EasyManuals Logo

Cisco ASR 1004 User Manual

Cisco ASR 1004
72 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #39 background imageLoading...
Page #39 background image
Page 39 of 72
4.6.4.5 Configuring a Revocation Mechanism for PKI Certificate Status
Checking
Perform this task to set up the certificate revocation mechanism--CRLs or OCSP--that is used
to check the status of certificates in a PKI.
Use the revocation-check command to specify at least one method (OCSP, CRL, or skip the
revocation check) that is to be used to ensure that the certificate of a peer has not been
revoked. For multiple methods, the order in which the methods are applied is determined by the
order specified via this command.
If the TOE does not have the applicable CRL and is unable to obtain one, or if the OCSP server
returns an error, the TOE will reject the peer’s certificate--unless an administrator includes the
‘none’ keyword in your configuration. If the 'none' keyword is configured, a revocation check
will not be performed and the certificate will always be accepted.
When using OCSP, nonces, unique identifiers for OCSP requests, are sent by default during
peer communications with a OCSP server. The use of nonces offers a more secure and reliable
communication channel between the peer and OCSP server. If the OCSP server does not support
nonces, an authorized administrator may disable the sending of nonces.
Note: The TOE supports use of OCSP only when using RSA certs and not when using ECDSA
certificates.
4.6.4.6 Manually Overriding the OCSP Server Setting in a Certificate
Administrators can override the OCSP server setting specified in the Authority Information
Access (AIA) field of the client certificate or set by the issuing the ocsp url command. One or
more OCSP servers may be manually specified, either per client certificate or per group of client
certificates by the match certificate override ocsp command. The match certificate override
ocspcommand overrides the client certificate AIA field or the ocsp urlcommand setting if a client
certificate is successfully matched to a certificate map during the revocation check
4.6.4.7 Configuring Certificate Chain Validation
Perform this task to configure the processing level for the certificate chain path of peer
certificates.
Prerequisites:
The device must be enrolled in your PKI hierarchy.
The appropriate key pair must be associated with the certificate.
1. Enter configure terminal mode:
TOE-common-criteria# configure terminal
2. Set the crypto pki trustpoint name:
TOE-common-criteria(config)# crypto pki trustpoint ca-sub1
3. Configure the level to which a certificate chain is processed on all certificates including
subordinate CA certificates using the chain-validation [{stop | continue} [parent-
trustpoint]] command:
TOE-common-criteria(ca-trustpoint)# chain-validation continue ca-sub1

Table of Contents

Other manuals for Cisco ASR 1004

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASR 1004 and is the answer not in the manual?

Cisco ASR 1004 Specifications

General IconGeneral
Product TypeRouter
Form FactorRack-mountable
Rack Height2U
Forwarding CapacityUp to 20 Gbps
Total Number of PortsVaries by configuration
Number of Total Expansion Slots4
Product SeriesASR 1000
ModelASR 1004
Forwarding PerformanceUp to 20 Gbps
Operating SystemCisco IOS XE
Power SupplyDual
Route ProcessorASR 1000 Series Route Processor
Network Interface ModulesSFP, SFP+, Gigabit Ethernet, 10 Gigabit Ethernet
Interfaces/PortsVaries by configuration
Expansion Slot TypeSPA
Throughput20 Gbps
RedundancyPower supply, Route Processor
InterfacesGigabit Ethernet, 10 Gigabit Ethernet, SFP, SFP+
StorageUp to 64 GB Flash

Related product manuals