3.2.5. pki¶
Public Key Infrastructure configuration.
vsr running config# pki
ca-profile¶
List of Certificate Authority profiles.
vsr running config# pki ca-profile <ca-profile>
|
Certificate name. |
est¶
Enrollment over Secured Transport parameters (RFC7030).
vsr running config# pki ca-profile <ca-profile> est
vrf¶
The vrf in which EST exchanges are performed.
vsr running config# pki ca-profile <ca-profile> est
vsr running est# vrf VRF
|
Description |
|---|---|
|
The main vrf. |
|
The vrf name. |
- Default value
main
l3vrf¶
The l3vrf in which EST exchanges are performed.
vsr running config# pki ca-profile <ca-profile> est
vsr running est# l3vrf L3VRF
|
The l3vrf name. |
url (mandatory)¶
The HTTPs URL of the EST server where enrollment requests will be addressed.
vsr running config# pki ca-profile <ca-profile> est
vsr running est# url URL
|
An HTTP(S) file URL. IPv6 addresses must be surrounded by square brackets [1234:bada::2]. The :/?#[]@!$&’()*+,;= characters in the user and password must be percent-encoded (e.g: ‘?’ becomes ‘%3f’). See RFC 3986 section 2.1. For convenience, you should use the separate user and password fields. |
initial-certificate¶
End-entity certificate used to authenticate the local device to the EST server during the initial enrollment.
vsr running config# pki ca-profile <ca-profile> est
vsr running est# initial-certificate INITIAL-CERTIFICATE
|
Certificate name. |
private-key-algorithm¶
The private key algorithm.
vsr running config# pki ca-profile <ca-profile> est
vsr running est# private-key-algorithm PRIVATE-KEY-ALGORITHM
|
Description |
|---|---|
|
RSA with 512 bit key. |
|
RSA with 1024 bit key. |
|
RSA with 2048 bit key. |
|
RSA with 4096 bit key. |
|
RSA with 8192 bit key. |
|
RSA Probabilistic Signature Scheme with 512 bit key (a.k.a. RSASSA-PSS, defined in RFC3447). |
|
RSA Probabilistic Signature Scheme with 1024 bit key (a.k.a. RSASSA-PSS, defined in RFC3447). |
|
RSA Probabilistic Signature Scheme with 2048 bit key (a.k.a. RSASSA-PSS, defined in RFC3447). |
|
RSA Probabilistic Signature Scheme with 4096 bit key (a.k.a. RSASSA-PSS, defined in RFC3447). |
|
RSA Probabilistic Signature Scheme with 8192 bit key (a.k.a. RSASSA-PSS, defined in RFC3447). |
|
ECDSA with 256-bit prime field Weierstrass curve (a.k.a. NIST P-256, secp256r1, prime256v1). |
|
ECDSA with 384-bit prime field Weierstrass curve (a.k.a. NIST P-384, secp384r1, ansip384r1). |
|
ECDSA with 521-bit prime field Weierstrass curve (a.k.a. NIST P-521, secp521r1, ansip521r1). |
|
ECDSA with 256-bit prime field Brainpool curve (a.k.a. brainpoolP256r1, defined in RFC5639). |
|
ECDSA with 384-bit prime field Brainpool curve (a.k.a. brainpoolP384r1, defined in RFC5639). |
|
ECDSA with 512-bit prime field Brainpool curve (a.k.a. brainpoolP512r1, defined in RFC5639). |
|
EdDSA using SHA512 and Curve25519 (a.k.a. Ed25519, defined in RFC8032). |
|
EdDSA using SHAKE256 and Curve448 (a.k.a. Ed448, defined in RFC8032). |
- Default value
rsa-2048
source¶
The source address used to reach the EST server.
vsr running config# pki ca-profile <ca-profile> est
vsr running est# source SOURCE
|
Description |
|---|---|
|
An IPv4 address. |
|
An IPv6 address. |
ca-certificate-store¶
CA certificate store used as a Explicit Trust Anchor for authenticating the EST server and for signing the end-entity certificates.
vsr running config# pki ca-profile <ca-profile> est
vsr running est# ca-certificate-store CA-CERTIFICATE-STORE
|
CA certificate store name. |
use-ocsp-stapling¶
Whether to verify the status of the EST server certificate by using the Certificate Status Request TLS extension (a.k.a. OCSP stapling).
vsr running config# pki ca-profile <ca-profile> est
vsr running est# use-ocsp-stapling true|false
- Default value
false
update-ca-certificates¶
Whether to update the CA certificates before every EST request.
vsr running config# pki ca-profile <ca-profile> est
vsr running est# update-ca-certificates true|false
- Default value
false
automatic-update¶
EST automatic update parameters.
vsr running config# pki ca-profile <ca-profile> est automatic-update
remaining-time¶
unit: days
The remaining days of validity of the certificate before the scheduled update is triggered.
vsr running config# pki ca-profile <ca-profile> est automatic-update
vsr running automatic-update# remaining-time <uint32>
- Default value
5
retry-delay¶
unit: seconds
The time between two update retries in case of failed update.
vsr running config# pki ca-profile <ca-profile> est automatic-update
vsr running automatic-update# retry-delay <uint32>
- Default value
30
certificate-extensions¶
X509v3 extensions to request when enrolling a certificate.
vsr running config# pki ca-profile <ca-profile> certificate-extensions
subject-key-identifier¶
Subject Key Identifier.
vsr running config# pki ca-profile <ca-profile> certificate-extensions
vsr running certificate-extensions# subject-key-identifier SUBJECT-KEY-IDENTIFIER
|
Description |
|---|---|
|
160-bit SHA-1 hash of the subjectPublicKey. |
|
No description. |
|
No description. |
key-usage¶
Key Usage.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
critical¶
The key-usage extension is critical.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# critical
digital-signature¶
Digital Signature.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# digital-signature
non-repudiation¶
Non repudiation.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# non-repudiation
key-encipherment¶
Key encryption.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# key-encipherment
data-encipherment¶
Data encryption with the key contained in the certificate.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# data-encipherment
key-agreement¶
Key agreement (e.g. for Diffie-Hellman exchanges).
