfU4=
-----END RSA PRIVATE KEY-----
% Certificate:
-----BEGIN CERTIFICATE-----
MIICTjCCAfigAwIBAgICIQUwDQYJKoZIhvcNAQEFBQAwTjELMAkGA1UEBhMCVVMx
<snip>
6xlBaIsuMxnHmr89KkKkYlU6
-----END CERTIFICATE-----
Related Commands
Command
Description
cryptopkiimportpem
Imports certificates and RSA keys to a trustpoint from PEM-formatted files.
cryptopkitrustpoint
Declares the CA that your router should use.
enrollment url (ca-trustpoint)
Specifies the enrollment parameters of a CA.
crypto pki export pkcs12 password
To export Rivest, Shamir, and Adleman (RSA) keys within a Public-key cryptography standards number 12 (PKCS12) file at a specified location, use the
cryptopkiexportpkcs12password command in global configuration mode. To remove any of the configured parameters, use the
no form of this command.
Name of the trustpoint that issues the certificate that a user is going to export. When you export the PKCS12 file, the trustpoint name is the RSA key name.
destination-url
Location of the PKCS12 file to which a user wants to import the RSA key pair.
password-phrase
Password phrase that is used to encrypt the PKCS12 file for export.
Command Default
RSA keys within a PKCS12 file are not exported.
Command Modes
Global configuration
Command History
Release
Modification
12.2(15)T
The
cryptocaexportpkcs12 command was introduced.
12.3(7)T
This command was introduced. This command replaced the
cryptocaexportpkcs12 command.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
15.2(1)T
This command was modified. Support was added in the CLI for hiding the password in an exported PKCS12-formatted file with the introduction of the
password keyword followed by the
password-phrase argument.
Usage Guidelines
Public-key cryptography standards were devised and published by RSA Security. A PKCS12 file has a format commonly used to store private keys with accompanying public key certificates that is protected with a password-based symmetric key. The
cryptopkiexportpkcs12password command creates a PKCS12 file that contains an RSA key pair. The PKCS12 file, along with a certificate authority (CA), is exported to the location that you specify with the destination URL. If you decide not to import the file to another router, you must delete the file.
Security Measures
Keep the PKCS12 file stored in a secure place with restricted access.
An RSA key pair is more secure than a password phrase because the private key in the key pair is not known by multiple parties. When you export an RSA key pair to a PKCS12 file, the RSA key pair now is only as secure as the password phrase.
To create a good password phrase, be sure to include numbers, as well as both lowercase and uppercase letters. Avoid publicizing the password phrase by mentioning it in e-mail or cell phone communications because the information could be accessed by an unauthorized user.
The RSA keys can be exported from the following destination URL file systems:
Table 2 Destination URL File Systems from Which RSA Keys Exported
File System
Description
archive:
Exports from the archive file system.
cns:
Exports from the cns file system. The Cisco CNS Configuration Engine is a web-based system for automatically distributing configuration files to Cisco IOS network devices.
disk0:
Exports from the disc0 file system.
disk1:
Exports from the disc1 file system.
ftp:
Exports from the FTP file system.
http:
Exports from the HTTP file system. The URL must be in the following formats:
http://pkcs12_location:80, where
pkcs12_location is the Domain Name System (DNS).
http://ipv4-address:80. For example: http://10.10.10.1:80.
http://[ipv6-address]:80. For example: http://[2001:DB8:1:1::1]:80. The IPv6 address is in hexadecimal notation and must be enclosed in brackets in the URL.
https:
Exports from the HTTPS file system. The URL must use the same formats as the HTTP: file system formats.
null:
Exports from the null: file system.
nvram:
Exports from the non-volatile random-access Memory (NVRAM) file system.
pram:
Exports from the parameter random-access memory (PRAM) file system.
rcp:
Exports from the remote copy protocol (rcp) file system.
scp:
Exports from the secure copy protocol (scp) file system.
snmp:
Exports from the Simple Network Management Protocol (SNMP).
system:
Exports from the system file system.
tar:
Exports from the UNIX tar file system.
tftp:
Exports from the Trivial File Transfer Protocol (TFTP) file system.
Note
The URL must be in the form: tftp://pkcs12_location/file_specification
.
tmpsys:
Exports from the Cisco IOS tmpsys file system.
unix:
Exports from the UNIX file system.
xmodem:
Exports from the Cisco xmodem file system.
ymodem:
Exports from the Cisco ymodem file system.
Examples
The following example exports an RSA key pair with a trustpoint named “mytp” to an HTTP file:
To import a certificate manually via TFTP or as a cut-and-paste at the terminal, use the cryptopkiimportcommand in global configuration mode.
cryptopkiimportnamecertificate
Syntax Description
namecertificate
Name of the certification authority (CA). This name is the same name used when the CA was declared with the cryptopkitrustpoint command.
Command Default
No default behavior or values
Command Modes
Global configuration
Command History
Release
Modification
12.2(13)T
The cryptocaimport command was introduced.
12.3(7)T
This command replaced the cryptocaimport command.
12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.4(24)T
Support for IPv6 Secure Neighbor Discovery (SeND) was added.
Usage Guidelines
You must enter the cryptopkiimport command twice if usage keys (signature and encryption keys) are used. The first time the command is entered, one of the certificates is pasted into the router; the second time the command is entered, the other certificate is pasted into the router. (It does not matter which certificate is pasted first.)
Examples
The following example shows how to import a certificate via cut-and-paste. In this example, the CA trustpoint is “MS.”
crypto pki trustpoint MS
enroll terminal
crypto pki authenticate MS
!
crypto pki enroll MS
crypto pki import MS certificate
To import certificates and Rivest, Shamir, and Adleman (RSA) keys to a trustpoint from privacy-enhanced mail (PEM)-formatted files, use the
cryptopkiimportpem command in global configuration mode. To remove any of the configured parameters, use the
no form of this command.
Name of the trustpoint that is associated with the imported certificates and RSA key pairs.
The
trustpoint argument must match the name that was specified through the
cryptopkitrustpoint command.
check
(Optional) Specifies that an outdated certificate is not allowed.
exportable
(Optional) Specifies that the imported RSA key pair can be exported again to another Cisco device such as a router.
usage-keys
(Optional) Specifies that two RSA special usage key pairs are imported (that is, one encryption pair and one signature pair), instead of one general-purpose key pair.
terminal
Specifies that certificates and RSA key pairs are manually imported from the console terminal.
urlsource-url
Specifies the URL of the file system where your router should import the certificates and RSA key pairs.
passwordpassword-phrase
Specifies the encrypted password phrase that is used to encrypt the PEM file for import.
Note
The password phrase can be any phrase that is at least eight characters in length; it can include spaces and punctuation, excluding the question mark (?), which has special meaning to the Cisco IOS parser.
Command Default
Certificates and RSA keys are not imported.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.3(4)T
Thecryptocaimportpem command was introduced.
12.3(7)T
This command was introduced. This command replaced the
cryptocaimportpem command.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2 XN
This command was modified. The
check keyword was added.
15.2(1)T
This command was modified. Support was added in the CLI for hiding the password in an imported PEM-formatted file with the introduction of the
password keyword followed by the
password-phrase argument.
Usage Guidelines
The
cryptopkiimportpem command allows certificates and RSA key pairs in PEM-formatted files to be imported. The files can be previously exported from another router or generated from other public key infrastructure (PKI) applications.
The RSA keys in PEM-formatted files can be imported from the following source URL file systems:
Table 3 Source URL File Systems from Which RSA Keys in PEM-formatted Files are Imported
File System
Description
archive:
Imports from the archive file system
cns:
Imports from the CNS file system. The Cisco CNS Configuration Engine is a web-based system for automatically distributing configuration files to Cisco IOS network devices.
disk0:
Imports from the disc0 file system.
disk1:
Imports from the disc1 file system.
ftp:
Imports from the FTP file system.
http:
Imports from the HTTP file system. The URL must be in the following formats:
http://pem_location:80:80, where
pem_location:80 is the Domain Name System (DNS)
http://ipv4-address:80. For example: http://10.10.10.1:80
http://[ipv6-address]:80. For example: http://[2001:DB8:1:1::1]:80. The IPv6 address is in hexadecimal notation and must be enclosed in brackets in the URL.
https:
Imports from the HTTPS file system. The URL must use the same formats as the HTTP: file system formats.
null:
Imports from the null: file system.
nvram:
Imports from the non-volatile random-access memory (NVRAM) file system.
pram:
Imports from the parameter random-access memory (PRAM) file system.
rcp:
Imports from the remote copy protocol (rcp) file system.
scp:
Imports from the secure copy protocol (scp) file system.
snmp:
Imports from the Simple Network Management Protocol (SNMP).
system:
Imports from the system file system.
tar:
Imports from the UNIX tar file system.
tftp:
Imports from the Trivial File Transfer Protocol (TFTP) file system.
Note
The URL must be in the form: tftp://pem_location/file_specification
tmpsys:
Imports from the IOS tmpsys file system.
unix:
Imports from the UNIX file system.
xmodem:
Imports from the Cisco xmodem file system.
ymodem:
Imports from the Cisco ymodem file system.
Examples
The following example shows how to import PEM files to trustpoint “ggg” through TFTP:
Router(config)# crypto pki import ggg pem url tftp://10.1.1.2/johndoe/msca cisco1234
% Importing CA certificate...
Address or name of remote host [10.1.1.2]?
Destination filename [johndoe/msca.ca]?
Reading file from tftp://10.1.1.2/johndoe/msca.ca
Loading johndoe/msca.ca from 10.1.1.2 (via Ethernet0):!
[OK - 1082 bytes]
% Importing private key PEM file...
Address or name of remote host [10.1.1.2]?
Destination filename [johndoe/msca.prv]?
Reading file from tftp://10.1.1.2/johndoe/msca.prv
Loading johndoe/msca.prv from 10.1.1.2 (via Ethernet0):!
[OK - 573 bytes]
% Importing certificate PEM file...
Address or name of remote host [10.1.1.2]?
Destination filename [johndoe/msca.crt]?
Reading file from tftp://10.1.1.2/johndoe/msca.crt
Loading johndoe/msca.crt from 10.1.1.2 (via Ethernet0):!
[OK - 1289 bytes]
% PEM files import succeeded.
Router(config)#
Related Commands
Command
Description
cryptopkiexportpem
Exports certificates and RSA keys that are associated with a trustpoint in a PEM-formatted file.
cryptopkitrustpoint
Declares the CA that your router should use.
enrollment url (ca-trustpoint)
Specifies the enrollment parameters of a CA.
crypto pki import pkcs12 password
To import Rivest, Shamir, and Adleman (RSA) keys, use the
cryptopkiimportpkcs12password command in global configuration mode. To remove any of the configured parameters, use the
no form of this command.
Name of the trustpoint who issues the certificate that a user is going to export or import. When importing, the trustpoint name will become the RSA key name.
source-url
The location of the PKCS12 file to which a user wants to export the RSA key pair.
passwordpassword-phrase
Enter the password phrase that must be entered to undo encryption when the RSA keys are imported.
Command Default
No default behavior or values
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(15)T
The
cryptocaimportpkcs12 command was introduced.
12.3(7)T
This command was introduced. This command replaced the
cryptocaimportpkcs12 command.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
15.2(1)T
This command was modified. Support was added in the CLI for hiding the password in an imported PKCS12-formatted file with the introduction of the
password keyword followed by the
password-phrase argument.
Usage Guidelines
When you enter the
cryptopkiimportpkcs12password command, a key pair and a trustpoint are generated.
If the key pair and trustpoint that were generated need to be removed, then enter the
cryptokeyzeroizersa command to zeroize the key pair and enter the
nocryptopkitrustpoint command to remove the trustpoint.
Note
After you import RSA keys to a target router, you cannot export those keys from the target router to another router.
The RSA keys can be imported from the following source URL file systems:
Table 4 Source URL File Systems from Which RSA Keys Imported
File System
Description
archive:
Imports from the archive file system.
check
The
check keyword is used to validate a certificate on input from a file system. Any file system argument indicated in this table can be used following this keyword.
cns:
Imports from the CNS file system. The Cisco CNS Configuration Engine is a web-based system for automatically distributing configuration files to Cisco IOS network devices.
disk0:
Imports from the disc0 file system.
disk1:
Imports from the disc1 file system.
ftp:
Imports from the FTP file system.
http:
Imports from the HTTP file system. The URL must be in the following formats:
http://pkcs12_location:80, where
pkcs12_location is the Domain Name System (DNS)
http://ipv4-address:80. For example: http://10.10.10.1:80
http://[ipv6-address]:80. For example: http://[2001:DB8:1:1::1]:80. The IPv6 address is in hexadecimal notation and must be enclosed in brackets in the URL.
https:
Imports from the HTTPS file system. The URL must use the same formats as the HTTP file system formats.
null:
Imports from the null file system.
nvram:
Imports from the non-volatile random-access memory (NVRAM) file system.
pram:
Imports from the parameter random-access memory (PRAM) file system.
rcp:
Imports from the remote copy protocol (rcp) file system.
scp:
Imports from the secure copy protocol (scp) file system.
snmp:
Imports from the Simple Network Management Protocol (SNMP).
system:
Imports from the system file system.
tar:
Imports from the UNIX tar file system.
tftp:
Imports from the Trivial File Transfer Protocol (TFTP) file system.
Note
The URL must be in the form: tftp://pkcs12_location/file_specification.
tmpsys:
Imports from the IOS tmpsys file system.
unix:
Imports from the UNIX file system.
xmodem:
Imports from the Cisco xmodem file system.
ymodem:
Imports from the Cisco ymodem file system.
