
PRIVILEGED EXEC MODE COMMANDS 3 - 25
pki authenticate <trustpoint-
name> <URL> {background}
{on <DEVIICE-name>}
• authenticate <TRUSTPOINT-NAME> – Authenticates and imports ca
certificate
• <URL> (background|on} – Enter the location of ca certificate to
authenticate
tftp://<hostname|IP>[:port]/path/file
ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
sftp://<user>@<hostname|IP>[:port]>/path/file
http://<hostname|IP>[:port]/path/file
cf:/path/file
usb1:/path/file
usb2:/path/file
• {background} {on <DEVICE-NAME>} – Performs the operation in
the background
• on <DEVICE-NAME> – On AP/Controller
• <DEVICE-NAME> – On AP/Controller name
• on <DEVICE-NAME>} – On AP/Controller
• <DEVICE-NAME> – On AP/Controller name
crypto pki export request
[generate-rsa-key|use-rsa-
key] <RSA-KEYPAIR-NAME>
[autogen-subject-
name|subject-name]
• export – Performs export operation
• request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> [auto-
gen-subject-name|subject-name] [<EXPORT-TO-URL>|email|fqdn|ip-ad-
dress] – Generates and exports a Certificate Signing Request
• generate-rsa-key <RSA-KEYPAIR-NAME> – Generates a new RSA
key-pair
• use-rsa-key – Uses a generated RSA key-pair
The following parameters are common for the above:
• RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name] –
Enter the name of RSA key-pair to export
• autogen-subject-name – Autogenerates the subject name from
config parameters
• URL – Enter the URL to export the CSR
tftp://<hostname|IP>[:port]/path/file
ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
sftp://<user>@<hostname|IP>[:port]>/path/file
http://<hostname|IP>[:port]/path/file
cf:/path/file
usb1:/path/file
usb2:/path/file
• email – Enter the email address
• fqdn – Enter the fully qualified domain name
• ip-address – Enter the IP Address
Comentarios a estos manuales