Published On: August 5ᵗʰ, 2019 19:13

Catalyst 6500 Series SSL Services Module Configuration Note, 3.1

- - - - - - - - - - - - - - - -

Index

A

assigning a certificate to a proxy service 3-32

audience xi

auto-enrollment and auto-renewal of certificates 3-36

B

backend encryption A-15

backing up keys and certificates 3-30

C

CA

See certificate authority

caching peer certificates 3-38

certificate authority

enrollment, three-tier example 3-9

obtaining the certificate 3-8

pool 3-52

root 3-5

subordinate 3-5

certificate expiration warning 3-39

certificate revocation list

See CRL

certificates

auto-enrollment and auto-renewal 3-36

backing up 3-30

caching 3-38

deleting 3-32

renewing 3-34

sharing 3-28

verifying 3-28

viewing 3-32

Certificate Security Attribute-Based Access Control feature 3-65, A-33

checking certificate status 3-58

client certificate authentication 3-51

client NAT, configuring 4-15

collecting crash information 4-24

configuration, saving 3-28

configuring

backend encryption A-15

certificate expiration warning 3-39

client certificate authentication 3-51

client NAT 4-15

client proxy services 3-48

CSM 5-3

health probe 4-13

HTTP header insertion 4-7, 4-10

keys and certificates

importing key pairs and certificates 3-19

overview illustration 3-4

using manual certificate enrollment 3-11

using SCEP, declaring a trustpoint 3-7

using SCEP, example 3-9

using SCEP, generating RSA keys 3-5

using SCEP, obtaining the certificate authority certificate 3-8

using SCEP, requesting a certificate 3-9

PKI 3-1

policy-based routing 5-2

redundancy 4-16

server certificate authentication 3-55

server NAT 4-15

server proxy services 3-45

SNMP traps 4-18

SSL policy 4-2

SSL proxy services 3-45

TACACS, TACACS+, RADIUS 4-17

TCP policy 4-5

URL rewrite 4-11

virtualization 3-44

content switching module

See CSM

CRL

configuring 3-62

deleting 3-65

displaying information 3-65

entering manually 3-64

entering X.500 CDP information 3-63

overview 3-59

requesting 3-63

cryptographics self-test, enabling 4-20

CSM, configuring 5-3

D

debugging

PKI 4-25

processors 4-27

deleting certificates 3-32

deleting keys 3-31

displaying key and certificate history 3-37

documentation

convention xii

organization xi

related xiii

E

enabling

cryptographics self-test 4-20

debugging 4-25

key and certificate history 3-37

examples

backend encryption A-15

bridge mode, no NAT A-5

certificate security attribute-based access control A-33

client authentication A-60

health probe A-56

HSRP

load balancing A-46

stand-alone redundancy A-44

HTTP header insertion A-35

integrated secure content-switching service A-22

offloading non-HTTP protocols A-54

policy-based routing A-1

router mode, server NAT A-10

site-to-site transport layer VPN A-26

URL rewrite A-42

virtualization with VRF A-52

exporting a PKCS12 file 3-20

exporting PEM files 3-21

H

health probe 4-13

Hot Standby Routing Protocol

See HSRP

HSRP, configuring 4-16

HTTP header insertion

client certificate 4-8

client IP and port address 4-9

configuring 4-10

custom 4-9

header alias 4-9

overview 4-7

prefix 4-8

SSL session 4-9

I

importing a PKCS12 file 3-20

importing PEM files 3-21

IP fragment reassembly, adjusting timer 3-50

K

keys

backing up 3-30

deleting 3-31

viewing 3-32

M

MIBS, supported 4-18

O

OCSP

configuring 3-62

overview 3-60

Online Certificate Status Protocol

See OCSP

organization, document xi

P

password recovery 2-13

PKI

configuring 3-2

debugging 4-25

overview 3-1

policy-based routing

configuring 5-2

example A-1

proxy services

client 3-48

server 3-45

Public Key Infrastructure

See PKI

R

recovering a lost password 2-13

redundancy, configuring 4-16

related documentation xiii

renewing a certificate 3-34

S

saving the configuration 3-28

SCEP, configuring keys and certificates 3-3

server certificate authentication 3-55

server NAT, configuring 4-15

sharing keys and certificates 3-28

Simple Certificate Enrollment Protocol

See SCEP

SSL policy, configuring 4-2

SSL v2.0 forwarding 3-47

T

TACACS, TACACS+, RADIUS 4-17

TCP policy, configuring 4-5

trustpoints, verifying 3-28

U

URL rewrite 4-11

V

verifying certificates and trustpoints 3-28

viewing keys and certificates 3-32