Examples
In the following example, an RSA key pair that has been associated with the trustpoint named “mytp” is to be imported:
To define an enrollment profile, use the cryptopkiprofileenrollmentcommand in global configuration mode. To delete all information associated with this enrollment profile, use the no form of this command.
cryptopkiprofileenrollmentlabel
nocryptopkiprofileenrollmentlabel
Syntax Description
label
Name for the enrollment profile; the enrollment profile name must match the name specified in the enrollmentprofile command.
Command Default
An enrollment profile does not exist.
Command Modes
Global configuration
Command History
Release
Modification
12.2(13)ZH
This command was introduced.
12.3(4)T
This command was integrated into Cisco IOS Release 12.3(4)T.
12.3(7)T
This command replaced the cryptocaprofileenrollment command.
12.2(18)SXE
This command was integrated into Cisco IOS Release 12.2(18)SXE.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines
Before entering this command, you must specify a named enrollment profile using the enrollmentprofile in ca-trustpoint configuration mode.
After entering the cryptopkiprofileenrollment command, you can use any of the following commands to define the profile parameters:
authenticationcommand--Specifies the HTTP command that is sent to the certification authority (CA) for authentication.
enrollmenturl--Specifies the URL of the CA server to which to send enrollment requests.
parameter--Specifies parameters for an enrollment profile. This command can be used only if the authenticationcommand or the enrollmentcommand is used.
Note
The authenticationurl,enrollmenturl, authenticationterminal, and enrollmentterminal commands allow you to specify different methods for certificate authentication and enrollment, such as TFTP authentication and manual enrollment.
Examples
The following example shows how to define the enrollment profile named “E” and associated profile parameters:
crypto pki trustpoint Entrust
enrollment profile E
serial
crypto pki profile enrollment E
authentication url http://entrust:81
authentication command GET /certs/cacert.der
enrollment url http://entrust:81/cda-cgi/clientcgi.exe
enrollment command POST reference_number=$P2&authcode=$P1
&retrievedAs=rawDER&action=getServerCert&pkcs10Request=$REQ
parameter 1 value aaaa-bbbb-cccc
parameter 2 value 5001
Related Commands
Command
Description
cryptopkitrustpoint
Declares the PKI trustpoint that your router should use.
enrollmentprofile
Specifies that an enrollment profile can be used for certificate authentication and enrollment.
crypto pki server
To enable a Cisco IOS certificate server (CS) and enter certificate server configuration mode, or to immediately generate shadow certification authority (CA) credentials, use the
crypto pki server command in global configuration mode. To disable the certificate server (which is the default functionality), use the
no form of this command.
crypto pki servercs-label
[ rollover [cancel] ]
no crypto pki servercs-label
[ rollover [cancel] ]
Syntax Description
cs-label
Name of the certificate server.
Note
The certificate server name should not exceed 13 characters.
rollover
(Optional) Immediately generates a shadow CA certificate.
Note
If the
auto-enroll command has been issued with the
regenerate keyword, shadow keys will also be generated.
Note
If the shadow certificate and keys are already present this command will fail.
cancel
(Optional) Deletes the exiting shadow CA certificate when used with the
rollover keyword.
Shadow keys will also be deleted if they exist.
Command Default
A certificate server is not enabled; the automatic CA certificate rollover process is not initiated.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.3(4)T
This command was introduced.
12.4(2)T
The
rollover and
cancel keywords were introduced to support automated CA certificate rollover functionality.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines
Once the
crypto pki server command is entered, the certificate server configuration mode commands can be configured to deploy the public key infrastructure (PKI) by defining the default behavior of the CS, which limits user interface complexity. See the Related Commands section for more information on these commands.
Note
All CS-related commands are optional; therefore any basic CS functionality that is not specified through the CLI for these commands uses their default value.
issuer-name-- Specifies the distinguished name (DN) as the CA issuer name for the certificate server.
lifetime(certificateserver)--Specifies the lifetime of the CA or a certificate.
lifetimecrl--Defines the lifetime of the certificate revocation list (CRL) that is used by the certificate server.
shutdown--Allows a certificate server to be disabled without removing the configuration.
Automated CA Certificate Rollover
CAs and their clients, have certificates with expiration dates that have to be reissued when the current certificate is about to expire. CAs also have key pairs used to sign client certificates. When the CA certificate is expiring it must generate a new certificate and possibly a new key pair. This process, called rollover, allows for continuous operation of the network while clients and the certificate server are switching from an expiring CA certificate to a new CA certificate.
Examples
The following example shows how to enable the certificate server “mycertserver”:
Router(config)# ip http server
Router(config)# crypto pki server mycertserver
Router(cs-server)# database url tftp://mytftp/johndoe/mycertserver
The following example shows how to disable the certificate server “mycertserver”:
Router(config)# no crypto pki server mycertserver
% This will stop the Certificate Server process and delete the server
configuration
Are you sure you want to do this? [yes/no]: yes
% Do you also want to remove the associated trustpoint and
signing certificate and key? [yes/no]: no
% Certificate Server Process stopped
The following example shows a shadow client certificate request from a terminal:
Router# crypto pki server mycs rollover request pkcs10 terminal
% Enter Base64 encoded or PEM formatted PKCS10 enrollment request.
% End with a blank line or "quit" on a line by itself.
-----BEGIN CERTIFICATE REQUEST-----
MIIBUTCBuwIBADASMRAwDgYDVQQDEwdOZXdSb290MIGfMA0GCSqGSIb3DQEBAQUA
A4GNADCBiQKBgQDMHeev1ERSs320zbLQQk+3lhV/R2HpYQ/iM6uT1jkJf5iy0UPR
wF/X16yUNmG+ObiGiW9fsASF0nxZw+fO7d2X2yh1PakfvF2wbP27C/sgJNOw9uPf
sBxEc40Xe0d5FMh0YKOSAShfZYKOflnyQR2Drmm2x/33QGol5QyRvjkeWQIDAQAB
oAAwDQYJKoZIhvcNAQEEBQADgYEALM90r4d79X6vxhD0qjuYJXfBCOvv4FNyFsjr
aBS/y6CnNVYySF8UBUohXYIGTWf4I4+sj6i8gYfoFUW1/L82djS18TLrUr6wpCOs
RqfAfps7HW1e4cizOfjAUU+C7lNcobCAhwF1o6q2nIEjpQ/2yfK9O7sb3SCJZBfe
eW3tyCo=
-----END CERTIFICATE REQUEST-----
The following example shows the
redundancy,
show, and
serial-number keywords in the
crypto pki servercommand.
Router(config)#crypto pki server MYCA
Router(cs-server)#grant auto
Router(cs-server)#redundancy
Router(cs-server)#serial-number 0x4c
Router(cs-server)#show
redundancy
serial-number 0x4C
grant auto
end
Related Commands
Command
Description
auto-rollover
Enables the automated CA certificate rollover functionality.
cdp-url
Specifies a CDP to be used in certificates that are issued by the certificate server.
crl (cs-server)
Specifies the CRL PKI CS.
database archive
Specifies the CA certificate and CA key archive format--and the password--to encrypt this CA certificate and CA key archive file.
database level
Controls what type of data is stored in the certificate enrollment database.
database url
Specifies the location where database entries for the CS is stored or published.
database username
Specifies the requirement of a username or password to be issued when accessing the primary database location.
default (cs-server)
Resets the value of the CS configuration command to its default.
grant auto rollover
Enables automatic granting of certificate reenrollment requests for a Cisco IOS subordinate CA server or RA mode CA.
grant auto trustpoint
Specifies the CA trustpoint of another vendor from which the Cisco IOS certificate server automatically grants certificate enrollment requests.
grant none
Specifies all certificate requests to be rejected.
grant ra-auto
Specifies that all enrollment requests from an RA be granted automatically.
hash (cs-server)
Specifies the cryptographic hash function the Cisco IOS certificate server uses to sign certificates issued by the CA.
issuer-name
Specifies the DN as the CA issuer name for the CS.
lifetime (cs-server)
Specifies the lifetime of the CA or a certificate.
mode ra
Enters the PKI server into RA certificate server mode.
mode sub-cs
Enters the PKI server into sub-certificate server mode
redundancy (cs-server)
Specifies that the active CS is synchronized to the standby CS.
serial-number (cs-server)
Specifies whether the router serial number should be included in the certificate request.
show (cs-server)
Displays the PKI CS configuration.
shutdown (cs-server)
Allows a CS to be disabled without removing the configuration.
crypto pki server grant
To grant all or certain simple certificate enrollment protocol (SCEP) requests, use the cryptopkiservergrantcommand in privileged EXEC mode.
cryptopkiservercs-labelgrant
{ all | req-id }
Syntax Description
cs-label
Name of the certificate server. The name must match the name specified via the cryptopkiserver command.
all
All certificate enrollment requests are granted.
req-id
ID associated with a specific enrollment request in the enrollment request database. Use the cryptopkiserverinforequests command to display the ID.
Command Default
If this command is not issued, the certificate server keeps the requests in a pending state.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
Usage Guidelines
After you enable the cryptopkiservergrant command, your certificate server will immediately grant all specified certificate requests. Certificate requests that are not granted will expire after the time that was specified using thelifetimeenrollment-request command.
Examples
The following example shows to grant all manual enrollment requests for the certificate server “mycs”:
Router# crypto pki server mycs grant all
Related Commands
Command
Description
cryptopkiserver
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
crypto pki server reject
Rejects all or certain SCEP requests.
crypto pki server info crl
Note
Effective with Cisco IOS Release 12.4(20)T, the cryptopkiserverinfocrl command is replaced by the showcryptopkiservercrlcommand. See the showcryptopkiservercrl command for more information.
To display information regarding the status of the current certificate revocation list (CRL), use the cryptopkiserverinfocrl command in privileged EXEC mode.
cryptopkiservercs-labelinfocrl
Syntax Description
cs-label
Name of the certificate server. The name must match the name specified via the cryptopkiserver command.
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
12.4(20)T
This command was replaced by the showcryptopkiservercrlcommand.
Usage Guidelines
CRLs are issued once every specified time period via the lifetimecrl command. It is the responsibility of the network administrator to ensure that the CRL is available from the location that is specified via the cdp-url command. To access information, such as the lifetime and location of the CRL, use the cryptopkiserverinfocrlcommand.
Examples
The following example shows how to access CRL information for the certificate server “mycs”:
Router# crypto pki server mycs info crl
Related Commands
Command
Description
cdp-url
Specifies a CDP to be used in certificates that are issued by the certificate server.
cryptopkiserver
Enables a Cisco IOS certificate server and enter certificate server configuration mode.
lifetime crl
Defines the lifetime of the CRL that is used by the certificate server.
crypto pki server info requests
Note
Effective with Cisco IOS Release 12.4(20)T, the
cryptopkiserverinforequests command is replaced by the
showcryptopkiserverrequestscommand. See the
showcryptopkiserverrequests command for more information.
To display all outstanding certificate enrollment requests, use the
cryptopkiserverinforequestscommand in privileged EXEC mode.
cryptopkiservercs-labelinforequests
Syntax Description
cs-label
Name of the certificate server. The name must match the name specified via the
cryptopkiserver command.
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
12.4(2)T
The command output was modified to include shadow CA certificate information.
12.4(20)T
This command was replaced by the
showcryptopkiserverrequestscommand.
Usage Guidelines
A certificate enrollment request functions as follows:
The certificate server receives the enrollment request from an end user, and the following actions occur:
A request entry is created in the enrollment request database with the initial state. (See the
showpkiserver command for a complete list of certificate enrollment request states.)
The certificate server refers to the command-line interface (CLI) configuration (or the default behavior any time a parameter is not specified) to determine the authorization of the request. Thereafter, the state of the enrollment request is updated in the enrollment request database.
At each Simple Certificate Enrollment Protocol (SCEP) query for a response, the certificate server examines the current request and performs one of the following actions:
Responds to the end user with a “pending” or “denied” state.
Forwards to the request to the certification authority (CA) core, where it will generate and sign the appropriate certificate, store the certificate in the enrollment request database, and return the request to the built-in certificate server SCEP server, who will reply to the end user with the certificate on the next SCEP request.
If the connection of the client has closed, the certificate server will wait for client user to request another certificate.
All enrollment requests transitions through the certificate enrollment states that are defined in the table below.
Table 5 Certificate Enrollment Request State Descriptions
Certificate Enrollment State
Description
initial
The request has been created by the SCEP server.
authorized
The certificate server has authorized the request.
malformed
The certificate server has determined that the request is invalid for cryptographic reasons.
denied
The certificate server has denied the request for policy reasons.
pending
The enrollment request must be manually accepted by the network administrator.
granted
The CA core has generated the appropriate certificate for the certificate request.
Examples
The following example shows output for the certificate server “certsrv1,” which has a pending certificate enrollment request:
Router# crypto pki server certsrv1 info requests
Enrollment Request Database:
ReqID State Fingerprint SubjectName
--------------------------------------------------------------
1 pending 0A71820219260E526D250ECC59857C2D serialNumber=2326115A+hostname=831.
