Users Guide
Example
OS10# crypto cdp delete Comsign
Supported
Releases
10.5.0 or later
crypto cert delete
Deletes an installed host certificate and the private key created with it.
Syntax
crypto cert delete filename [fips]
Parameters
● filename — Enter the file name of the host certificate as displayed in the show crypto cert
command.
● fips — (Optional) Delete a FIPS-compliant certificate-key pair. To verify whether a certificate is
non-FIPS or FIPS-compliant., use the show crypto cert command.
Default Not configured
Command mode EXEC
Usage
information
When you delete the system's certificate, you also delete the private key. Do not delete a host certificate
that is used in a security profile. To display the currently installed host certificate and associated key, use
the show crypto cert command.
NOTE: A FIPS-compliant and non-FIPS certificate may have the same file name. To delete a FIPS-
compliant certificate, you must enter the fips parameter in the command.
Example
OS10# crypto cert delete Dell_host1_CA1.pem
Certificate and keys were successfully deleted. CN = Dell_host1_CA1
Supported
releases
10.4.3.0 or later
crypto cert generate
Creates a certificate signing request (CSR) or a self-signed certificate.
Syntax
crypto cert generate {request | self-signed} [cert-file cert-path key-file
{private | keypath}] [country 2-letter code] [state state] [locality city]
[organization organization-name] [orgunit unit-name] [cname common-name]
[email email-address] [validity days] [length length] [altname alt-name]
Parameters
● request — Create a certificate signing request to copy to a CA.
● self-signed — Create a self-signed certificate.
● cert-file cert-path — (Optional) Enter the local path where the self-signed certificate or CSR
is stored. You can enter a full path or a relative path; for example, flash://certs/s4810-001-
request.csr or usb://s4810-001.crt. If you do not enter the cert-file option, the system
interactively prompts you to fill in the remaining fields of the certificate signing request. Export the
CSR to a CA using the copy command.
● key-file {key-path | private} — Enter the local path where the downloaded or locally
generated private key is stored. If the key was downloaded to a remote server, enter the server path
using a secure method, such as HTTPS, SCP, or SFTP. Enter private to store the key in a local
hidden location.
● country 2-letter-code — (OPTIONAL) Enter the two-letter code that identifies the country.
● state state — Enter the name of the state.
● locality city — Enter the name of the city.
● organization organization-name — Enter the name of the organization.
1400 Security