Requesting A Certificate; Configuration Guidelines - HPE FlexNetwork 10500 Series Security Configuration Manual

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

Step
11. (Optional.) Specify the
intended use for the
certificate.
12. (Optional.) Specify a
source IP address for
the PKI protocol
packets.

Requesting a certificate

To request a certificate, a PKI entity must provide its identity information and public key to a CA.
A certificate request can be submitted to a CA in offline or online mode.
Offline mode—A certificate request is submitted by using an out-of-band method, such as
phone, disk, or email. You can use this mode as required or if you fail to request a certificate in
online mode.
To submit a certificate request in offline mode:
a. Use pki request-certificate domain pkcs10 to print the request information on the
terminal or use pki request-certificate domain pkcs10 filename to save the request
information to a local file.
b. Send the printed information or the saved file to the CA by using an out-of-band method.
Online mode—A certificate request can be automatically or manually submitted. This section
describes the online request mode.

Configuration guidelines

The following guidelines apply to certificate request for an entity in a PKI domain:
Make sure the device is time synchronized with the CA server. If the device is not time
synchronized with the CA server, the certificate request might fail because the certificate might
be considered to be outside of the validity period. For information about configuring the system
time, see Fundamentals Configuration Guide.
To request a new certificate for a PKI entity that already has a local certificate, perform the
following tasks:
a. Use the pki delete-certificate command to delete the existing local certificate.
b. Use the public-key local create to generate a new key pair. The new key pair will
automatically overwrite the old key pair in the domain.
c. Submit a new certificate request.
To prevent a certificate from becoming unavailable after it is obtained, follow these guidelines:
Do not use the public-key local create command to create a key pair with the same name
as the name of the key pair contained in the certificate.
Command
usage { ike | ssl-client | ssl-server } *
Specify the source IPv4 address for
the PKI protocol packets:
source ip { ip-address | interface
interface-type interface-number }
Specify the source IPv6 address for
the PKI protocol packets:
source ipv6 { ipv6-address |
interface interface-type
interface-number }
298
Remarks
By default, the certificate can be
used by all supported
applications, including IKE, SSL
client, and SSL server.
The extension options contained
in an issued certificate depend on
the CA policy, and they might be
different from those specified in
the PKI domain.
This task is required if the CA
policy requires that the CA server
accept certificate requests from a
specific IP address or subnet.
By default, the source IP address
of PKI protocol packets is the IP
address of their outgoing
interface.

Advertisement

Table of Contents
loading

Table of Contents