The following example shows the output for shadow PKI certificate info requests:
Router# crypto pki server mycs info requests
Enrollment Request Database:
RA certificate requests:
ReqID State Fingerprint SubjectName
--------------------------------------------------------------
RA rollover certificate requests:
ReqID State Fingerprint SubjectName
--------------------------------------------------------------
Router certificates requests:
ReqID State Fingerprint SubjectName
--------------------------------------------------------------
1 pending A426AF07FE3A4BB69062E0E47198E5BF hostname=client
Router rollover certificates requests:
ReqID State Fingerprint SubjectName
--------------------------------------------------------------
2 pending B69062E0E47198E5BFA426AF07FE3A4B hostname=client
Related Commands
Command
Description
cryptopkiserver
Enables a Cisco IOS certificate server and enters PKI configuration mode.
crypto pki server password generate
To generate a password for simple certificate enrollment protocol (SCEP) requests that can be used only one time, use the cryptopkiserverpasswordgeneratecommand in privileged EXEC mode.
cryptopkiservercs-labelpasswordgenerate [minutes]
Syntax Description
cs-label
Name of the certificate server. The name must match the name specified via the cryptopkiserver command.
minutes
(Optional) Length of time, in minutes, that the password is valid. Valid times range from 1 to 1440 minutes. The default value is 60 minutes.
Command Default
If this command is not enabled, no password is created.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
Usage Guidelines
SCEP, which is the only supported enrollment protocol, supports two client authentication mechanisms--manual and preshared key. Manual enrollment requires the administrator at the certification authority (CA) server to specifically authorize the enrollment requests; enrollment using preshared keys allows the administrator to preauthorize enrollment requests by generating a one-time password.
Note
Only one password is valid at a time; if a second password is generated, the previous password is no longer valid.
Examples
The following example shows how to generate a one-time password that is valid for 75 minutes for the certificate server “mycs”:
Router# crypto pki server mycs password generate 75
Related Commands
Command
Description
cryptopkiserver
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
crypto pki server reject
To reject all or certain Simple Certificate Enrollment Protocol (SCEP) requests, use the cryptopkiserverreject command in privileged EXEC mode.
cryptopkiservercs-labelreject
{ all | req-id }
Syntax Description
cs-label
Name of the certificate server. The name must match the name specified via the cryptopkiserver command.
all
All certificate enrollment requests are rejected.
req-id
ID associated with a specific enrollment request in enrollment request database. Use the cryptopkiserverinforequests command to display the ID.
Command Default
If this command is not issued, the certificate server keeps the requests in a pending state.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
Usage Guidelines
After you enable the cryptopkiserverreject command, your certificate server will immediately reject all certificate requests.
SCEP, which is the only supported enrollment protocol, supports two client authentication mechanisms--manual and preshared key. Manual enrollment requires the administrator at the certification authority (CA) server to specifically authorize the enrollment requests. The administrator can become overloaded if there are numerous enrollment requests. Thus, the cryptopkiserverreject command can be reduce user interaction by automatically rejecting all or specific enrollment requests.
Examples
The following example shows how reject all manual enrollment requests for the certificate server “mycs”:
Router# crypto pki server mycs reject all
Related Commands
Command
Description
cryptopkiserver
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
cryptopkiservergrant
Grants all or certain SCEP requests.
crypto pki server info requests
Displays all outstanding certificate enrollment requests.
crypto pki server remove
To remove enrollment requests that are in the certificate server Enrollment Request Database, use the cryptopkiserverremovecommand in privileged EXEC mode . This command does not have a no form.
cryptopkiservercs-labelremove
{ all | req-id }
Syntax Description
cs-label
Name of the certificate server.
all
Removes all enrollment requests.
req-id
Removes the specified enrollment request.
Command Default
Enrollment requests will remain in the certificate server database.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(11)T
This command was introduced.
Usage Guidelines
After the certificate server receives an enrollment request, it can leave the request in pending, reject it, or grant it. Before this command was added, the request would be left in the Enrollment Request Database for 1 hour until the client polled the certficiate server for the result of the request. This command allows you to remove individual or all requests from the database, especially useful if the client leaves and never polls the certificate server.
In addition, the use of this command also allows the server to be returned to a clean slate with respect to the keys and transaction IDs. Thus, it is a useful command to use during troubleshooting with a Simple Certificate Enrollment Protocol (SCEP) client that may be behaving badly.
Examples
The following example shows that all enrollment requests are to be removed from the certificate server:
Router# enable Router# crypto pki server server1 remove all
Related Commands
Command
Description
cryptopkiserverinforequest
Displays all outstanding enrollment requests.
crypto pki server request pkcs10
To manually add a certificate request to the request database, use the
cryptopkiserverrequestpkcs10command in privileged EXEC mode.commandargumentkeyword
Name of the certificate server. The name must match the name specified via the
cryptopkiserver command.
url
URL of the file systems from which the certificate server should retrieve the PKCS10 enrollment request and to which it should post the granted certificate. For a list of available options, see the table below.
Note
The request filename should have a “.req” extension and the granted certificate file name will have a “.crt” extension (see the URL example in the section “Examples” below).
terminal
Certificate requests will be manually pasted from the console terminal, and the granted certificate will be displayed on the console.
base64
(Optional) Specifies the certificate will be returned without privacy-enhanced mail (PEM) headers, regardless of whether PEM headers were used in the request.
pem
(Optional) Specifies the certificate will be returned with PEM headers automatically added to the certificate after the certificate is granted, regardless of whether PEM headers were used in the request.
scephex
(Optional) Specifies the certificate will be returned in hexadecimal. Pending requests will also be synchronized with the standby certificate server in hexadecimal.
Command Default
None
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.3(4)T
This command was introduced.
15.0(1)M
The command was modified to accept the PKCS10 certificate and the signing certificate in hexadecimal as well as in base64 encoding.
Usage Guidelines
Use the
cryptopkiserverrequestpkcs10 command to manually add a base64-encoded, PEM-formatted, or hexadecimal-encoded PKCS10 certificate enrollment request. This command is especially useful when the client does not have a network connection with the certificate server so that it can do Simple Certificate Enrollment Protocol (SCEP) enrollment. After the certificate is granted, the certificate will be displayed on the console terminal using base64 encoding if the
terminal keyword is specified, or it will be sent to the file system that is specified using theurl argument.
The
url argument allows you to specify or change the location in which the certificate server retrieves the new certificate request and posts the granted certificate. The table below lists available file system options.
Table 6 crypto pki server request pkcs10 Options
Location
Description
cns:
Retrieves certificate from Cisco Networking Services (CNS): file system
flash:
Retrieves certificate from flash: file system
ftp:
Retrieves certificate from FTP: file system
http:
Retrieves certificate from HTTP: file system
https:
Retrieves certificate from Secure HTTP (HTTPS): file system
null:
Retrieves certificate from null: file system
nvram:
Retrieves certificate from NVRAM: file system
rcp:
Retrieves certificate from remote copy protocol (rcp): file system
scp:
Retrieves certificate from secure copy protocol (scp): file system
system:
Retrieves certificate from system: file system
tftp:
Retrieves certificate from TFTP: file system
Examples
The following example shows how to manually add a base64-encoded certificate request with PEM boundaries to the request database:
Router# crypto pki server mycs request pkcs10 terminal pem
% Enter Base64 encoded or PEM formatted PKCS10 enrollment request.
% End with a blank line or "quit" on a line by itself.
-----BEGIN CERTIFICATE REQUEST-----
MIIBdTCB3wIBADA2MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNQ2lzY28gU3lzdGVt
czEPMA0GA1UEAxMGdGVzdCAxMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDF
EFukc2lCFSHtDJn6HFR2n8rpdhlAYwcs0m68N3iRYHonv847h0/H6utTHVd2qEEo
rNw97jMRZk6BLhVDc05TKGHvUlBlHQWwc/BqpVI8WiHzZdskUH/DUM8kd67Vkjlb
e+FF7WrWT4FIO4vR4rF1V2p3FZ+A29UNc9Pi1s98nQIDAQABoAAwDQYJKoZIhvcN
AQEEBQADgYEAUQCGNzzNJwBOCwmEmG8XEGFSZWDmFlctm8VWvaZYMPOt+vl6iwFk
RmtD1Kg91Vw/qT5FJN8LmGUopOWIrwH4rUWON+TqtRmv2dgsdL5T4dx0sgG5E0s4
T302paxEHiHVRJpe8OD7FJgOvdsKRziCpyD4/Jfb1WnSVQZmvIYAxVQ=
-----END CERTIFICATE REQUEST-----
% Enrollment request pending, reqId=2
Router# crypto pki server mycs grant 2
% Granted certificate:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
The following example shows how to retrieve a certificate request and add it to the request database (using the
url argument):
Note
The request file name should have a “.req” extension and the certificate file name a “.crt” extension.
Router# crypto pki server mycs request pkcs10 tftp://192.0.2.129/router5
% Retrieving Base64 encoded or PEM formatted PKCS10 enrollment request...
Reading file from tftp://192.0.2.129/router5.req
Loading router5.req from 192.0.2.129 (via Ethernet0): !
[OK - 582 bytes]
% Enrollment request pending, reqId=1
Router# crypto pki server mycs grant 1
% Writing out the granted certificate...
!Writing file to tftp://192.0.2.129/router5.crt!
The following example shows how to manually add a hexadecimal-encoded certificate request with PEM boundaries to the request database:
Name of the certificate server. The name must match the name specified via the cryptopkiserver command.
certificate-serial-number
Serial number of the certificate that is to be revoked. The serial number can be a hexadecimal number with the prefix “0x” (for example, 0x4c) or a decimal number (for example, 76).
Command Default
Certificates are revoked on the basis of their name.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(4)T
This command was introduced.
15.0(1)M
The command was modified to remove the serial-number check against the last-issued serial number.
Usage Guidelines
When a new certificate revocation list (CRL) is issued, the certificate server obtains the previous CRL, makes the appropriate changes, and resigns the new CRL. A new CRL is issued after a certificate is revoked from the CLI. If this process negatively affects router performance, the
crypto pki server revoke
command can be used to revoke a list or range of certificates.
Note
In Cisco IOS Release 15.0(1)M, the serial number to be revoked is not compared with the last-issued serial number.
Note
A new CRL cannot be issued unless the current CRL is revoked or changed.
Examples
The following examples show how to revoke a certificate with the serial number 76 (for example, 0x4c in hexidecimal) from the certificate server “mycs”:
Router# crypto pki server mycs revoke 76
Router# crypto pki server mycs revoke 0x4c
Related Commands
Command
Description
cdp-url
Specifies that CDP should be used in the certificates that are issued by the certificate server.
cryptopkiserver
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
crypto pki server start
To enable a Cisco IOS certificate server, use the cryptopkiserverstart command in privileged EXEC mode. To disable a certificate server, use the cryptopkiserverstop command.
cryptopkiserverservernamestart
Syntax Description
servername
Name of the certificate server.
Note
The certificate server name must not exceed 13 characters.
Command Default
The certificate server is disabled.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.0(1)M
This command was introduced.
Usage Guidelines
Using the cryptopkiserverstart command is the same as using the noshut command in DSP configuration mode.
Examples
The following example shows how to enable a certificate server on a router:
Router# crypto pki server MYCA start
%Some server settings cannot be changed after CA certificate generation.
% Please enter a passphrase to protect the private key
% or type Return to exit
Password:
Re-enter password:
% Certificate Server enabled.
Related Commands
Command
Description
cryptopkiserverstop
Disables a Cisco IOS certificate server.
showcryptopkiserver
Displays the current state and configuration of a certificate server.
crypto pki server stop
To disable a Cisco IOS certificate server, use the cryptopkiserverstop command in privileged EXEC mode.
cryptopkiserverservernamestop
Syntax Description
servername
Name of the certificate server.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
15.0(1)M
This command was introduced.
Usage Guidelines
Using the cryptopkiserverstop command is the same as using the shutdown command in DSP configuration mode.
Examples
The following example shows how to disable a certificate server:
Router# crypto pki server MYCA stop
Certificate server 'shut' event has been queued for processing.
Related Commands
Command
Description
cryptopkiserverstart
Enables a Cisco IOS certificate server.
showcryptopkiserver
Displays the current state and configuration of a certificate server.
crypto pki server trim
To trim certificates from the certificate revocation list (CRL), use the cryptopkiservertrimcommand in privileged EXEC mode.
Name of the certificate server. The name must match the name specified using the cryptopkiserver command.
expired
Specifies that the expired certificates are to be trimmed from the CRL.
start-number
The beginning of the certificate serial number range to check and trim from the CRL if the certificate has expired.
end-number
(Optional) The ending number of the certificate serial number range to check and trim from the CRL if the certificate has expired.
verbose
Displays information about the action taken on the certificates checked in the CRL.
generate
Generates information about CRL trimming.
expired-list
Generates information about trimmed expired certificates.
urlurl
Specifies the location of the expired certificate list, which contains a list of certificate serial numbers to be trimmed from the CRL.
Command Default
All certificates in the specified certificate server database will be searched to locate and to trim expired certificates.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.4(20)T
This command was introduced.
15.0(1)M
This command was modified in a release earlier than Cisco IOS Release 15.0(1)M. The generate keyword was added.
Usage Guidelines
This command trims expired certificates from the CRL. Only certificates that are expired and have accurate and complete information in the certificate database can be trimmed from the database.
Depending on the size and location of the certificate database, searching the database for expired certificates may be a time-consuming process. Depending on your environment, you may choose one of three methods to search and to trim your CRL:
Search the entire certificate database.
This is usually the most time-consuming and resource-consuming method.
Specify a range of certificate serial numbers to search.
If a large number of certificates are in your certificate database or if your certificate database is stored at a remote location (for example, TFTP or Secure Copy [SCP]) you may limit the range of certificates to search by specifying both the starting and ending certificate serial numbers. If no starting and ending certificate serial numbers are specified, the entire certificate database will be searched and all expired certificates will be trimmed.
Use an input list to specify the expired certificates to be trimmed from the CRL.
