Published On: August 5ᵗʰ, 2019 19:04

Catalyst 6500 Series SSL Services Module Configuration Note, 2.1

- - - - - - - - - - - - - - -

Index

A

assigning a certificate to a proxy service 3-31

audience xi

auto-enrollment and auto-renewal of certificates 3-35

B

backend encryption A-15

backing up keys and certificates 3-30

C

CA

see certificate authority

caching peer certificates 3-37

certificate authority

enrollment, three-tier example 3-9

obtaining the certificate 3-8

pool 3-45

root 3-5

subordinate 3-5

certificate expiration warning 3-37

certificate revocation list

See CRL

certificates

auto-enrollment and auto-renewal 3-35

backing up 3-30

caching 3-37

deleting 3-31

renewing 3-33

sharing 3-27

verifying 3-27

viewing 3-31

Certificate Security Attribute-Based Access Control feature 3-57, A-32

client certificate authentication 3-45

client NAT, configuring 4-11

collecting crash information 4-18

configuration, saving 3-28

configuring

backend encryption A-15

certificate expiration warning 3-37

client certificate authentication 3-45

client NAT 4-11

client proxy services 3-42

CSM 5-3

HTTP header insertion 4-6, 4-8

keys and certificates

importing key pairs and certificates 3-19

overview illustration 3-4

using manual certificate enrollment 3-10

using SCEP, declaring a trustpoint 3-7

using SCEP, example 3-9

using SCEP, generating RSA keys 3-5

using SCEP, obtaining the certificate authority certificate 3-8

using SCEP, requesting a certificate 3-8

PKI 3-1

policy-based routing 5-2

redundancy 4-12

server certificate authentication 3-48

server NAT 4-11

server proxy services 3-39

SSL policy 4-2

SSL proxy services 3-39

TACACS 4-13

TCP policy 4-4

URL rewrite 4-9

content switching module

see CSM

CRL

configuring options 3-53

deleting 3-55

displaying information 3-55

downloading 3-52

entering manually 3-54

entering X.500 CDP information 3-54

requesting 3-53

cryptographics self-test, enabling 4-15

CSM, configuring 5-3

D

debugging, enabling 4-21

deleting certificates 3-31

deleting keys 3-30

displaying key and certificate history 3-36

documentation

convention xii

organization xi

related xiii

E

enabling cryptographics self-test 4-15

enabling debugging 4-21

enabling key and certificate history 3-36

examples

backend encryption A-15

bridge mode, no NAT A-5

certificate security attribute-based access control A-32

HSRP

load balancing A-43

stand-alone redundancy A-41

HTTP header insertion A-34

integrated secure content-switching service A-22

policy-based routing A-1

router mode, server NAT A-10

site-to-site transport layer VPN A-25

URL rewrite A-39

exporting a PKCS12 file 3-20

exporting PEM files 3-21

H

Hot Standby Routing Protocol

See HSRP

HSRP 4-12

HTTP header insertion 4-6, 4-8

I

importing a PKCS12 file 3-20

importing PEM files 3-21

K

keys

backing up 3-30

deleting 3-30

viewing 3-31

O

organization, document xi

P

password recovery 2-14

PKI

configuring 3-2

overview 3-1

policy-based routing

configuring 5-2

example A-1

proxy services

client 3-42

server 3-39

Public Key Infrastructure

see PKI

R

recovering a lost password 2-14

redundancy 4-12

related documentation xiii

renewing a certificate 3-33

S

saving the configuration 3-28

SCEP, configuring keys and certificates 3-3

server certificate authentication 3-48

server NAT, configuring 4-11

sharing keys and certificates 3-27

Simple Certificate Enrollment Protocol

see SCEP

SSL policy, configuring 4-2

SSLv2

See SSL v2.0 forwarding

SSL v2.0 forwarding 3-41

T

TACACS 4-13

TCP policy, configuring 4-4

trustpoints, verifying 3-27

U

URL rewrite 4-9

V

verifying certificates and trustpoints 3-27

viewing keys and certificates 3-31