Cisco PIX 525 Spezifikationen Seite 470

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 604
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 469
29-4
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 29 Configuring Certificates
Certificate Configuration
The security appliance uses these two factors as follows:
If the NextUpdate field is not required, the security appliance marks CRLs as stale after the length
of time defined by the cache-time command.
If the NextUpdate field is required, the security appliance marks CRLs as stale at the sooner of the
two times specified by the cache-time command and the NextUpdate field. For example, if the
cache-time command is set to 100 minutes and the NextUpdate field specifies that the next update
is 70 minutes away, the security appliance marks CRLs as stale in 70 minutes.
If the security appliance has insufficient memory to store all CRLs cached for a given trustpoint, it
deletes the least recently used CRL to make room for a newly retrieved CRL.
For information about configuring CRL behavior for a trustpoint, see the “Configuring CRLs for a
Trustpoint” section on page 29-12.
Supported CA Servers
The security appliance supports the following CA servers:
Cisco IOS CS
Baltimore Technologies
Entrust
Microsoft Certificate Services
Netscape CMS
RSA Keon
Ve r i Si g n
Certificate Configuration
This section describes how to configure the security appliance with certificates and other procedures
related to certificate use and management.
This section includes the following topics:
Preparing for Certificates, page 29-4
Configuring Key Pairs, page 29-5
Configuring Trustpoints, page 29-6
Obtaining Certificates, page 29-8
Configuring CRLs for a Trustpoint, page 29-12
Exporting and Importing Trustpoints, page 29-14
Configuring CA Certificate Map Rules, page 29-15
Preparing for Certificates
Before you configure a security appliance with certificates, ensure that the security appliance is
configured properly to support certificates. An improperly configured security appliance can cause
enrollment to fail or for enrollment to request a certificate containing inaccurate information.
Seitenansicht 469
1 2 ... 465 466 467 468 469 470 471 472 473 474 475 ... 603 604

Kommentare zu diesen Handbüchern

Keine Kommentare