This is the most scalable method because it divides the process into two steps: searching the certificate database for expired certificates and trimming the CRL. An input file listing expired certificate serial numbers may be generated using a Perl script or similar program, manually, or by issuing the cryptopkiservertrimgenerateexpired-list command. The input list must follow the format as shown:
# CRL Trimming file generated on 01/31/2008
version=1
35
37
Lines that begin with a pound sign (#) are inserted comments. The second line contains a version string indicating the file type. Each remaining line (in this example lines 35 and 37) contains a certificate serial number indicating one certificate to be removed from the CRL.
Examples
The following example shows how to check and trim the CRL of all expired certificates in the certificate database for the certificate server “mycs”:
Router#
crypto pki server mycs trim expired
The following example shows how to check and trim the CRL of expired certificates within the certificate serial number range 0x1-0x3 in the certificate database for the certificate server “mycs”. The result is the same as generating and using an input file of expired certificate serial numbers, as shown in the next example.
Router# crypto pki server mycs trim expired 0x1 end 0x3
The following example shows how to generate a list of expired certificate serial numbers, store the list on an HTTP server, then use the resulting list to trim the CRL of all expired certificates for the certificate server “mycs”:
Router# crypto pki server mycs trim generate expired-list 0x1 0x3 url http://databaselocation/expired-certs.1st
Router# crypto pki server mycs trim url http://databaselocation/expired-certs.1st
The following example shows how to check and trim the CRL for only one certificate serial number in the certificate database for the certificate server “mycs.” If the certificate with the serial number 45 has expired, it will be trimmed from the CRL.
Router# crypto pki server mycs trim expired 0x2
The following example shows how to trim the CRL of all expired certificates for the certificate server “mycs” and display the resulting action taken for each certificate serial number:
Router#
crypto pki server mycs trim expired verbose
Certificate 2: Expired. Removed from CRL.
Certificate F4240: Expired. Removed from CRL.
Certificate 4593: Not Removed.
Certificate 1234: Not Removed.
Related Commands
Command
Description
cryptopkiserver
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
cryptopkiservertrimgenerateexpired-list
Generates a list of expired certificates in the CRL.
crypto pki server trim generate expired-list
To generate a list of expired certificates in the current certificate revocation list (CRL), use the cryptopkiservertrimgenerateexpired-listcommand in privileged EXEC mode.
Name of the certificate server. The name must match the name specified via the cryptopkiserver command.
startnumber
(Optional) The first certificate serial number from which to begin searching the CRL for expired certificates.
To locate expired certificates within a range both the starting certificate serial number and the ending certificate serial number must be specified.
endnumber
(Optional) The last certificate serial number that will be checked when searching the CRL for a range of expired certificates.
urlurl
(Optional) Specifies the location where the resulting list of expired certificates will be stored.
Command Default
All certificates in the specified certificate server database will be searched to locate expired certificates.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.4(20)T
This command was introduced.
Usage Guidelines
This command generates a list of expired certificates that are in the CRL for the specified certificate server. The resulting list of expired certificates may be used as input to the cryptopkiservertrim command to remove the listed certificates from the CRL resulting in trimming, or revoking, the expired certificates.
Only certificates that have accurate and complete information in the certificate database can be automatically added to the list of expired certificates and later trimmed from the database. Only CRL entries for expired certificates can be trimmed.
If there are a large number of certificates in your certificate database or if your certificate database is stored at a remote location, for example TFTP or SCP, you may limit the range of certificates to search by specifying both the starting and ending certificate serial numbers. If no starting and ending certificate serial numbers are specified, the entire certificate database will be searched and all expired certificates will be added to the expired certificates list.
A URL may be specified to save the list of expired certificates to a specified location. If no URL is specified, the list of expired certificates will be printed on your terminal. The list may then be cut and pasted to a file.
Examples
The following example shows both how to generate a list of expired certificates within the certificate serial number range 34-38 in the certificate database for the certificate server “mycs” and how to save the resulting list to an HTTP location:
Router#
crypto pki server mycs trim generate expired-list start 34 end 38 url http://databaselocation/expired-certs.1st
The following example shows the resulting list of expired certificates in the file expired-certs.1st:
# CRL Trimming file generated on 01/31/2008
version=1
35
37
Lines that begin with a pound sign (#) are inserted comments. The second line contains a version string indicating the file type. Each remaining line, in this example lines 35 and 37, contains a certificate serial number indicating one certificate to be removed from the CRL.
Related Commands
Command
Description
cryptopkiserver
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
cryptopkiservertrim
Trims certificates from the certificate revocation list.
crypto pki server unrevoke
To recover a revoked certificate, that is to remove a certificate from the certificate revocation list (CRL), use the cryptopkiserverunrevokecommand in privileged EXEC mode.
Name of the certificate server. The name must match the name specified via the cryptopkiserver command.
certificate-serial-number
Serial number of the certificate that is to be recovered. The serial number can be a hexadecimal number with the prefix “0x” (for example, 0x4c) or a decimal number (for example, 76).
Command Default
None.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.4(20)T
This command was introduced.
Usage Guidelines
If a certificate is erroneously revoked, either the client has to reenroll in the PKI or the administrator may recover the revoked certificate by issuing the cryptopkiserverunrevoke command. This command removes a certificate, specified by its serial number, from the CRL. The CRL is then resigned and can be republished.
Examples
The following examples show how to unrevoke a certificate with the serial number 76, or 0x4c in hexidecimal, from the certificate server “mycs”:
Router# crypto pki server mycs unrevoke 76
Router# crypto pki server mycs unrevoke 0x4c
Related Commands
Command
Description
cryptopkiserver
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
cyrptopkiserverrevoke
Revokes a certificate based on its serial number.
crypto pki token change-pin
To change the user PIN on the USB eToken, use the
cryptopkitokenchange-pin command in privileged EXEC mode.
cryptopkitokentoken-name [admin] change-pin [pin]
Syntax Description
token-name
Name of USB token specified via the
cryptopkitokenlogincommand.
admin
(Optional) The router will change the administrative PIN on the USB token. If this keyword is not issued, the router will change the user pin.
pin
(Optional) User PIN required to access the etoken.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
If you want to change the administrative PIN on the token, you must be logged into the eToken as an admin via thecryptopkitokenadminlogincommand.
After the user PIN has been changed, you must reset the login failure count to zero (via the
cryptopkitokenmax-retries command). The maximum number of allowable login failures is set (by default) to 15.
Examples
The following example shows that the user PIN was changed to 1234:
Sets the maximum number of allowed failed login attempts.
crypto pki token encrypted-user-pin
To encrypt a USB token PIN that is stored in private NVRAM, use the
cryptopkitokenencrypted-user-pin command in global configuration mode. To decrypt the token’s PIN, use the
no form of this command.
(Optional) Enables noninteractive command-line interface (CLI). If you do not issue this keyword, you will automatically be prompted for the passphrase.
Tip
Noninteractive CLI is provided for instances where users will not be responding to prompts, for example in scripts, configuration tools, or other automated processes.
If you are issuing this command from the console, it is recommended that you use the interactive CLI to help protect against observation from unauthorized persons.
Command Default
The PIN stored in private NVRAM is not encrypted.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(4)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco IOS Release 12.4(11)T and implemented on 7200VXR NPE-G2 platform.
15.0(1)M
This command was modified earlier than Cisco IOS Release 15.0(1)M. The
default keyword was added.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
After the token’s PIN is encrypted with the
cryptopkitokenencrypted-user-pincommand, no action is taken when you insert the token into the router. The user must log in to the router and enter the passphrase to decrypt the PIN before the router can use the PIN to log in to the token.
After the PIN has been successfully decrypted, the router will execute the configuration commands from the token at privilege level 15.
Tip
It is recommended that you create a passphrase different from the token’s PIN. Also, the user should log in to the token as a “normal user” (a privilege level 1 user), so the user cannot access commands that can alter the configuration of the router.
Examples
The following example shows the configuration of a user PIN and the encryption of that user PIN:
! Configure the user PIN.
Router(config)#
crypto pki token usbtoken0: user-pin
Enter password:
!
! Now, the user PIN can be encrypted.
!
Router(config)#
crypto pki token usbtoken0: encrypted-user-pin
Enter passphrase:
Router(config)#
exit
Router#
Router#
show running config
.
.
.
crypto pki token usbtoken0 user-pin *encrypted*
.
.
.
Related Commands
Command
Description
cryptopkitokenuser-pin
Creates a PIN that automatically allows the router to log in to the USB token at router startup.
privilege
Configures a new privilege level for users and associates commands with that privilege level.
crypto pki token label
To set or change the name of a USB token label, use the
cryptopkitokenlabel command in global configuration mode.
cryptopkitokendevice:labeltoken-label
Syntax Description
device:
Location or name of the USB device.
token-label
Specifies the label, or name, of the USB token.
token-label may be up to 31 alphanumeric characters in length, including dashes and underscores.
Command Default
No label is set. The USB token is known by its factory name.
Command Modes
Global configuration
Command History
Release
Modification
12.4(4)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
After you have logged in your USB token to the router, you may want to change the factory default label. Changing the default factory name to a unique name is useful when configuring multiple USB tokens for automatic login, secondary configuration files, or other token specific settings.
Note
Either the device name or label may be used to specify the USB token. If using the device name, it is followed by a colon, “:”.
Examples
The following example shows how to change the USB token label from the “oldlabel” to “newlabel” after the token has been logged in. The router will not use the “newlabel” until the next time the token is inserted or the router is reloaded:
(Optional) Enables the noninteractive command-line interface (CLI). If you do not issue this keyword, you will automatically be prompted for the passphrase.
Tip
The noninteractive CLI is provided for instances where users will not be responding to prompts, for example in scripts, configuration tools, or other automated processes.
If you are issuing this command from the console, it is recommended that you use the interactive CLI to help protect against observation from unauthorized persons.
Command Default
The token is not locked.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.4(4)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
After you have locked a token with the
cryptopkitokenlock command, all Rivest, Shamir, and Adelman (RSA) keys that have been loaded from the token will be deleted and, if configured, the secondary “unconfig” file will run with full privileges.
Examples
The following example shows how to reload a router, unlock the PIN, and then lock the PIN again:
Unlocks the token and decrypts the PIN that is stored in private NVRAM.
crypto pki token login
To log into the USB eToken, use the
cryptopkitokenlogin command in privileged EXEC mode.
cryptopkitokentoken-name [admin] login [pin]
Syntax Description
token-name
Name of USB eToken.
admin
(Optional) The router will attempt to log into the token as an administrator. If this keyword is not issued, the router will attempt to log into the token as a user.
Note
If you want to change the PIN via the
cryptopkitokenchange-pin command, you must issue this keyword.
pin
(Optional) User PIN required to access the token. If a user PIN is not specified, the default PIN, 1234567890, is used.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
This command allows you to manually log into a USB eToken. To automatically log into an eToken, issue the
cryptopkitokenuser-pin command, which allows you to create a PIN for automatic login.
Examples
The following example shows how to log into the USB eToken manually:
crypto pki token usbtoken0:login 1234567890
Related Commands
Command
Description
cryptopkitokenlogout
Logs the router out of the USB eToken.
crypto pki token logout
To log the router out of the USB eToken, use the
cryptopkitokenlogout command in privileged EXEC mode.
cryptopkitokentoken-namelogout
Syntax Description
token-name
Name of USB eToken specified via the
cryptopkitokenlogincommand.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
If you want to save any data to the USB eToken, you must log back into the eToken.
Examples
The following example shows how to successfully log out of a USB eToken:
crypto pki token usbtoken0:logout
Token eToken is usbtoken0
Token logout from usbtoken0(eToken) successful
*Jan 28 05:46:59.544:%CRYPTO-6-TOKENLOGOUT:Cryptographic Token eToken Logout Successful
Related Commands
Command
Description
cryptopkitokenlogin
Logs into the USB eToken.
crypto pki token max-retries
To set the maximum number of allowed failed login attempts, use the
cryptopkitokenmax-retriescommand in global configuration mode. To return to the default functionality (which is 15 failed login attempts), use the
no form of this command.
(Optional) Number of consecutive failed login attempts the router will allow before locking out the user. Available range: 0 to 15. Default value is 15.
Command Default
15 failed login attempts are allowed
Command Modes
Global configuration
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
After the user PIN is changed via the
cryptopkitokenchange-pincommand, the login failure count is automatically reset to 15; however, it is recommended that the login failure count be set to zero.
Examples
The following example shows how to change the allowed maximum number of failed login attempts to 20:
crypto pki token usbtoken0 max-retries 20
Related Commands
Command
Description
cryptopkitokenchange-pin
Changes the user PIN number on the USB eToken.
cryptopkitokenlogin
Logs into the USB eToken.
crypto pki token removal timeout
To set the time interval that the router waits before removing the Rivest, Shamir, and Adelman (RSA) keys that are stored in the eToken, use the
cryptopkitokenremovaltimeoutcommand in global configuration mode. To return to the default functionality (which is no timeout), use the
no form of this command.
Name of USB eToken that is being removed from the router.
default
Default value, which is automatic RSA key removal, is to be used.
seconds
(Optional) Time interval, in seconds, that the router waits before removing the RSA keys and tearing down IP Security (IPSec) tunnels associated with the specified eToken. Available range: 0 to 480.
Note
If a time interval is not specified, all RSA keys and associated tunnels are immediately torn down after the eToken is removed from the router.
Command Default
The default timeout is zero, which causes the RSA keys to be removed automatically after the eToken is removed from the router . The default appears in the running configuration as:
crypto pki token default removal timeout 0
Command Modes
Global configuration
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
After the eToken is removed from the router, you can clear from your router any RSA keys that were obtained from the eToken; all IPSec tunnels that used those RSA keys for authentication are also torn down. Both the keys and tunnels are immediately cleared unless otherwise specified via the
cryptopkitokenremovaltimeout command.
