Users Guide

Table Of Contents
849| Management Access Dell Networking W-Series ArubaOS 6.5.x| User Guide
Command Description
show crypto-local pki
trustedCAs [<name>]
[<attribute>]
Displays the contents of a trusted CA certificate. If a name is not
specified, all CA certificates imported into the controller are displayed.
If name and attribute are specified, then only the attribute in the
certificate are displayed. Attributes can be CN, validity, serial-number,
issuer, subject, public-key.
show crypto-local pki
serverCerts [<name>]
[<attribute>]
Displays the contents of a server certificate. If a name is not specified,
all server certificates imported into the controller are displayed.
show crypto-local pki
publiccert [<name>]
[<attribute>]
Displays the contents of a public certificate. If a name is not specified,
all public certificates imported into the controller are displayed.
Table 188: Certificate Show Commands
Imported Certificate Locations
Imported certificates and keys are stored in the following locations in flash on the controller:
Location Description
/flash/certmgr/trustedCAs Trusted CA certificates, either for root or intermediate CAs. Best
practices is to import the certificate for an intermediate CA, you also
import the certificate for the signing CA.
/flash/certmgr/serverCerts Server certificates. These certificates must contain both a public and
private key (the public and private key must match). You can import
certificates in PKCS12 and X509 PEM formats, but they are stored in
X509 PEM DES encrypted format.
/flash/certmgr/CSR Temporary certificate signing requests (CSRs) that have been
generated on the controller and are awaiting a CA to sign them.
/flash/certmgr/publiccert Public key of certificates. This allows a service on the controller to
identify a certificate as an allowed certificate.
Table 189: Imported Certificate Locations
Checking CRLs
A CA maintains a CRL that contains a list of certificates that have been revoked before their expiration date.
Expired client certificates are not accepted for any user-centric network service. Certificates may be revoked
because certificate key has been compromised or the user specified in the certificate is no longer authorized to
use the key.
When a client certificate is being authenticated for a user-centric network service, the controller checks with the
appropriate CA to make sure that the certificate has not been revoked.
The controller does not support download of CRLs.