Requesting A Certificate From A Ca Running Windows 2003 Server - 3Com 4500G Family Configuration Manual

24/48 port
Hide thumbs Also See for 4500G Family:
Table of Contents

Advertisement

X509v3 extensions:
X509v3 CRL Distribution Points:
URI:http://4.4.4.133:447/myca.crl
Signature Algorithm: sha1WithRSAEncryption
836213A4 F2F74C1A 50F4100D B764D6CE
B30C0133 C4363F2F 73454D51 E9F95962
EDE9E590 E7458FA6 765A0D3F C4047BC2
9C391FF0 7383C4DF 9A0CCFA9 231428AF
987B029C C857AD96 E4C92441 9382E798
8FCC1E4A 3E598D81 96476875 E2F86C33
75B51661 B6556C5E 8F546E97 5197734B
C8C29AC7 E427C8E4 B9AAF5AA 80A75B3C
You can also use some other display commands to view detailed information about the CA certificate
and CRLs. Refer to the parts related to display pki certificate ca domain and display pki crl domain
commands in PKI Commands of the Security Volume.

Requesting a Certificate from a CA Running Windows 2003 Server

The CA server runs the Windows 2003 server in this configuration example.
Network requirements
Configure PKI entity Switch to request a local certificate from the CA server.
Figure 1-3 Request a certificate from a CA running Windows 2003 server
Configuration procedure
1)
Configure the CA server
Install the certificate server suites
From the start menu, select Control Panel > Add or Remove Programs, and then select
Add/Remove Windows Components > Certificate Services and click Next to begin the installation.
Install the SCEP plug-in
As a CA server running the Windows 2003 server does not support SCEP by default, you need to install
the SCEP plug-in so that the switch can register and obtain its certificate automatically. After the SCEP
D3A5C849 CBDE350D 2A1926B7 0AE5EF5E
D1D8B08A DBF16205 7C2A4011 05F11094
73EB0549 A65D9E74 0F2953F2 D4F0042F
19103439 3D4F9359 88FB59F3 8D4B2F6C
2B
Exponent: 65537 (0x10001)
1-15

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

Table of Contents