Although the RSA keys remain on the eToken, they can only be accessed with the correct PIN. Too many unsuccessful attempts to log into the eToken will disable the PIN and any further login attempts will be refused.
Note
The
no version of this command does not remove RSA keys from the router. To immediately remove RSA keys from the router, set the timeout value to zero.
Examples
The following example shows how to set the time that the router will wait before removing the RSA keys that are stored in the eToken after the eToken has been removed from the router:
crypto pki token usbtoken0 removal timeout 60
Related Commands
Command
Description
cryptopkitokenlogout
Logs the router out of the USB token.
crypto pki token max-retries
Sets the maximum number of allowed failed login attempts.
crypto pki token secondary config
To merge a specified file with the running configuration after the eToken is logged in to the router, use the
cryptopkitokensecondaryconfig command in global configuration mode. To remove the specified file, useno form of the command.
Name of USB eToken that will have its running configuration merged with the secondary configuration file.
default
Sets the default values for tokens.
file
(Optional) Name of the file that will be merged with the running configuration.
Note
The filename is relative to the eToken, so the name should not include a device name such as “usbtoken0:.”
Command Default
A secondary configuration file does not exist.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
15.0(1)M
This command was modified earlier than Cisco IOS Release 15.0(1)M. The
default keyword was added.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
Use the
cryptopkitokensecondaryconfig command if you want to merge, not overwrite, a file with the running configuration on the router. The secondary configuration is processed after the eToken is logged in to the router.
Examples
The following example shows how to merge the secondary configuration file “CONFIG1.CFG” with the current running configuration:
Creates a PIN that automatically allows the router to log into the USB eToken at router startup.
crypto pki token secondary unconfig
To specify a secondary “unconfig” file and its location for a USB token, use the
cryptopkitokensecondaryunconfig command in global configuration mode. To remove secondary configuration elements from the running configuration, use the
no form of this command.
(Optional) Name and location of the secondary configuration file.
Command Default
Secondary “unconfig” file will not be processed.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.4(4)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
15.0(1)M
This command was modified earlier than Cisco IOS Release 15.0(1)M. The
default keyword was added.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
Configuration files that exist on a USB token are called secondary configuration files. If you create and configure a secondary configuration file, it is executed after the token is logged in. The existence of a secondary configuration file is determined by the presence of a secondary configuration file option in the Cisco IOS configuration stored in NVRAM.
When the token is removed, logged out, or the removal timer (if set) expires, a separate “unconfig” file is processed to remove all secondary configuration elements from the running configuration. Secondary configuration and secondary “unconfig” files are executed at privilege level 15 and are not dependent on the level of the user logged in.
Examples
The following example shows a how a secondary “unconfig” file might be used to remove secondary configuration elements from the running config. For example, a secondary configuration file might be used to set up a public key infrastructure (PKI) trustpoint. A corresponding “unconfig” file, named mysecondaryunconfigfile.cfg, might contain the following command:
no crypto pki trustpoint token-tp
If the token were removed and the following commands executed, the trustpoint and associated certificates would be removed from the router’s running configuration:
(Optional) Enables the noninteractive command-line interface (CLI). If you do not issue this keyword, you will automatically be prompted for the passphrase.
Tip
The noninteractive CLI is provided for instances where users will not be responding to prompts, for example in scripts, configuration tools, or other automated processes.
Note
If you are issuing this command from the console, it is recommended that you use the interactive CLI to help protect against observation from unauthorized persons.
Command Default
USB token is not unlocked, or decrypted.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.4(4)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
After you unlock a token via the
cryptopkitokenunlock command, the Cisco IOS software will treat the token as if it is automatically logged into the router. Any Rivest, Shamir, and Adelman (RSA) keys on the token are loaded onto the router and the secondary configuration file on the token is executed (if a secondary configuration file has been configured by the user). Secondary configuration files are executed with full user privileges.
Examples
The following example shows the configuration and encryption of a user PIN and then that the router is reloading and the user PIN is being unlocked.
! Configuring the user PIN
Enter configuration commands, one per line. End with CNTL/Z.
Creates a PIN that automatically allows the router to log into the USB token at router startup.
crypto pki token user-pin
To create a PIN that automatically allows the router to log in to the USB eToken at router startup, use the
cryptopkitokenuser-pin command in global configuration mode. To remove the stored PIN from the configuration, use t he
no form of this command.
Name of USB eToken that the router will log in to.
default
Sets the default values for tokens.
user-pin
Specifies the PIN to access token.
pin
(Optional) User PIN required to log in to the eToken. The PINs are stored in private NVRAM. If a user PIN is not specified, the default PIN, 1234567890, will be used.
token-pin
(Optional) Token PIN name.
Command Default
If this command is not issued, the router cannot access the eToken.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.3(14)T
This command was introduced.
12.4(11)T
This command was integrated into the Cisco 7200VXR NPE-G2 platform.
15.0(1)M
This command was modified earlier than Cisco IOS Release 15.0(1)M. The
default keyword was added.
Cisco IOS XE Release 3.6
This command was integrated into Cisco IOS XE Release 3.6.
Usage Guidelines
After the eToken is plugged into the router, the router will use the specified PIN (or the default PIN if no PIN is specified) to automatically log in as the user.
Examples
The following example shows how to access the eToken via the user PIN “12345”:
crypto pki token usbtoken0 user-pin 12345
Related Commands
Command
Description
cryptopkilogin
Logs in to the USB eToken.
cryptopkitokenlogout
Logs the router out of the USB eToken.
crypto pki trustpoint
To declare the trustpoint that your router should use, use the cryptopkitrustpoint command in global configuration mode. To delete all identity information and certificates associated with the trustpoint, use the no form of this command.
cryptopkitrustpointnameredundancy
nocryptopkitrustpointname
Syntax Description
name
Creates a name for the trustpoint. (If you previously declared the trustpoint and just want to update its characteristics, specify the name you previously created.)
redundancy
(Optional) Specifies that the key, and any certificates associated with it, should be synchronized to the standby certificate authority (CA).
Command Default
Your router does not recognize any trustpoints until you declare a trustpoint using this command.
Your router uses unique identifiers during communication with
Online Certificate Status Protocol (
OCSP) servers, as configured in your network.
Command Modes
Global configuration
Command History
Release
Modification
12.2(8)T
The cryptocatrustpoint command was added.
12.2(15)T
The matchcertificate subcommand was introduced.
12.3(7)T
This command replaced the cryptocatrustpoint command. You can still enter the cryptocatrusted-root or cryptocatrustpoint command, but the command will be written in the configuration as “crypto pki trustpoint.”
12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(18)SXD.
12.3(14)T
The enrollmentselfsignedsubcommand was introduced.
12.4(4)T
The ocspdisable-nonce subcommand was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
15.0(1)M
This command was modified. The redundancykeyword was introduced.
Usage Guidelines
Declaring Truspoints
Use the cryptopkitrustpoint command to declare a trustpoint, which can be a self-signed root certificate authority (CA) or a subordinate CA. Issuing the cryptopkitrustpoint command puts you in ca-trustpoint configuration mode.
You can specify characteristics for the trustpoint using the following subcommands:
crl--Queries the certificate revocation list (CRL) to ensure that the certificate of the peer has not been revoked.
default(ca-trustpoint)--Resets the value of ca-trustpoint configuration mode subcommands to their defaults.
matchcertificate--Associates a certificate-based access control list (ACL) defined with the cryptocacertificatemapcommand.
ocspdisable-nonce--Specifies that your router will not send unique identifiers, or nonces, during OCSP communications
primary--Assigns a specified trustpoint as the primary trustpoint of the router.
root--Defines the TFTP to get the CA certificate and specifies both a name for the server and a name for the file that will store the CA certificate.
Specifying Use of Unique Identifiers
When using OCSP as your revocation method, unique identifiers, or nonces, are sent by default during peer communications with the OCSP server. The use of unique identifiers during OCSP server communications enables more secure and reliable communications. However, not all OCSP servers support the use of unique dentures, see your OCSP manual for more information. To disable the use of unique identifiers during OCSP communications, use the ocspdisable-nonce subcommand.
Examples
The following example shows how to declare the CA named ka and specify enrollment and CRL parameters:
crypto pki trustpoint ka enrollment url http://kahului:80
The following example shows a certificate-based ACL with the label Group defined in a cryptopkicertificatemap command and included in the matchcertificate subcommand of the cryptopkitrustpoint command:
crypto pki certificate map Group 10 subject-name co ou=WAN subject-name co o=Cisco!crypto pki trustpoint pki1 match certificate Group
The following example shows a self-signed certificate being designated for a trustpoint named local using the enrollment selfsigned subcommand of the crypto pki trustpoint command:
crypto pki trustpoint local enrollment selfsigned
The following example shows the unique identifier being disabled for OCSP communications for a previously created trustpoint named ts:
crypto pki trustpoint ts ocsp disable-nonce
The following example shows the redundancy keyword specified in the cryptopkitrustpoint command:
Router(config)#crypto pki trustpoint mytp
Router(ca-trustpoint)#redundancy
Router(ca-trustpoint)#show
redundancy
revocation-check crl
end
Related Commands
Command
Description
crl
Queries the CRL to ensure that the certificate of the peer has not been revoked.
default(ca-trustpoint)
Resets the value of a
ca-trustpoint
configuration subcommand to its default.
enrollment
Specifies the enrollment parameters of your CA.
enrollmenthttp-proxy
Accesses the CA by HTTP through the proxy server.
primary
Assigns a specified trustpoint as the primary trustpoint of the router.
root
Obtains the CA certificate via TFTP.
crypto pki trustpool import
To manually import (download) the certification authority (CA) certificate bundle into the public key infrastructure (PKI) trustpool to update or replace the existing CA bundle, use the
crypto pki trustpool import command in global configuration mode. To remove any of the configured parameters, use the
no form of this command.
Specifies the removal of the downloaded PKI trustpool certificates before the new certificates are downloaded. Use the optional
terminal keyword to remove the existing CA certificate bundle terminal setting or the
url keyword and
url argument to remove the URL file system setting.
terminal
Specifies the importation of a CA certificate bundle through the terminal (cut-and-paste) in Privacy Enhanced Mail (PEM) format.
urlurl
Specifies the importation of a CA certificate bundle through the URL.
Command Default
The PKI trustpool feature is enabled. The router uses the built-in CA certificate bundle in the PKI trustpool, which is updated automatically from Cisco.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.2(2)T
This command was introduced.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Usage Guidelines
Note
Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the
Next Generation Encryption (NGE) white paper.
PKI trustpool certificates are automatically updated from Cisco. When the PKI trustpool certificates are not current, use the
crypto pki trustpool import command to update them from another location.
The
url argument specifies or changes the URL file system of the CA. The table below lists the available URL file systems.
Table 7 URL File Systems
File System
Description
archive:
Imports from the archive file system.
cns:
Imports from the Cluster Namespace (CNS) file system.
disk0:
Imports from the disc0 file system.
disk1:
Imports from the disc1 file system.
ftp:
Imports from the FTP file system.
http:
Imports from the HTTP file system. The URL must be in the following formats:
http://CAname:80, where
CAname is the Domain Name System (DNS)
http://ipv4-address:80. For example: http://10.10.10.1:80.
http://[ipv6-address]:80. For example: http://[2001:DB8:1:1::1]:80. The IPv6 address is in hexadecimal notation and must be enclosed in brackets in the URL.
https:
Imports from the HTTPS file system. The URL must use the same formats as the HTTP: file system formats.
null:
Imports from the null file system.
nvram:
Imports from NVRAM file system.
pram:
Imports from Parameter Random-access Memory (PRAM) file system.
rcp:
Imports from the remote copy protocol (rcp) file system.
scp:
Imports from the secure copy protocol (scp) file system.
snmp:
Imports from the Simple Network Management Protocol (SNMP).
system:
Imports from the system file system.
tar:
Imports from the UNIX tar file system.
tftp:
Imports from the TFTP file system.
Note
The URL must be in the form: tftp://CAname/filespecification
tmpsys:
Imports from the Cisco IOS tmpsys file system.
unix:
Imports from the UNIX file system.
xmodem:
Imports from the xmodem simple file transfer protocol system.
ymodem:
Imports from the ymodem simple file transfer protocol system.
Examples
The following example shows how to remove all downloaded PKI trustpool CA certificates and subsequently update the CA certificates in the PKI trustpool by downloading a new CA certification bundle:
The following example shows how to update the CA certificates in the PKI trustpool by downloading a new CA certification bundle without removing all downloaded PKI trustpool CA certificates:
Configures the URL from which the PKI trustpool CA bundle is downloaded.
chain-validation
Enables chain validation from the peer's certificate to the root CA certificate in the PKI trustpool.
crl
Specifes the certificate revocation list (CRL) query and cache options for the PKI trustpool.
crypto pki trustpool policy
Configures PKI trustpool policy parameters.
default
Resets the value of a ca-trustpool configuration command to its default.
match
Enables the use of certificate maps for the PKI trustpool.
ocsp
Specifies OCSP settings for the PKI trustpool.
revocation-check
Disables revocation checking when the PKI trustpool policy is being used.
show
Displays the PKI trustpool policy of the router in ca-trustpool configuration mode.
show crypto pki trustpool
Displays the PKI trustpool certificates of the router and optionally shows the PKI trustpool policy.
source interface
Specifies the source interface to be used for CRL retrieval, OCSP status, or the downloading of a CA certificate bundle for the PKI trustpool.
storage
Specifies a file system location where PKI trustpool certificates are stored on the router.
vrf
Specifies the VRF instance to be used for CRL retrieval.
crypto pki trustpool policy
To configure a public key infrastructure (PKI) trustpool policy parameters, use the
crypto pki trustpool policy command in global configuration mode.
crypto pki trustpool policy
Syntax Description
This command has no arguments or keywords.
