EasyManua.ls Logo

Cisco IOS XR User Manual

Cisco IOS XR
254 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #22 background imageLoading...
Page #22 background image
Implementing Certification Authority Interoperability on Cisco IOS XR Software
How to Implement CA Interoperability
SC-10
Cisco IOS XR System Security Configuration Guide
Authenticating the CA
This task authenticates the CA to your router.
The router must authenticate the CA by obtaining the self-signed certificate of the CA, which contains
the public key of the CA. Because the certificate of the CA is self-signed (the CA signs its own
certificate), manually authenticate the public key of the CA by contacting the CA administrator to
compare the fingerprint of the CA certificate.
SUMMARY STEPS
1. crypto ca authenticate ca-name
2. show crypto ca certificates
Step 7
rsakeypair
keypair-label
Example:
RP/0/RP0/CPU0:router(config-trustp)# rsakeypair
mykey
(Optional) Specifies a named RSA key pair generated using
the crypto key generate rsa command for this trustpoint.
• Not setting this key pair means that the trustpoint uses
the default RSA key in the current configuration.
Step 8
end
or
commit
Example:
RP/0/RP0/CPU0:router(config-trustp)# end
or
RP/0/RP0/CPU0:router(config-trustp)# commit
Saves configuration changes.
• When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before
exiting(yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to the
running configuration file, exits the configuration
session, and returns the router to EXEC mode.
–
Entering no exits the configuration session and
returns the router to EXEC mode without
committing the configuration changes.
–
Entering cancel leaves the router in the current
configuration session without exiting or
committing the configuration changes.
• Use the commit command to save the configuration
changes to the running configuration file and remain
within the configuration session.
Command or Action Purpose

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco IOS XR and is the answer not in the manual?

Cisco IOS XR Specifications

General IconGeneral
Operating SystemCisco IOS XR
ArchitectureMicrokernel
High AvailabilityYes
TypeNetwork operating system
Developed byCisco Systems
LicenseProprietary
Programming LanguageC, C++
KernelQNX
Supported PlatformsCisco ASR9000, NCS series
Security FeaturesRole-Based Access Control (RBAC), Secure Boot, Encryption
Management InterfaceCLI, SNMP, NETCONF, RESTCONF
Release Date2004
Target DevicesHigh-end core routers, service provider edge routers, data center interconnect (DCI) routers
Supported HardwareCisco routers and switches
Networking ProtocolsBGP, OSPF, IS-IS, MPLS
Virtualization SupportVirtualization-ready, supports network function virtualization (NFV) and containerization technologies.

Summary

Implementing Certification Authority Interoperability on Cisco IOS XR Software

Prerequisites for Implementing Certification Authority

Lists necessary prerequisites for configuring CA interoperability.

Information About Implementing Certification Authority

Explains CA concepts, standards (IPSec, IKE, PKCS), and authorities.

How to Implement CA Interoperability

Provides step-by-step procedures for CA interoperability configuration.

Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software

Prerequisites

Lists necessary prerequisites for configuring IKE security protocol.

Information About Implementing IKE Security Protocol Configurations for IPSec Networks

Explains IKE concepts, standards (IKE, IPSec, ISAKMP, Oakley, Skeme), and algorithms.

IKE Policies

Details IKE policy creation, parameter definitions, and peer agreement for negotiation.

Implementing Keychain Management on Cisco IOS XR Software

Restrictions for Implementing Keychain Management

Notes the impact of system clock changes on key validity.

How to Implement Keychain Management

Covers procedures for configuring keychains, key identifiers, and key strings.

Implementing IPSec Network Security on Cisco IOS XR Software

Prerequisites for Implementing IPSec Network Security

Lists necessary prerequisites for configuring IPSec network security.

Information About Implementing IPSec Networks

Explains IPSec concepts like crypto profiles, access lists, and transform sets.

Perfect Forward Secrecy

Ensures IPSec SA keys are not derived from other secrets for enhanced security.

Implementing Secure Shell on Cisco IOS XR Software

Prerequisites to Implementing Secure Shell

Lists required conditions and images for implementing Secure Shell.

Information About Implementing Secure Shell

Explains SSH server, client, SFTP feature, and AAA integration concepts.

How to Implement Secure Shell

Provides step-by-step procedures for configuring SSH server and client.

Implementing Secure Socket Layer on Cisco IOS XR Software

Prerequisites for Implementing Secure Socket Layer

Lists required conditions for SSL implementation, including key generation and CA enrollment.

Information About Implementing Secure Socket Layer

Explains SSL concepts, including the purpose of certification authorities.

How to Implement Secure Socket Layer

Provides procedures for configuring SSL, including key generation and trustpoint setup.

Configuring AAA Services on Cisco IOS XR Software

Prerequisites for Configuring AAA Services

Lists required conditions before configuring AAA services.

Information About Configuring AAA Services

Explains AAA concepts, users, groups, tasks, and administrative models.

How to Configure AAA Services

Procedures for configuring AAA services, including method lists and server communication.

Implementing Management Plane Protection on Cisco IOS XR Software

Restrictions for Implementing Management Plane Protection

Notes that out-of-band configurations for management traffic are not supported.

Information About Implementing Management Plane Protection

Explains management plane protection concepts, interfaces, and control plane.

How to Configure a Device for Management Plane Protection

Provides procedures for configuring MPP to restrict management traffic to specific interfaces.

Related product manuals