HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 171

Configuration guidelines, Configuration procedure, Submitting a PKI certificate request

Page 171 highlights

Configuration guidelines • Up to two PKI domains can be created on a switch. • The CA name is required only when you retrieve a CA certificate. It is not used when in local certificate request. • The certificate request URL does not support domain name resolution. Configuration procedure To configure a PKI domain: Step Command Remarks 1. Enter system view. 2. Create a PKI domain and enter its view. system-view pki domain domain-name N/A No PKI domain exists by default. 3. Specify the trusted CA. ca identifier name No trusted CA is specified by default. 4. Specify the entity for certificate request. certificate request entity entity-name No entity is specified by default. The specified entity must exist. 5. Specify the authority for certificate request. certificate request from { ca | ra } No authority is specified by default. 6. Configure the certificate request URL. certificate request url url-string No certificate request URL is configured by default. 7. Configure the polling interval and attempt limit for querying certificate request polling { count the certificate request status. count | interval minutes } Optional. The polling is executed for up to 50 times at the interval of 20 minutes by default. 8. Specify the LDAP server. ldap-server ip ip-address [ port port-number ] [ version version-number ] Optional. No LDP server is specified by default. 9. Configure the fingerprint for root certificate verification. root-certificate fingerprint { md5 | sha1 } string Required when the certificate request mode is auto and optional when the certificate request mode is manual. In the latter case, if you do not configure this command, the fingerprint of the root certificate must be verified manually. No fingerprint is configured by default. Submitting a PKI certificate request When requesting a certificate, an entity introduces itself to the CA by providing its identity information and public key, which will be the major components of the certificate. A certificate request can be submitted to a CA in offline mode or online mode. In offline mode, a certificate request is submitted to a CA by an "out-of-band" means such as phone, disk, or email. 161

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

161
Configuration guidelines
Up to two PKI domains can be created on a switch.
The CA name is required only when you retrieve a CA certificate. It is not used when in local
certificate request.
The certificate request URL does not support domain name resolution.
Configuration procedure
To configure a PKI domain:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create a PKI domain and
enter its view.
pki domain
domain-name
No PKI domain exists by default.
3.
Specify the trusted CA.
ca
identifier
name
No trusted CA is specified by
default.
4.
Specify the entity for
certificate request.
certificate request entity
entity-name
No entity is specified by default.
The specified entity must exist.
5.
Specify the authority for
certificate request.
certificate request from
{
ca
|
ra
}
No authority is specified by
default.
6.
Configure the certificate
request URL.
certificate request url
url-string
No certificate request URL is
configured by default.
7.
Configure the polling interval
and attempt limit for querying
the certificate request status.
certificate request polling
{
count
count
|
interval
minutes
}
Optional.
The polling is executed for up to 50
times at the interval of 20 minutes
by default.
8.
Specify the LDAP server.
ldap-server
ip
ip-address
[
port
port-number
] [
version
version-number
]
Optional.
No LDP server is specified by
default.
9.
Configure the fingerprint for
root certificate verification.
root-certificate fingerprint
{
md5
|
sha1
}
string
Required when the certificate
request mode is auto and optional
when the certificate request mode
is manual. In the latter case, if you
do not configure this command, the
fingerprint of the root certificate
must be verified manually.
No fingerprint is configured by
default.
Submitting a PKI certificate request
When requesting a certificate, an entity introduces itself to the CA by providing its identity information
and public key, which will be the major components of the certificate. A certificate request can be
submitted to a CA in offline mode or online mode. In offline mode, a certificate request is submitted to
a CA by an "out-of-band" means such as phone, disk, or email.