Cisco CP-7911G-CH1 Administration Guide - Page 188

Examples, Autoenrolling and Authenticating the Secure Cisco Unified SRST Router to the CA Server

Page 188 highlights

How to Configure Secure Unified SRST Configuring Secure SRST for SCCP and SIP Command or Action Step 5 grant auto Example: Router (cs-server)# grant auto Step 6 no shutdown Example: Router (cs-server)# no shutdown Purpose Allows an automatic certificate to be issued to any requestor. • This command is used only during enrollment and will be removed in the "Disabling Automatic Certificate Enrollment" section on page 190. Enables the Cisco IOS certificate server. • You should issue this command only after you have completely configured your certificate server. Examples The following example reflects one way of generating a CA: Router(config)# crypto pki server srstcaserver Router(cs-server)# database level complete Router(cs-server)# database url nvram Router(cs-server)# issuer-name CN=srstcaserver Router(cs-server)# grant auto % This will cause all certificate requests to be automatically granted. Are you sure you want to do this? [yes/no]: y Router(cs-server)# no shutdown % Once you start the server, you can no longer change some of % the configuration. Are you sure you want to do this? [yes/no]: y % Generating 1024 bit RSA keys ...[OK] % Certificate Server enabled. Autoenrolling and Authenticating the Secure Cisco Unified SRST Router to the CA Server The secure Cisco Unified SRST Router needs to define a trustpoint; that is, it must obtain a device certificate from the CA server. The procedure is called certificate enrollment. Once enrolled, the secure Cisco Unified SRST Router can be recognized by Cisco Unified Communications Manager as a secure SRST router. There are three options to enroll the secure Cisco Unified SRST Router to a CA server: autoenrollment, cut and paste, and TFTP. When the CA server is a Cisco IOS certificate server, autoenrollment can be used. Otherwise, manual enrollment is required. Manual enrollment refers to cut and paste or TFTP. Use the enrollment url command for autoenrollment and the crypto pki authenticate command to authenticate the SRST router. Full instructions for the commands can be found in the Certification Authority Interoperability Commands documentation. An example of autoenrollment is available in the Certificate Enrollment Enhancements feature. A sample configuration is provided in the "Examples" section on page 190. SUMMARY STEPS 1. crypto pki trustpoint name 2. enrollment url url 3. revocation-check method1 4. exit 188 Cisco Unified SCCP and SIP SRST System Administrator Guide OL-13143-04

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

Configuring Secure SRST for SCCP and SIP
How to Configure Secure Unified SRST
188
Cisco Unified SCCP and SIP SRST System Administrator Guide
OL-13143-04
Examples
The following example reflects one way of generating a CA:
Router(config)#
crypto pki server srstcaserver
Router(cs-server)#
database level complete
Router(cs-server)#
database url nvram
Router(cs-server)#
issuer-name CN=srstcaserver
Router(cs-server)#
grant auto
% This will cause all certificate requests to be automatically granted.
Are you sure you want to do this? [yes/no]:
y
Router(cs-server)#
no shutdown
% Once you start the server, you can no longer change some of
% the configuration.
Are you sure you want to do this? [yes/no]:
y
% Generating 1024 bit RSA keys ...[OK]
% Certificate Server enabled.
Autoenrolling and Authenticating the Secure Cisco Unified SRST Router to the CA Server
The secure Cisco Unified SRST Router needs to define a trustpoint; that is, it must obtain a device
certificate from the CA server. The procedure is called certificate enrollment. Once enrolled, the secure
Cisco Unified SRST Router can be recognized by Cisco Unified Communications Manager as a secure
SRST router.
There are three options to enroll the secure Cisco Unified SRST Router to a CA server: autoenrollment,
cut and paste, and TFTP. When the CA server is a Cisco IOS certificate server, autoenrollment can be
used. Otherwise, manual enrollment is required. Manual enrollment refers to cut and paste or TFTP.
Use the
enrollment url
command for autoenrollment and the
crypto pki authenticate
command to
authenticate the SRST router. Full instructions for the commands can be found in the
Certification
Authority Interoperability Commands
documentation. An example of autoenrollment is available in the
Certificate Enrollment Enhancements
feature. A sample configuration is provided in the
“Examples”
section on page 190
.
SUMMARY STEPS
1.
crypto pki trustpoint
name
2.
enrollment url
url
3.
revocation-check
method1
4.
exit
Step 5
grant auto
Example:
Router (cs-server)# grant auto
Allows an automatic certificate to be issued to any
requestor.
This command is used only during enrollment and will
be removed in the
“Disabling Automatic Certificate
Enrollment” section on page 190
.
Step 6
no shutdown
Example:
Router (cs-server)# no shutdown
Enables the Cisco IOS certificate server.
You should issue this command only after you have
completely configured your certificate server.
Command or Action
Purpose