Cisco Cisco Identity Services Engine 1.2 产品宣传页

下载
页码 70
  
 
 
 
 
 
© 2015 思科系统公司 
 38   
安全访问操作指南
 
truststoreFilename=caroot1.jks 
truststorePassword=cisco123 
filter=null 
start=null 
end=null 
-------------------------- 
connecting... 
connected. 
starting at Thu Mar 05 21:45:49 EST 2015... 
 
session (ip=10.0.0.17, Audit Session Id=0A0000020000000D02D814C0, User Name=jeppich, AD User DNS 
Domain=lab6.com, AD Host DNS Domain=null, AD User NetBIOS Name=LAB6, AD Host NETBIOS Name=null, Calling 
station id=00:0C:29:77:D6:85, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint 
Profile=VMWare-Device, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/23, RADIUSAVPairs=[ Acct-Session-
Id=00000004], Posture Status=null, Posture Timestamp=, Session Last Update Time=Thu Mar 05 21:33:02 EST 
2015 ) 
session (ip=null, Audit Session Id=0A0000020000000C0003672C, User Name=68:EF:BD:F6:76:56, AD User DNS 
Domain=null, AD Host DNS Domain=null, AD User NetBIOS Name=null, AD Host NETBIOS Name=null, Calling station 
id=68:EF:BD:F6:76:56, Session state= STARTED, Epsstatus=null, Security Group=null, Endpoint Profile=Cisco-
Device, NAS IP=10.0.0.2, NAS Port=GigabitEthernet1/0/15, RADIUSAVPairs=[ Acct-Session-Id=00000005], Posture 
Status=null, Posture Timestamp=, Session Last Update Time=Thu Mar 05 21:33:44 EST 2015 )... ending at: Thu 
Mar 05 21:45:49 EST 2015 
 
--------------------------------------------------- 
downloaded 2 sessions in 35 milliseconds 
--------------------------------------------------- 
 
connection closed 
查看密钥库条目
 
通过查看密钥库条目,您可以查看
 keystoreFilename 和 truststoreFilename 秘钥库的受信任证书条目。 
 
步骤
 1 
验证
 truststoreFilename 密钥库 caroot1.jks 
Johns-Macbook-Pro:bin jeppich$ keytool -list -v -keystore caroot1.jks 
Enter keystore password:   
 
Keystore type: JKS 
Keystore provider: SUN 
 
Your keystore contains 3 entries 
 
Alias name: lab3 
Creation date: Mar 4, 2015 
Entry type: trustedCertEntry 
 
Owner: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com 
Issuer: CN=lab6-WIN-BG7GPQ053ID-CA, DC=lab6, DC=com 
Serial number: 448a6d6486c91cb14c6888c127d16c4e 
Valid from: Thu Nov 13 20:47:06 EST 2014 until: Wed Nov 13 20:57:06 EST 2019 
Certificate fingerprints: 
 
 MD5:  41:10:8A:F5:36:76:79:9C:2C:00:03:47:55:F8:CF:7B 
 
 SHA1: 9D:DA:06:AF:06:3F:8F:5E:84:C7:F4:58:50:95:03:22:64:48:96:9F 
 
 SHA256: 
DB:28:50:D6:47:CA:C0:6A:E9:7B:87:B4:0E:9C:3A:C1:A2:61:EA:D1:29:8B:45:B4:76:4B:DA:2A:F1:D8:E0:A3 
 
 Signature algorithm name: SHA256withRSA 
 
 Version: 3