Specifications
Key and Certificate Configuration Scenarios
16-14 Managing Keys and Certificates
5. UnpackthePKCS #12objectfilesintothecertificateandkeystorageareaontheRoamAbout
switch.Usethefollowingcommand:
crypto pkcs12 {admin | eap | web} filename
ThefilenameisthelocationofthefileontheRoamAboutswitch.
Forexample:
RBT-8100# crypto pkcs12 admin 2048admn.p12
Unwrapped from PKCS12 file:
keypair
device certificate
CA certificate
RBT-8100# crypto pkcs12 eap 20481x.p12
Unwrapped from PKCS12 file:
keypair
device certificate
CA certificate
RBT-8100# crypto pkcs12 web 2048web.p12
Unwrapped from PKCS12 file:
keypair
device certificate
CA certificate
Installing CA-Signed Certificates Using a PKCS #10 Object File (CSR)
and a PKCS #7 Object File
ThisscenarioshowshowtouseCSRstoinstallpublic‐privatekeypairs,CA‐signedcertificates,
andCAcertifiesforadministrativeaccess,802.1X(EAP)access,andWeb AAAaccess.
1. Settimeanddateparameters,ifnotalreadyset.(See“ConfiguringandManagingTime
Parameters”onpage 5‐20.)
2. Generatepublic‐privatekeypairs:
RBT-8100# crypto generate key admin 1024
key pair generated
RBT-8100# crypto generate key eap 1024
key pair generated
RBT-8100# crypto generate key web 1024
key pair generated
3. CreateaCSR(PKCS #10objectfile)torequestanadministrativecertificate:
RBT-8100# crypto generate request admin
Country Name: US
State Name: CA
Locality Name: Cambria
Organizational Name: example
Organizational Unit: eng
Common Name: RAS-2
Note: MSS erases the OTP password entered with the crypto otp command when you enter the
crypto pkcs12 command.