
ii
Configuration guidelines ·····································································································60
Configuration procedure ·····································································································61
Distributing a local host public key·······························································································62
Exporting a host public key··································································································62
Displaying a host public key·································································································62
Destroying a local key pair·········································································································63
Configuring a peer host public key·······························································································63
Importing a peer host public key from a public key file·······························································63
Entering a peer host public key ····························································································64
Displaying and maintaining public keys·························································································64
Examples of public key management ···························································································64
Example for entering a peer host public key············································································64
Example for importing a public key from a public key file····························································66
Configuring PKI ·············································································69
Overview································································································································69
PKI terminology ················································································································69
PKI architecture ················································································································70
PKI operation ···················································································································70
PKI applications················································································································71
Support for MPLS L3VPN ···································································································71
FIPS compliance······················································································································72
PKI configuration task list···········································································································72
Configuring a PKI entity·············································································································72
Configuring a PKI domain··········································································································73
Requesting a certificate·············································································································75
Configuration guidelines ·····································································································75
Configuring automatic certificate request················································································76
Manually requesting a certificate···························································································76
Aborting a certificate request······································································································77
Obtaining certificates ················································································································77
Configuration prerequisites··································································································77
Configuration guidelines ·····································································································78
Configuration procedure ·····································································································78
Verifying PKI certificates············································································································78
Verifying certificates with CRL checking ·················································································78
Verifying certificates without CRL checking·············································································79
Specifying the storage path for the certificates and CRLs ·································································79
Exporting certificates ················································································································80
Removing a certificate···············································································································80
Configuring a certificate-based access control policy ·······································································81
Displaying and maintaining PKI···································································································82
PKI configuration examples········································································································82
Requesting a certificate from an RSA Keon CA server ······························································82
Requesting a certificate from a Windows Server 2003 CA server·················································85
Requesting a certificate from an OpenCA server······································································88
Certificate import and export configuration example··································································91
Troubleshooting PKI configuration·······························································································96
Failed to obtain the CA certificate ·························································································97
Failed to obtain local certificates···························································································97
Failed to request local certificates ·························································································98
Failed to obtain CRLs·········································································································98
Failed to import the CA certificate ·························································································99
Failed to import a local certificate························································································ 100
Failed to export certificates································································································ 100
Failed to set the storage path····························································································· 101
Configuring SSL··········································································· 102
Overview······························································································································ 102
SSL security services······································································································· 102
SSL protocol stack··········································································································· 102
FIPS compliance···················································································································· 103