22.09.2013 Views

Cisco IOS Security Command Reference

Cisco IOS Security Command Reference

Cisco IOS Security Command Reference

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

show crypto pki trustpoints<br />

SEC-1844<br />

<strong>Cisco</strong> <strong>IOS</strong> <strong>Security</strong> <strong>Command</strong> <strong>Reference</strong><br />

<strong>Security</strong> <strong>Command</strong>s<br />

The following is sample output from the show crypto pki trustpoints command when a persistent<br />

self-signed certificate has been configured:<br />

Router# show crypto pki trustpoints<br />

Trustpoint local:<br />

Subject Name:<br />

serialNumber=C63EBBE9+ipaddress=10.3.0.18+hostname=test.company.com<br />

Serial Number: 01<br />

Persistent self-signed certificate trust point<br />

The following output shows that a shadow PKI certificate is available and shows the SCEP capabilities:<br />

Router# show crypto pki trustpoints<br />

Trustpoint vpn:<br />

Subject Name:<br />

cn=Company SSL CA<br />

o=Company<br />

Serial Number: 0FFEBBDC1B6F6D9D0EA7875875E4C695<br />

Certificate configured.<br />

Rollover certificate configured.<br />

Enrollment Protocol:<br />

SCEPv1, PKI Rollover<br />

The following output using the status keyword shows that the trustpoint is configured in query mode<br />

and is currently trying to query the certificates (the certificate authority (CA) certificate and the router<br />

certificate are both pending):<br />

Router# show crypto pki trustpoints status<br />

Trustpoint yni:<br />

Issuing CA certificate pending:<br />

Subject Name:<br />

cn=r1 Cert Manager,ou=pki,o=company.com,c=country<br />

Fingerprint: C21514AC 12815946 09F635ED FBB6CF31<br />

Router certificate pending:<br />

Subject Name:<br />

hostname=host.company.com,o=company.com<br />

Next query attempt:<br />

52 seconds<br />

The following output using the status keyword shows that the trustpoint has been authenticated:<br />

Router# show crypto pki trustpoints status<br />

Trustpoint yni:<br />

Issuing CA certificate configured:<br />

Subject Name:<br />

cn=r1 Cert Manager,ou=pki,o=company.com,c=country<br />

Fingerprint: C21514AC 12815946 09F635ED FBB6CF31<br />

State:<br />

Keys generated ............. No<br />

Issuing CA authenticated ....... Yes<br />

Certificate request(s) ..... None<br />

January 2008

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!