Command Default
The default PKI trustpool policy is used.
Command Modes
Global configuration mode (config)
Command History
Release
Modification
15.2(2)T
This command was introduced.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Usage Guidelines
The
crypto pki trustpool policy command enters ca-trustpool configuration mode where commands can be accessed to configure certificate authority (CA) PKI trustpool policy parameters.
Configures the URL from which the PKI trustpool CA bundle is downloaded.
chain-validation
Enables chain validation from the peer's certificate to the root CA certificate in the PKI trustpool.
crl
Specifes the CRL query and cache options for the PKI trustpool.
crypto pki trustpool import
Manually imports (downloads) the CA certificate bundle into the PKI trustpool to update or replace the existing CA bundle.
default
Resets the value of a ca-trustpool configuration command to its default.
match
Enables the use of certificate maps for the PKI trustpool.
ocsp
Specifies OCSP settings for the PKI trustpool.
revocation-check
Disables revocation checking when the PKI trustpool policy is being used.
show
Displays the PKI trustpool policy of the router in ca-trustpool configuration mode.
show crypto pki trustpool
Displays the PKI trustpool certificates of the router and optionally shows the PKI trustpool policy.
source interface
Specifies the source interface to be used for CRL retrieval, OCSP status, or the downloading of a CA certificate bundle for the PKI trustpool.
storage
Specifies a file system location where PKI trustpool certificates are stored on the router.
vrf
Specifies the VRF instance to be used for CRL retrieval.
crypto provisioning petitioner
To configure a device to become an easy secure device provisioning (SDP) petitioner and enter tti-petitioner configuration mode, use the cryptoprovisioningpetitionercommand in global configuration mode. To disable petitioner support, use the no form of this command.
cryptoprovisioningpetitioner
nocryptoprovisioningpetitioner
Syntax Description
This command has no arguments or keywords.
Command Default
A device (with a crypto image) is configured to be an SDP petitioner.
Command Modes
Global configuration
Command History
Release
Modification
12.3(8)T
The cryptowuittipetitionercommand was introduced.
12.3(14)T
This command replaced the cryptowuittipetitioner command.
Usage Guidelines
SDP uses Trusted Transitive Introduction (TTI) to easily deploy public key infrastructure (PKI) between two end devices. TTI, which is a communication protocol that provides a bidirectional introduction between two end entities, involves the following three entities:
Introducer--A mutually trusted device that introduces the petitioner to the registrar. The introducer can be a device user, such as a system administrator.
Petitioner--A new device that is joined to the secure domain.
Registrar--A server that authorizes the petitioner. The registrar can be a certificate server.
Note
Because the petitioner is enabled by default on the device, you only have to issue the cryptoprovisioningpetitioner command if you have previously disabled the petitioner or if you want to use an existing trustpoint instead of the automatically generated trustpoint.
Examples
After the SDP exchange is complete, the petitioner will automatically enroll with the registrar and obtain a certificate. The following sample output from the showrunning-config command shows an automatically generated configuration at the petitioner.
Note
The petitioner will not have any TTI-specific configuration in the beginning except that the IP HTTP server will be turned on and the Domain Name System (DNS) server needs to be properly configured.)
Configures a device to become an SDP registrar and enters tti-registrar configuration mode.
trustpoint(tti-petitioner)
Specifies the trustpoint that is to be associated with the TTI exchange between the SDP petitioner and the SDP registrar.
crypto provisioning registrar
To configure a device to become an easy secure device provisioning (SDP) registrar and enter tti-registrar configuration mode, use the cryptoprovisioningregistrarcommand in global configuration mode. To disable registrar support, use the no form of this command.
cryptoprovisioningregistrar
nocryptoprovisioningregistrar
Syntax Description
This command has no arguments or keywords.
Command Default
The registrar is not enabled.
Command Modes
Global configuration
Command History
Release
Modification
12.3(8)T
The cryptowuittiregistrarcommand was introduced.
12.3(14)T
This command replaced the cryptowuittiregistrar command.
Usage Guidelines
SDP uses Trusted Transitive Introduction (TTI) to easily deploy public key infrastructure (PKI) between two end devices. TTI, which is a communication protocol that provides a bidirectional introduction between two end entities, involves the following three entities:
Introducer--A mutually trusted device that introduces the petitioner to the registrar. The introducer can be a device user, such as a system administrator.
Petitioner--A new device that is joined to the secure domain.
Registrar--A server that authorizes the petitioner.
Although any device that contains a crypto image can be the registrar, it is recommended that the registrar be either a Cisco IOS certificate server registration authority (RA) or a Cisco IOS certificate server root.
Examples
The following sample output from the showrunning-configcommand verifies that the certificate server “cs1” was configured and associated with the TTI exchange between the registrar and petitioner:
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
crypto provisioningpetitioner
Configures a device to become an SDP petitioner and enters tti-petitioner configuration mode.
crypto vpn
To install a Cisco Secure Desktop (CSD) or Cisco AnyConnect VPN Client package file on a Secure Socket Layer VPN (SSL VPN) gateway for distribution to end users, use the
cryptovpn command in global configuration mode. To remove a package file from the SSL VPN gateway, use the
no form of this command.
Installs the specified file from the Cisco AnyConnect VPN Client package.
sequencesequence-number
Allows for multiple packages to be installed on one gateway. If the
sequencekeyword and the
sequence-numberargument are not configured, a sequence number of 1 is applied to the package.
profileprofile-namedevice:filename
Installs the profile of the Cisco AnyConnect VPN Client and the device into which the profile is imported.
csd
Installs the CSD package.
Command Default
Neither a CSD nor a Cisco AnyConnect VPN Client package file is installed on an SSL VPN gateway.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.2(1)T
This command was introduced.
Usage Guidelines
The CSD and Cisco AnyConnect VPN Client installation packages must first be copied to a local file system, such as disk, flash, or USB flash. The CSD and Cisco AnyConnect VPN Client software packages are pushed to end users as access is needed. The end user must have administrative privileges, and the Java Runtime Environment (JRE) for Windows version 1.4 or a later version must be installed before a CSD or Cisco AnyConnect VPN Client package can be installed.
Note
SSL VPN Client (SVC) is the predecessor of Cisco AnyConnect VPN Client software.
If you have not entered the
sequence keyword and the
sequence-number argument and you want to install another package, you can remove the previous package (using the
no form of the command) or you can provide another sequence number.
If you try to install a package with a sequence number that is being used, you will get an error message.
Examples
The following example shows how to install the Cisco AnyConnect VPN Client package on an SSL VPN gateway:
This command was replaced by the cryptoprovisioningpetitioner command effective with Cisco IOS Release 12.3(14)T.
To configure a device to become an easy secure device deployment (EzSDD) petitioner and enter tti-petitioner configuration mode, use the cryptowuittipetitionercommand in global configuration mode. To disable petitioner support, use the no form of this command.
cryptowuittipetitioner
nocryptowuittipetitioner
Syntax Description
This command has no arguments or keywords.
Command Default
A device (with a crypto image) is configured to be an EzSDD petitioner.
Command Modes
Global configuration
Command History
Release
Modification
12.3(8)T
This command was introduced.
Usage Guidelines
EzSDD uses Trusted Transitive Introduction (TTI) to easily deploy public key infrastructure (PKI) between two end devices. TTI, which is a communication protocol that provides a bidirectional introduction between two end entities, involves the following three entities:
Introducer--A mutually trusted device that introduces the petitioner to the registrar. The introducer can be a device user, such as a system administrator.
Petitioner--A new device that is joined to the secure domain.
Registrar--A server that authorizes the petitioner. The registrar can be a certificate server.
Note
Because the petitioner is enabled by default on the device, you only have to issue the cryptowuittipetitioner command if you have previously disabled the petitioner or if you want to use an existing trustpoint instead of the automatically generated trustpoint.
Examples
After the EzSDD exchange is complete, the petitioner will automatically enroll with the registrar and obtain a certificate. The following sample output from the showrunning-config command shows an automatically generated configuration at the petitioner. (Note that petitioner will not have any TTI-specific configuration in the beginning except that the http server will be turned on and the Domain Name System (DNS) server needs to be properly configured.)
Configures a device to become an EzSDD registrar and enters tti-registrar configuration mode.
trustpoint(tti-petitioner)
Specifies the trustpoint that is to be associated with the TTI exchange between the EzSDD petitioner and the EzSDD registrar.
crypto wui tti registrar
Note
This command was replaced by the cryptoprovisioningregistrar command effective with Cisco IOS Release 12.3(14)T.
To configure a device to become an easy secure device deployment (EzSDD) registrar and enter tti-registrar configuration mode, use the cryptowuittiregistrarcommand in global configuration mode. To disable registrar support, use the no form of this command.
cryptowuittiregistrar
nocryptowuittiregistrar
Syntax Description
This command has no arguments or keywords.
Command Default
The registrar is not enabled.
Command Modes
Global configuration
Command History
Release
Modification
12.3(8)T
This command was introduced.
Usage Guidelines
EzSDD uses Trusted Transitive Introduction (TTI) to easily deploy public key infrastructure (PKI) between two end devices. TTI, which is a communication protocol that provides a bidirectional introduction between two end entities, involves the following three entities:
Introducer--A mutually trusted device that introduces the petitioner to the registrar. The introducer can be a device user, such as a system administrator.
Petitioner--A new device that is joined to the secure domain.
Registrar--A server that authorizes the petitioner.
Although any device that contains a crypto image can be the registrar, it is recommended that the registrar be either a Cisco IOS certificate server registration authority (RA) or a Cisco IOS certificate server root.
Examples
The following sample output from the showrunning-configcommand verifies that the certificate server “cs1” was configured and associated with the TTI exchange between the registrar and petitioner:
Enables a Cisco IOS certificate server and enters certificate server configuration mode.
cryptowuittipetitioner
Configures a device to become an EzSDD petitioner and enters tti-petitioner configuration mode.
crypto xauth
To configure crypto Extended Authentication (xauth) parameters globally on a per-interface basis, use the cryptoxauthcommand in global configuration mode. To disable the xauth parameters, use the no form of this command.
cryptoxauthinterface-nameinterface-number
nocryptoxauthinterface-nameinterface-number
Syntax Description
interface-name
Name of the interface.
interface-number
Number of the related interface. Each interface has a related range of numbers. For example, the asynchronous interface has a range of interface numbers from 1 to 5 and the BVI interface has a range of interface numbers from 1 to 255.
Command Default
Crypto xauth parameters are not configured on any interface.
Command Modes
Global configuration (config)
Command History
Release
Modification
15.0(1)M
This command was introduced in a release earlier than Cisco IOS 15.0(1)M.
Usage Guidelines
This command is mainly used on responders.
This command is used to disable the negotiation of xauth capabilities during proposals for a session that is terminating on a specific interface.
The nocryptoxauth command enables the negotiation of xauth capabilities.
Examples
The following example shows how to enable crypto xauth parameters globally on a per-interface basis:
The following example shows how the nocryptoxauth command uses the nonvolatile generation (NVGEN) process to perform a configuration state retrieval operation when you specify the showruncommand:
Router> enable
Router# configure terminal
Router(config)# no crypto xauth fastethernet 0/1
Router# show run
archive
log config
hidekeys
!
redundancy
!
!
!
no crypto xauth Ethernet0/0
Related Commands
Command
Description
cryptokeydecryptrsa
Deletes the encrypted RSA key and leaves only the unencrypted key on the running router.
csd enable
To enable Cisco Secure Desktop (CSD) support for SSL VPN sessions, use the csdenable command in webvpn context configuration mode. To remove CSD support from the SSL VPN context configuration, use the no form of this command.
csdenable
nocsdenable
Syntax Description
This command has no keywords or arguments.
Command Default
CSD support is not enabled.
Command Modes
Webvpn context configuration
Command History
Release
Modification
12.4(6)T
This command was introduced.
Usage Guidelines
The CSD software installation package must be present in a local file system, such as flash memory, and it must be cached for distribution to end users (remote PC or networking device). The webvpninstallcommand is used to install the software installation package to the distribution cache.
Examples
The following example enables CSD support for SSL VPN sessions:
Enters webvpn context configuration mode to configure the SSL VPN context.
webvpninstall
Installs a CSD or SSL VPN client package file to a SSL VPN gateway for distribution to end users.
ctcp port
To set the port number for Cisco Tunneling Control Protocol (cTCP) encapsulation for Easy VPN, use the ctcpport command in crypto ipsec client ezvpn configuration mode. To disable the port that was configured, use the no form of this command.
ctcpportport-number
noctcpport
Syntax Description
port-number
Port number. Value = 1 through 65535.
Command Default
If a port is not specified, the default port is the port on which the cTCP server listens.
To preauthenticate calls on the basis of the call type, use the
ctype command in AAA preauthentication configuration mode. To remove the
ctype command from your configuration, use the
no form of this command.
ctype
[ if-avail | required ]
[accept-stop]
[ passwordpassword ]
[ digital | speech | v .110 | v .120 ]
noctype
[ if-avail | required ]
[accept-stop]
[ passwordpassword ]
[ digital | speech | v .110 | v .120 ]
Syntax Description
if-avail
(Optional) Implies that if the switch provides the data, RADIUS must be reachable and must accept the string in order for preauthentication to pass. If the switch does not provide the data, preauthentication passes.
required
(Optional) Implies that the switch must provide the associated data, that RADIUS must be reachable, and that RADIUS must accept the string in order for preauthentication to pass. If these three conditions are not met, preauthentication fails.
accept-stop
(Optional) Prevents subsequent preauthentication elements such as clid or dnis from being tried once preauthentication has succeeded for a call element.
passwordpassword
(Optional) Defines the password for the preauthentication element.
digital
(Optional) Specifies “digital” as the call type for preauthentication.
speech
(Optional) Specifies “speech” as the call type for preauthentication.
v.110
(Optional) Specifies “v.110” as the call type for preauthentication.
v.120
(Optional) Specifies “v.120” as the call type for preauthentication.
