Pki Configuration Examples; Requesting A Certificate From An Rsa Keon Ca Server - HPE FlexNetwork 10500 Series Security Configuration Manual

Hide thumbs Also See for FlexNetwork 10500 Series:
Table of Contents

Advertisement

Task
Display certificate attribute group
information.
Display certificate-based access control
policy information.

PKI configuration examples

You can use different software applications, such as Windows server, RSA Keon, and OpenCA, to
act as the CA server.
If you use Windows server or OpenCA, you must install the SCEP add-on for Windows server or
enable SCEP for OpenCA. In either case, when you configure a PKI domain, you must use the
certificate request from ra command to specify the RA to accept certificate requests.
If you use RSA Keon, the SCEP add-on is not required. When you configure a PKI domain, you must
use the certificate request from ca command to specify the CA to accept certificate requests.

Requesting a certificate from an RSA Keon CA server

Network requirements
Configure the PKI entity (the device) to request a local certificate from the CA server.
Figure 86 Network diagram
Host
Configuring the RSA Keon CA server
1.
Create a CA server named myca:
In this example, you must configure these basic attributes on the CA server:
Nickname—Name of the trusted CA.
Subject DN—DN attributes of the CA, including the common name (CN), organization unit
(OU), organization (O), and country (C).
You can use the default values for other attributes.
2.
Configure extended attributes:
Configure parameters in the Jurisdiction Configuration section on the management page of
the CA server:
Select the correct extension profiles.
Enable the SCEP autovetting function to enable the CA server to automatically approve
certificate requests without manual intervention.
Specify the IP address list for SCEP autovetting.
Configuring the device
1.
Synchronize the system time of the device with the CA server for the device to correctly request
certificates or obtain CRLs. (Details not shown.)
2.
Create an entity named aaa and set the common name to Device.
PKI entity
Internet
Device
Command
display pki certificate attribute-group [ group-name ]
display pki certificate access-control-policy [ policy-name ]
CA server
306

Advertisement

Table of Contents
loading

Table of Contents