HPE FlexFabric 7900 Series Security Command Reference page 159

Hide thumbs Also See for FlexFabric 7900 Series:
Table of Contents

Advertisement

Predefined user roles
network-admin
mdc-admin
Parameters
domain domain-name: Specifies the name of a PKI domain, a case-insensitive string of 1 to 31
characters. The domain name cannot contain the following special characters: tilde (~), asterisk (*),
back slash (\), vertical bar (|), colon (:), dot (.), left angle bracket (<), right angle bracket (>), quotation
marks ("), and apostrophe (').
ca: Specifies the CA certificate.
local: Specifies the local certificates.
peer entity-name: Specifies a peer entity by its name, a case-insensitive string of 1 to 31 characters.
Usage guidelines
In online mode:
You can obtain the CA certificate through the SCEP protocol. If a CA certificate already exists
locally, do not obtain the CA certificate again. To obtain a new one, use the pki
delete-certificate command to remove the CA certificate and local certificates, and then obtain
the CA certificate again.
You can obtain local certificates or peer certificates through the LDAP protocol. If a PKI domain
already has local certificates or peer certificates, you can still perform the obtain operation and
the obtained local certificates or peer certificates overwrite the existing ones. If RSA is used, a
PKI domain can have two local certificates, one for signing and the other for encryption.
Certificates for different purposes do not overwrite each other.
The obtained CA certificate, local certificates, and peer certificates are automatically verified before
they are saved locally. If the verification fails, they are not saved.
This command is not saved in the configuration file.
Examples
# Obtain the CA certificate from the certificate distribution server. (This operation requires the user to
confirm the fingerprint of the CA root certificate.)
<Sysname> system-view
[Sysname] pki retrieve-certificate domain aaa ca
The trusted CA's finger print is:
MD5
fingerprint:5C41 E657 A0D6 ECB4 6BD6 1823 7473 AABC
SHA1 fingerprint:1616 E7A5 D89A 2A99 9419 1C12 D696 8228 87BC C266
Is the finger print correct?(Y/N):y
# Obtain the local certificates from the certificate distribution server.
<Sysname> system-view
[Sysname] pki retrieve-certificate domain aaa local
# Obtain the certificate of the peer entity en1 from the certificate distribution server.
<Sysname> system-view
[Sysname] pki retrieve-certificate domain aaa peer en1
Related commands
display pki certificate
pki delete-certificate
151

Advertisement

Table of Contents
loading

Table of Contents