Command Default
The
if-avail and
required keywords are mutually exclusive. If the
if-avail keyword is not configured, the preauthentication setting defaults to
required.
The default password string is cisco.
Command Modes
AAA preauthentication configuration
Command History
Release
Modification
12.1(2)T
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
You may configure more than one of the AAA preauthentication commands (clid,
ctype,
dnis) to set conditions for preauthentication. The sequence of the command configuration decides the sequence of the preauthentication conditions. For example, if you configure
dnis, then
clid, then
ctype, in this order, then this is the order of the conditions considered in the preauthentication process.
In addition to using the preauthentication commands to configure preauthentication on the Cisco router, you must set up the preauthentication profiles on the RADIUS server.
Set up the RADIUS preauthentication profile with the call type string as the username and with the password that is defined in the
ctype command as the password. The table below shows the call types that you may use in the preauthentication profile.
Table 8 Preauthentication Call Types
Call Type String
ISDN Bearer Capabilities
digital
Unrestricted digital, restricted digital.
speech
Speech, 3.1 kHz audio, 7 kHz audio.
v.110
Anything with V.110 user information layer.
v.120
Anything with V.120 user information layer.
Examples
The following example specifies that incoming calls be preauthenticated on the basis of the call type:
aaa preauth
group radius
ctype required
Related Commands
Command
Description
clid
Preauthenticates calls on the basis of the CLID number.
dnis(RADIUS)
Preauthenticates calls on the basis of the DNIS number.
dnisbypass(AAApreauthenticationconfiguration)
Specifies a group of DNIS numbers that will be bypassed for preauthentication.
group(RADIUS)
Specifies the AAA RADIUS server group to use for preauthentication.
cts authorization list network
To specify a list of AAA servers for the Cisco TrustSec (CTS) seed device to use, use the
cts authorization list network command in global configuration mode. To stop using the list during authentication, use the
no form of this command.
cts authorization list networkserver_list
no cts authorization list networklist-name
Syntax Description
list-name
Specifies a Cisco TrustSec AAA server group.
Command Default
No CTS AAA server list is specified.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SXI3
This command was introduced on the Catalyst 6500 series switches.
15.2(2)T
This command was integrated into Cisco IOS Release 15.2(2)T.
Usage Guidelines
A CTS AAA server list is specified in order to establish CTS credentials so that CTS works on your router that is acting as a seed device.
This command is only for the seed device. Non-seed devices obtain the CTS AAA server list from their CTS authenticator peer as a component of their TrustSec environment data. This server list is created by the
aaa authorization networklist-namegroup radius command.
Examples
The following example shows how to specify a list of AAA servers for a CTS seed device:
Displays RADIUS server configurations for CTS seed devices.
cts credentials
To specify the Cisco TrustSec (CTS) ID and password of the network device, use the
cts credentials command in privileged EXEC mode. To delete the CTS credentials, use the
clear cts credentials command.
cts credentials idcts-idpasswordcts-pwd
Syntax Description
cts-id
The CTS device ID for this device used when authenticating with other CTS devices with EAP-FAST. This argument has a maximum length of 32 characters and is case sensitive.
passwordcts-pwd
Specifies the password for this device to use when authenticating with other CTS devices with EAP-FAST.
Command Default
No CTS credentials are specified.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.2(33)SXI
This command was introduced on the Catalyst 6500 series switches.
15.2(2)T
This command was integrated into Cisco IOS Release 15.2(2)T.
Usage Guidelines
CTS requires each device in the network to identity itself uniquely. For use in TrustSec Network Device Admission Control (NDAC) authentication, the
ctscredentials command specifies the Cisco TrustSec device ID and password for this switch to use when authenticating with other Cisco TrustSec devices with EAP-FAST. The CTS credentials state retrieval is not performed by the nonvolatile generation process (NVGEN) because the CTS credential information is saved in the keystore, not in the startup-config. The device can be assigned a CTS identity by the Cisco Secure Access Control Server (ACS), or auto-generate a new password when prompted to do so by the ACS. Those credentials are stored in the keystore, eliminating the need to save the running-config. To display the CTS device ID, use the
showctscredentials command. The stored password is never displayed.
To change the device ID or the password, reenter the command. To clear the keystore, use the
clearctscredentials command.
Note
When the CTS device ID is changed, all Protected Access Credentials (PACs) are flushed from the keystore because the PACs are associated with the old device ID and are not valid for a new identity.
Examples
The following example configures himalaya and cisco as the CTS device ID and password:
Router# cts credentials id himalaya password cisco
CTS device ID and password have been inserted in the local keystore. Please make sure that the same ID and password are configured in the server database.
The following example changes the CTS device ID and password to atlas and cisco123:
Router# cts credentials id atlas password cisco123
A different device ID is being configured.
This may disrupt connectivity on your CTS links.
Are you sure you want to change the Device ID? [confirm] y
TS device ID and password have been inserted in the local keystore. Please make sure that the same ID and password are configured in the server database.
The following example displays the CTS device ID and password state:
Router# show cts credentials
CTS password is defined in keystore, device-id = atlas
Related Commands
Command
Description
clearctscredentials
Clears the CTS device ID and password.
showctscredentials
Displays the state of the current CTS device ID and password.
showctskeystore
Displays contents of the hardware and software keystores.
cts dot1x
Use the
cts dot1x command in interface configuration mode to enable Network Device Admission Control (NDAC) and configure NDAC authentication parameters. Use the
no form of the command to disable NDAC authentication on the interface.
cts dot1x
no cts dot1x
Syntax Description
This command has no arguments or keywords.
Command Default
CTS dot1x configuration on the interface is disabled by default.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
12.2(33)SXI3
This command was introduced on the Catalyst 6500 series switches.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)SY.
Usage Guidelines
Once the
cts dot1x command is specified, CTS dot1x interface configuration mode (config-if-cts-dot1x) is entered where Cisco TrustSec NDAC parameters can be configured. Cisco TrustSec NDAC is enabled when the interface is enabled. Cisco TrustSec NDAC must be enabled with 802.1X on each uplink interface that connects to another Cisco TrustSec device.
Examples
Device# configure terminal
Device(config)# interface gigabitethernet 3/1
Device(config-if)# cts dot1x
Device(config-if-cts-dot1x)# sap mode-list gcm null no-encap
Device(config-if-cts-dot1x)# timer reauthentication 43200
Device(config-if-cts-dot1x)# exit
Device(config-if)# no shutdown
Device(config-if)# end
Device#
Related Commands
Command
Description
propagate sgt (config-if-cts-dot1x)
Enables Security Group Tag (SGT) propagation on a Cisco TrustSec (CTS) 802.1X interface.
sap mode-list (config-if-cts-dot1x)
Configures CTS Security Association Protocol (SAP) authentication.
show cts interface
Displays CTS interface status and configurations.
show dot1x interface
Displays IEEE 802.1x configurations and statistics.
timer reauthentication (config-if-cts-dot1x)
Configures the reauthentication timer for a CTS device.
cts manual
To manually enable an interface for Cisco TrustSec Security (CTS), use the
cts manual command in interface configuration mode.
cts manual
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
4.1(2)
This command was introduced on the Cisco Nexus 7000 series switches.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
15.1(3)S
This command was integrated into Cisco IOS Release 15.1(3)S.
Usage Guidelines
When the
cts manual command is entered, CTS is enabled on the interface and CTS manual interface configuration mode is entered where CTS parameters can be configured.
All CTS configuration commands with VRF parameters require that the named VRF exists. If the VRF is removed, then the associated CTS configuration is also removed.
Examples
The following example shows how to enter CTS manual interface configuration mode on an interface:
Enables Security Group Tag (SGT) propagation at Layer 2 on Cisco TrustSec Security (CTS) interfaces.
show cts interface
Displays information about CTS interfaces.
cts role-based
enforcement
To enable
role-based access control globally and on specific Layer 3 interfaces using
Cisco TrustSec, use the
cts role-based
enoforcement command in global configuration mode and interface
configuration mode respectively. To disable the enforcement of role-based
access control at an interface level, use the
no form of
this command.
cts role-based enforcement
no cts role-based enforcement
Syntax Description
This command has
no keywords or arguments.
Command Default
Enforcement of
role-based access control at an interface level is disabled globally.
Command Modes
Global configuration (config)
Interface configuration (config-if)
Command History
Release
Modification
15.1(2)SY
This
command was introduced.
Usage Guidelines
The
cts role-based
enforcement command in global configuration mode enables
role-based access control globally. Once role-based access control is enabled
globally, it is automatically enabled on every Layer 3 interface on the device.
To disable role-based access control on specific Layer 3 interfaces, use the
no form of
the command in interface configuration mode. The
cts role-based
enforcement command in interface configuration mode enables
enforcement of role-based access control on specific Layer 3 interfaces.
The
attribute-based access control list organizes and manages the Cisco TrustSec
access control on a network device. The security group access control list
(SGACL) is a Layer 3-4 access control list to filter access based on the value
of the security group tag (SGT). The filtering usually occurs at an egress port
of the Cisco TrustSec domain. The terms role-based access control list (RBACL)
and SGACL can be used interchangeably, and they refer to a topology-independent
ACL used in an attribute-based access control (ABAC) policy model.
Examples
The following
example shows how to enable role-based access control on a Gigabit Ethernet
interface:
To manually map a source IP address to a Security Group Tag (SGT) on either a host or a VRF, use the
cts role-based sgt-map interface
command in global configuration mode. Use the
no form of the command to remove the mapping.
Specifies the type of interface. For example, ethernet. The specified SGT is mapped to traffic from this logical or physical Layer 3 interface.
slot/port
Specifies the interface slot and port number.
sgtsgt-number
Specifies the SGT number from 0-65535.
Command Default
None
Command Modes
Global configuration (config)
Command History
Release
Modification
15.0(0)SY
This command was introduced on the Catalyst 6500 series switches.
15.1(1)SY
This command was integrated into Cisco IOS Release 15.1(1)Y.
15.3(2)T
This command was integrated into Cisco IOS Release 15.3(2)T.
Usage Guidelines
The
cts role-based sgt-map interface command binds a specified Layer 3 logical interface to a security group name or to an SGT. A security group information table that maps SGTs to security group names is downloaded from the authentication server with the TrustSec environment data. The
cts role-based sgt-map interface security-group command is rejected if a security group name table is not available.
Whenever a security group table is downloaded for the first time or refreshed, all L3IF mappings are reprocessed. IP-SGT bindings are added, updated, or deleted for all network prefixes that have output paths through the specified interface.
Note
The interface keyword is not supported on the Cisco ASR 1000 series routers.
When configuring this command on a Cisco ASR 1000 series router, use the following syntax: cts role-based sgt-map {ipv4-address | ipv6-address | host-ip-address | vrf} {security-group | sgt} sgt-number.
Examples
The following example shows how to manually map a source IP address to an SGT on a Catalyst 6500 series switch:
To enter the Cisco
TrustSec Security Group Tag (SGT) Exchange Protocol (CTS-SXP) peer IP address,
to specify if a password is used for the peer connection, to specify the global
hold-time period for a listener or speaker device, and to specify if the
connection is bidirectional, use the
ctssxpconnectionpeer command in global configuration mode. To
remove these configurations for a peer connection, use the
no form of this
command.
Specifies
that an SXP password is used for the peer connection.
default
Specifies
that the default SXP password is used.
none
Specifies
no password is used.
mode
Specifies either the local or peer SXP connection mode.
local
Specifies that the SXP connection mode refers to the local
device.
peer
Specifies that the SXP connection mode refers to the peer
device.
listener
(Optional) Specifies that the device is the listener in the connection.
speaker
(Optional) Specifies that the device is the speaker in the connection.
hold-timeminimum-timemaximum-time
(Optional) Specifies the hold-time period, in seconds, for the device. The range for minimum and maximum time is from 0 to 65535.
A
maximum-time value is required only when you use
the following keywords:
peer speaker
and
local
listener. In other instances, only a
minimum-time value is required.
Note
If both minimum and maximum times are required, the
maximum-time value must be greater than or equal
to the
minimum-time value.
vrfvrf-name
(Optional) Specifies the virtual routing and forwarding (VRF) instance name to
the peer.
both
(Optional) Specifies that the device is both the speaker and the listener in
the bidirectional SXP connection.
Command Default
The CTS-SXP peer
IP address is not configured and no CTS-SXP peer password is used for the peer
connection.
The default
setting for a CTS-SXP connection password is
none.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SXI3
This
command was introduced on the Catalyst 6500 series switches.
12.2(50)SG7
This
command was integrated on the Catalyst 4000 series switches.
12.2(53)SE2
This
command was integrated into Cisco IOS Release 12.2(53)SG7 on the Catalyst
3750(E) and 3560(E) series switches.
Cisco
IOS XE Release 3.4S
This
command was integrated into Cisco IOS XE Release 3.4S.
15.1(3)S
This
command was integrated into Cisco IOS Release 15.1(3)S.
15.3(2)T
This command was modified. The
hold-time keyword and
minimum-time and maximum-time arguments were
added.
Cisco
IOS XE Release 3.11S
This command was modified. The
both keyword was added.
