Configuring secure http servers and clients, Default ssl configuration, Ssl configuration guidelines – Dell POWEREDGE M1000E User Manual

Page 249: Configuring a ca trustpoint

Advertising
background image

8-45

Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide

OL-13270-03

Chapter 8 Configuring Switch-Based Authentication

Configuring the Switch for Secure Socket Layer HTTP

Configuring Secure HTTP Servers and Clients

These sections contain this configuration information:

Default SSL Configuration, page 8-45

SSL Configuration Guidelines, page 8-45

Configuring a CA Trustpoint, page 8-45

Configuring the Secure HTTP Server, page 8-46

Configuring the Secure HTTP Client, page 8-48

Default SSL Configuration

The standard HTTP server is enabled.

SSL is enabled.

No CA trustpoints are configured.

No self-signed certificates are generated.

SSL Configuration Guidelines

Before you configure a CA trustpoint, you should ensure that the system clock is set. If the clock is not
set, the certificate is rejected due to an incorrect date.

In a switch stack, the SSL session terminates at the stack master.

Configuring a CA Trustpoint

For secure HTTP connections, we recommend that you configure an official CA trustpoint.
A CA trustpoint is more secure than a self-signed certificate.

Beginning in privileged EXEC mode, follow these steps to configure a CA trustpoint:

Command

Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

hostname hostname

Specify the hostname of the switch (required only if you have not
previously configured a hostname). The hostname is required for security
keys and certificates.

Step 3

ip domain-name domain-name

Specify the IP domain name of the switch (required only if you have not
previously configured an IP domain name). The domain name is required
for security keys and certificates.

Step 4

crypto key generate rsa

(Optional) Generate an RSA key pair. RSA key pairs are required before
you can obtain a certificate for the switch. RSA key pairs are generated
automatically. You can use this command to regenerate the keys, if
needed.

Step 5

crypto ca trustpoint name

Specify a local configuration name for the CA trustpoint and enter CA
trustpoint configuration mode.

Step 6

enrollment url url

Specify the URL to which the switch should send certificate requests.

Advertising