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# key-agreement
key-cert-sign¶
Signing certificates.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# key-cert-sign
crl-sign¶
Signing revocation lists.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# crl-sign
encipher-only¶
Encrypt only, in conjunction with keyAgreement.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# encipher-only
decipher-only¶
Decrypt only, in conjunction with keyAgreement.
vsr running config# pki ca-profile <ca-profile> certificate-extensions key-usage
vsr running key-usage# decipher-only
extended-key-usage¶
Extended Key Usage.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
critical¶
The extended-key-usage extension is critical.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# critical
server-auth¶
SSL/TLS Web Server Authentication.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# server-auth
client-auth¶
SSL/TLS Web Client Authentication.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# client-auth
code-signing¶
Code signing.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# code-signing
email-protection¶
E-mail Protection (S/MIME).
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# email-protection
time-stamping¶
Trusted Timestamping.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# time-stamping
ocsp-signing¶
OCSP Signing.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# ocsp-signing
ipsec-ike¶
IPsec Internet Key Exchange.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# ipsec-ike
ms-individual-code-signing¶
Microsoft Individual Code Signing (authenticode).
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# ms-individual-code-signing
ms-commercial-code-signing¶
Microsoft Commercial Code Signing (authenticode).
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# ms-commercial-code-signing
ms-cert-trust-list-signing¶
Microsoft Certificate Trust List Signing.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# ms-cert-trust-list-signing
ms-encrypted-file-system¶
Microsoft Encrypted File System.
vsr running config# pki ca-profile <ca-profile> certificate-extensions extended-key-usage
vsr running extended-key-usage# ms-encrypted-file-system
revocation¶
Revocation check parameters.
vsr running config# pki ca-profile <ca-profile> revocation
crl¶
Certificate Revocation List parameters.
vsr running config# pki ca-profile <ca-profile> revocation crl
url¶
List of CRL distribution point URLs.
vsr running config# pki ca-profile <ca-profile> revocation crl
vsr running crl# url URL
|
An ASCII-encoded Uniform Resource Identifier (URI) as defined in RFC 3986. |
revocation¶
Certificate revocation global parameters.
vsr running config# pki revocation
crl¶
Certificate Revocation List global parameters.
vsr running config# pki revocation crl
vrf¶
The VRF in which CRLs are fetched.
vsr running config# pki revocation crl
vsr running crl# vrf <leafref>
source¶
The source address used to fetch the CRLs.
vsr running config# pki revocation crl
vsr running crl# source SOURCE
|
Description |
|---|---|
|
An IPv4 address. |
|
An IPv6 address. |
certificate (state only)¶
Note
requires a specific license: Product.
List of X509 Certificates.
subject (state only) (pushed)¶
The subject of the certificate.
vsr> show state pki certificate <string> subject
issuer (state only) (pushed)¶
The issuer of the certificate.
vsr> show state pki certificate <string> issuer
validity-not-before (state only) (pushed)¶
The validity the certificate: not before this date.
vsr> show state pki certificate <string> validity-not-before
validity-not-after (state only) (pushed)¶
The validity the certificate: not after this date.
vsr> show state pki certificate <string> validity-not-after
has-private-key (state only) (pushed)¶
There is a private key associated to this certificate.
vsr> show state pki certificate <string> has-private-key
is-ca (state only) (pushed)¶
Whether this is a CA certificate.
vsr> show state pki certificate <string> is-ca
certificate-request (state only)¶
Note
requires a specific license: Product.
List of X509 certificate signing requests.
subject (state only) (pushed)¶
The subject of the certificate request.
vsr> show state pki certificate-request <string> subject
ca-certificate-store (state only)¶
Note
requires a specific license: Product.
List of CA certificate stores.
certificate (state only)¶
Note
requires a specific license: Product.
List of X509 Certificates.
subject (state only) (pushed)¶
The subject of the certificate.
vsr> show state pki ca-certificate-store <string> certificate <string> subject
issuer (state only) (pushed)¶
The issuer of the certificate.
vsr> show state pki ca-certificate-store <string> certificate <string> issuer
validity-not-before (state only) (pushed)¶
The validity the certificate: not before this date.
vsr> show state pki ca-certificate-store <string> certificate <string> validity-not-before
validity-not-after (state only) (pushed)¶
The validity the certificate: not after this date.
vsr> show state pki ca-certificate-store <string> certificate <string> validity-not-after
has-private-key (state only) (pushed)¶
There is a private key associated to this certificate.
vsr> show state pki ca-certificate-store <string> certificate <string> has-private-key
is-ca (state only) (pushed)¶
Whether this is a CA certificate.
vsr> show state pki ca-certificate-store <string> certificate <string> is-ca