![]() ![]() ![]() Table 7-5Ĝommands to Test and Verify IKE Configuration Test and verify IKE configuration on the PIX Firewall with the commands inTable 7-5. Manually removes the PIX Firewall's certificates from the configuration this command deletes all the certificates issued by the CA. Ifyou issue this command, you must also enter the no ca identitycommand to delete CA certificates and ask the CA administrator to revoke yourPIX Firewall's certificates at the CA. Table 7-4Ĝommands to Delete RSA Keys and CA Certificatesĭeletes all RSA keys that were previously generated by your PIX Firewall. This command displays communications between the PIX Firewall and theCA server.ĭelete RSA keys and CA certificates with the commands in Table 7-4. Table 7-3Ĝommands to Test and Verify CA Configurationĭisplays the parameters for communication between the PIX Firewall and theCAĭisplays the PIX Firewall's public RSA keysĭisplays the current status of requested certificates and relevantinformation of received certificates, such as CA and RA certificatesĭebug CA messages with the debug crypto cacommand. Test and verify CA configuration with the commands in Table 7-3. Although many of the test and verify commands are used the same as whenconfiguring preshared keys, there are some commands unique to RSAsignatures. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |