DETAILED STEPS
PurposeCommand or Action
Enables privileged EXEC mode.enable
Example:
Device> enable
Step 1
•
Enter your password if prompted.
Enters global configuration mode.configure terminal
Example:
Device# configure terminal
Step 2
Declares the trustpoint that your device should use and enters
CA trustpoint configuration mode.
crypto pki trustpoint name
Example:
Device(ca-trustpoint)# crypto pki trustpoint
mytp
Step 3
Queries the CRL to ensure that the certificate of the peer
has not been revoked.
crl query ldap ://url : [port]
Example:
Device(ca-trustpoint)# crl query
ldap://url:[port]
Step 4
Exits CA trustpoint configuration mode and returns to
privileged EXEC mode.
end
Example:
Device(ca-trustpoint)# end
Step 5
Deleting RSA Keys from a Device
Under certain circumstances you may want to delete RSA keys from your device. For example, if you believe
the RSA keys were compromised in some way and should no longer be used, you should delete the keys.
]
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
crypto key zeroize rsa [key-pair-label]
4.
end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
1155
Monitoring and Maintaining Certification Authority