15.4(1)T
This command was modified. The
both keyword was added.
Usage Guidelines
When a CTS-SXP
connection to a peer is configured with the
ctssxpconnectionpeer command, only the connection mode can be
changed. The
vrf keyword
is optional. If a VRF name is not provided or a VRF name is provided with the
default
keyword, then the connection is set up in the default routing or forwarding
domain.
A
hold-timemaximum-period value is required only when you use
the following keywords:
peer speaker
and
local
listener. In other instances, only a
hold-timeminimum-period value is required.
Note
The
maximum-period value must be greater than or equal
to the
minimum-period value.
Use the
both keyword
to configure a bidirectional SXP connection. With the support for
bidirectional SXP configuration, a peer can act as both a speaker and a
listener and propagate SXP bindings in both directions using a single
connection.
Examples
The following
example shows how to enable CTS-SXP and configure the CTS-SXP peer connection
on Device_A, a speaker, for connection to Device_B, a listener:
You can also
configure both peer and source IP addresses for an SXP connection. The source
IP address specified in the
cts sxp
connection command overwrites the default value.
Configures the Cisco TrustSec SXP default password.
ctssxpdefaultsource-ip
Configures the Cisco TrustSec SXP source IPv4 address.
ctssxpenable
Enables
Cisco TrustSec SXP on a device.
ctssxplog
Enables
logging for IP-to-SGT binding changes.
ctssxpreconciliation
Changes
the Cisco TrustSec SXP reconciliation period.
ctssxpretry
Changes
the Cisco TrustSec SXP retry period timer.
ctssxpspeakerhold-time
Configures the global hold-time period of a speaker device
in a Cisco TrustSec SGT SXPv4 network.
ctssxplistenerhold-time
Configures the global hold-time period of a listener device
in a Cisco TrustSec SGT SXPv4 network.
showctssxp
Displays the status of all Cisco TrustSec SXP configurations.
cts sxp default password
To specify the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (CTS-SXP) default password, use the
ctssxpdefaultpassword command in global configuration mode. To remove the CTS-SXP default password, use the
no form of this command.
Specifies that an unencrypted CTS-SXP default password follows. The maximum password length is 32 characters.
6encrypted-key
Specifies that a 6 encryption type password is used as the CTS-SXP default password. The maximum password length is 32 characters.
7encrypted-key
Specifies that a 7 encryption type password is used as the CTS-SXP default password. The maximum password length is 32 characters.
cleartext-pwd
Specifies a cleartext CTS-SXP default password. The maximum password length is 32 characters.
Command Default
Type
0 (cleartext)
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SXI3
This command was introduced on the Catalyst 6500 series switches.
12.2(50)SG7
This command was integrated on the Catalyst 4000 series switches.
12.2(53)SE2
This command was integrated into Cisco IOS Release 12.2(53)SG7 on the Catalyst 3750(E) and 3560(E) series switches.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
15.1(3)S
This command was integrated into Cisco IOS Release 15.1(3)S.
Usage Guidelines
The
ctssxpdefaultpassword command sets the CTS-SXP default password to be optionally used for all CTS-SXP connections configured on the device. The CTS-SXP password can be cleartext, or encrypted with the
0,
7,
6 encryption type keywords. If the encryption type is 0, then an unencrypted cleartext password follows.
Examples
The following example shows how to enable CTS-SXP and configure the CTS-SXP peer connection on Router_A, a speaker, for connection to Router_B, a listener:
Enters the CTS-SXP peer IP address and specifies if a password is used for the peer connection.
ctssxpdefaultsource-ip
Configures the CTS-SXP source IPv4 address.
ctssxpenable
Enables CTS-SXP on a device.
ctssxplog
Enables logging for IP-to-SGT binding changes.
ctssxpreconciliation
Changes the CTS-SXP reconciliation period.
ctssxpretry
Changes the CTS-SXP retry period timer.
showctssxp
Displays the status of all SXP configurations.
cts sxp default source-ip
To configure the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (CTS-SXP) source IPv4 address, use the
ctssxpdefaultsource-ip command in global configuration mode. To remove the CTS-SXP default source IP address, use the
no form of this command.
ctssxpdefaultsource-ipipv4-address
noctssxpdefaultsource-ipipv4-address
Syntax Description
ip-address
Default source CTS-SXP IPv4 address.
Command Default
The CTS-SXP source IP address is not configured.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SXI3
This command was introduced on the Catalyst 6500 series switches.
12.2(50)SG7
This command was integrated on the Catalyst 4000 series switches.
12.2(53)SE2
This command was integrated into Cisco IOS Release 12.2(53)SG7 on the Catalyst 3750(E) and 3560(E) series switches.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
15.1(3)S
This command was integrated into Cisco IOS Release 15.1(3)S.
Usage Guidelines
The
ctssxpdefaultsource-ip command sets the default source IP address that CTS-SXP uses for all new TCP connections where a source IP address is not specified. Preexisting TCP connections are not affected when this command is entered. CTS-SXP connections are governed by three timers:
Retry timer
Delete Hold Down timer
Reconciliation timer
Examples
The following example shows how to enable CTS-SXP and configure the CTS-SXP peer connection on Router_A, a speaker, for connection to Router_B, a listener:
Enters the CTS-SXP peer IP address and specifies if a password is used for the peer connection.
ctssxpdefaultpassword
Configures the CTS-SXP default password.
ctssxpenable
Enables CTS-SXP on a device.
ctssxplog
Enables logging for IP-to-SGT binding changes.
ctssxpreconciliation
Changes the CTS-SXP reconciliation period.
ctssxpretry
Changes the CTS-SXP retry period timer.
showctssxp
Displays the status of all SXP configurations.
cts sxp enable
To enable the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (CTS-SXP) on a device, use the
ctssxpenable command in global configuration mode. To disable the CTS-SXP on a device, use the
no form of this command.
ctssxpenable
noctssxpenable
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SXI3
This command was introduced on the Catalyst 6500 series switches.
12.2(50)SG7
This command was integrated on the Catalyst 4000 series switches.
12.2(53)SE2
This command was integrated into Cisco IOS Release 12.2(53)SG7 on the Catalyst 3750(E) and 3560(E) series switches.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
15.1(3)S
This command was integrated into Cisco IOS Release 15.1(3)S.
Usage Guidelines
The
cts sxp enable command enables CTS-SXP over a TCP (SXP) connection. CTS-SXP propagates IP-to-SGT binding information across network devices that do not have the capability to tag packets, which allows security services on switches, routers or firewalls to learn identity information from devices that access the network.
Examples
The following example shows how to enable CTS-SXP and configure the SXP peer connection on Router_A, a speaker, for connection to Router_B, a listener:
Enters the CTS-SXP peer IP address and specifies if a password is used for the peer connection.
ctssxpdefaultpassword
Configures the CTS-SXP default password.
ctssxpdefaultsource-ip
Configures the CTS-SXP source IPv4 address.
ctssxplog
Enables logging for IP-to-SGT binding changes.
ctssxpreconciliation
Changes the CTS-SXP reconciliation period.
showctssxp
Displays the status of all CTS-SXP configurations.
ctssxpretry
Changes the CTS-SXP retry period timer.
cts sxp log binding-changes
To enable logging for IP-to-Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (CTS-SXP) binding changes, use the
cts sxp log binding-changes command in global configuration mode. To disable logging, use the
no form of this command.
ctssxplogbinding-changes
noctssxplogbinding-changes
Command Default
Logging disabled.
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SXI3
This command was introduced on the Catalyst 6500 series switches.
12.2(50)SG7
This command was integrated on the Catalyst 4000 series switches.
12.2(53)SE2
This command was integrated into Cisco IOS Release 12.2(53)SG7 on the Catalyst 3750(E) and 3560(E) series switches.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
15.1(3)S
This command was integrated into Cisco IOS Release 15.1(3)S.
Usage Guidelines
The
cts sxp log binding-changes command enables logging for IP-to-SGT binding changes. SXP syslogs (sev 5 syslogs) are generated whenever IP address-to-SGT binding occurs (add, delete, change). These changes are learned and propagated on the SXP connection.
Related Commands
Command
Description
ctssxpconnectionpeer
Enters the CTS-SXP peer IP address and specifies if a password is used for the peer connection
ctssxpdefaultpassword
Configures the CTS-SXP default password.
ctssxpdefaultsource-ip
Configures the CTS-SXP source IPv4 address.
ctssxpenable
Enables CTS-SXP on a device.
ctssxpreconciliation
Changes the CTS-SXP reconciliation period.
ctssxpretry
Changes the CTS-SXP retry period timer.
showctssxp
Displays status of all SXP configurations.
cts sxp mapping network-map
To configure the subnet to Security Group Tag (SGT) mapping host count constraint to limit the number of subnet bindings SXPv3 can export, use the
cts sxp mapping network-map command in global configuration mode. To return to the default, use the
no form of this command.
cts sxp mapping network-mapbindings
Syntax Description
bindings
Specifies the maximum number of subnet IP hosts from 0 to 65,535 that can be bound to SGTs and exported to the SXP listener.
Command Default
The default is 0 (no expansions performed).
Command Modes
Global configuration (config)
Command History
Release
Modification
15.1(1)SY
This command was introduced.
Usage Guidelines
In IPv4 networks, SXPv3, and more recent versions, can receive and parse subnet network address/prefix strings from SXPv3 peers. Earlier SXP versions convert the subnet prefix into its set of host bindings before exporting them to an SXP listener peer.
For example, the IPv4 subnet 198.1.1.0/29 is expanded as follows (only 3 bits for host addresses):
Host addresses 198.1.1.1 to 198.1.1.7 are tagged and propagated to SXP peer.
Network and broadcast addresses 198.1.1.0 and 198.1.1.8 are not tagged and not propagated.
Subnet bindings are static, which means that active hosts are not learned. They can be used locally for SGT imposition and SGACL enforcement. Packets tagged by subnet to SGT mapping can be propagated on Layer 2 or Layer 3 TrustSec links.
Note
For IPv6 networks, SXPv3 cannot export subnet bindings to SXPv2 or SXPv1 peers.
Manually maps a source IP address to a SGT on either a host or a VRF.
cts sxp reconciliation period
To change the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (CTS-SXP) reconciliation period, use the
ctssxpreconciliation period command in global configuration mode. To return the CTS-SXP reconciliation period to its default value, use the
no form of this command.
ctssxpreconciliationperiodseconds
noctssxpreconciliationperiodseconds
Syntax Description
seconds
CTS-SXP reconciliation timer in seconds. The range is from 0 to 64000. The default is 120.
Command Default
120 seconds (2 minutes)
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SXI3
This command was introduced on the Catalyst 6500 series switches.
12.2(50)SG7
This command was integrated on the Catalyst 4000 series switches.
12.2(53)SE2
This command was integrated into Cisco IOS Release 12.2(53)SG7 on the Catalyst 3750(E) and 3560(E) series switches.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
15.1(3)S
This command was integrated into Cisco IOS Release 15.1(3)S.
Usage Guidelines
After a peer terminates a CTS-SXP connection, an internal Delete Hold-down timer starts. If the peer reconnects before the Delete Hold-down timer expires, then the CTS-SXP Reconciliation timer starts. While the CTS-SXP Reconciliation period timer is active, the CTS-SXP software retains the SGT mapping entries learned from the previous connection and removes invalid entries. Setting the SXP reconciliation period to 0 seconds disables the timer and causes all entries from the previous connection to be removed.
Related Commands
Command
Description
ctssxpconnectionpeer
Enters the CTS-SXP peer IP address and specifies if a password is used for the peer connection.
ctssxpdefaultpassword
Configures the CTS-SXP default password.
ctssxpdefaultsource-ip
Configures the CTS-SXP source IPv4 address.
ctssxpenable
Enables CTS-SXP on a device.
ctssxplog
Turns on logging for IP to SGT binding changes.
ctssxpretry
Changes the CTS-SXP retry period timer.
showctssxp
Displays status of all CTS-SXP configurations.
cts sxp retry period
To change the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (CTS-SXP) retry period timer, use the
ctssxpretryperiod command in global configuration mode. To return the CTS-SXP retry period timer to its default value, use the
no form of this command.
ctssxpretryperiodseconds
noctssxpretryperiodseconds
Syntax Description
seconds
CTS-SXP retry timer in seconds. The range is from 0 to 64000. The default is 120.
Command Default
120 seconds (2 minutes)
Command Modes
Global configuration (config)
Command History
Release
Modification
12.2(33)SXI3
This command was introduced on the Catalyst 6500 series switches.
12.2(50)SG7
This command was integrated on the Catalyst 4000 series switches.
12.2(53)SE2
This command was integrated into Cisco IOS Release 12.2(53)SG7 on the Catalyst 3750(E) and 3560(E) series switches.
Cisco IOS XE Release 3.4S
This command was integrated into Cisco IOS XE Release 3.4S.
15.1(3)S
This command was integrated into Cisco IOS Release 15.1(3)S.
Usage Guidelines
The retry timer is triggered if there is at least one CTS-SXP connection that is not up. A new CTS-SXP connection is attempted when this timer expires. A zero value results in no retry being attempted.
Related Commands
Command
Description
ctssxpconnectionpeer
Enters the CTS-SXP peer IP address and specifies if a password is used for the peer connection.
ctssxpdefaultpassword
Configures the CTS-SXP default password.
ctssxpdefaultsource-ip
Configures the CTS-SXP source IPv4 address.
ctssxpenable
Enables CTS-SXP on a device.
ctssxplog
Enables logging for IP-to-SGT binding changes.
ctssxpreconciliation
Changes the CTS-SXP reconciliation period.
showctssxp
Displays the status of all CTS-SXP configurations.