Cisco Cisco IOS Software Release 12.2(33)SRE
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
©
2006–2007
Cisco Systems, Inc. All rights reserved.
Persistent Self-Signed Certificates
This feature allows the secure HTTP (HTTPS) server to generate and save a self-signed certificate in the
router startup configuration. Thus, future secure socket layer (SSL) handshakes between the client and
the HTTPS server can use the same self-signed certificate without user intervention.
router startup configuration. Thus, future secure socket layer (SSL) handshakes between the client and
the HTTPS server can use the same self-signed certificate without user intervention.
Configuration Information
Configuration information is included in the “Configuring Authorization and Revocation of Certificates
in a PKI” module in the
in a PKI” module in the
, Release 12.4T, at the following URL:
The following sections provide information about this feature:
•
Supported Certificate Enrollment Methods
•
Configuring a Persistent Self-Signed Certificate for Enrollment via SSL
For a complete list of features included in the “Configuring Authorization and Revocation of Certificates
in a PKI” module, see the Feature Information table located toward the end of the module.
in a PKI” module, see the Feature Information table located toward the end of the module.
Command Reference Information
Release 12.2(33)SXH
The following commands are new or modified for this feature:
•
enrollment selfsigned
•
show crypto pki certificates
•
show crypto pki trustpoints